Company Information

CIN
Status
Date of Incorporation
22 July 1988
State / ROC
Delhi / ROC Delhi
Industry
Sub Category
Non-govt company
Last Balance Sheet
Last Annual Meeting
Paid Up Capital
59,744,360
Authorised Capital
150,000,000

Patents

Progressively Implementing Declarative Models In Distributed Systems

A system for automatically implementing high-level instructions in a distributed application program, where the high-level instructions reflect the behavior of the distributed application program, includes at least a tools component. The tools component is used to write high-level instructions in the form of declara...

"High Availability Transport"

A system provides high availability electronic message forwarding. When an electronic message is communicated to a first server, a copy of the electronic message is maintained at a second server. The electronic message is maintained on both servers until the electronic message is successfully communicated to a third...

"Automatically Managing System Downtime In A Computer Network"

Embodiments are provided to automatically managing system downtime in a computer network. In one embodiment, an event is created in an application server to schedule a system downtime period for a web server. When the scheduled downtime occurs, the web server is automatically removed from the network and a downtime ...

Architecture For Online Communal And Connected Experiences

Various aspects are disclosed herein for an architecture for online communal and connected experiences. This architecture can be embodied in an application running a host computing device, where the application provides functionalities such as finding modules on local devices or hosted on online services, launching ...

Viral Distribution And Tracking Of Electronic Coupons

Distributing and tracking electronic coupons based on proximity. Upon detecting recipients proximate to a computing device, one or more electronic coupons are selected and transmitted to the detected recipients. The transmittal occurs via a wireless connection in some embodiments. Coupon properties associated with t...

Visual Search And Three Dimensional Results

ABSTRACT VISUAL SEARCH AND THREE-DIMENSIONAL RESULTS Methods, systems, graphical user interfaces, and computer-readable media for visually searching and exploring a set of objects are provided. A computer system executes a method that generates three-dimensional representations or two-dimensional representations fo...

Media Mix Wiring Protocol For Media Control

Protocol architecture for wiring media streams and specifying mixing behavior in a multipoint control unit. The protocol provides the capability to expose the core mixing algorithms to modification for mixing media without dealing with the functionality of the mixer itself (e.g., ports and IP specifics). The protoco...

Isolation Of Content By Processes In An Application

Isolation of extension code by processes in an application is described. In an implementation, execution of one or more processes is managed that contain content received via a network by another process of a single application that includes the one or more processes. The management includes terminating the one or m...

Rewind Playback Of Media

Systems and methods of media optimization are disclosed herein. An operation command can be sent to a media device from a host device. The operation command can be indicative of an intent to perform an operation on the recording medium. A list of media device characteristics corresponding to media device resources c...

Interruptible Nand Flash Memory

ABSTRACT INTERRUPTIBLE NAND FLASH MEMORY A NAND flash memory logical unit. The NAND flash memory logical unit includes a control circuit that responds to commands and permits program and/or erase commands to be interruptible by read commands. The control circuit includes a set of internal registers for performing t...

Dynamic Image Presentation

ABSTRACT DYNAMIC IMAGE PRESENTATION One or more techniques and/or systems are disclosed for efficiently organizing images in a display. A size of an image is scaled by an image scale factor, while an aspect ratio for the image is maintained, where the image scale factor comprises a combination of a first scale dist...

Scalable Hosting Of User Solutions

Scalable hosting of user solutions is provided. A system for hosting application software includes a local server, one or more remote servers, a configuration database and a content database. The local server includes a web front end module that processes a request from a client computer over the Internet to host ap...

Data Viewer Management

Embodiments described herein are directed to generating a customized data viewer, where the viewer is configured to display data at any level in a data model. In one embodiment, a computer system receives a user request indicating that portions of data are to be displayed in a user-customized manner using a data vie...

Signaling Of State Information For A Decoded Picture Buffer And Reference Picture Lists

Innovations for signaling state of a decoded picture buffer ("DPB") and reference picture lists ("RPLs"). In example implementations rather than rely on internal state of a decoder to manage and update DPB and RPLs state information about the DPB and RPLs is explicitly signaled. This permits a decoder to determine w...

Cell Based Security Representation For Data Access

Architecture for cell-based security on a per-user basis. A security model for this capability includes not only dimension level tables, but is extended to include cell level tables. The security model can include existing dimension tables, plus cell security tables that include a cell permissions table, a cell qual...

Software Rasterization Optimization

Systems, methods, and computer-readable media for optimizing emulated fixed-function and programmable graphics operations are provided. Data comprising fixed function and programmable states for an image or scenario to be rendered is received. The data for the image is translated into operations. One or more optimiz...

Low Latency Peer Session Establishment

A source device and a target device may endeavor to form a secure communication session whereby encrypted messages may be transmitted over an untrusted network, such as the internet. However, the exchange of many messages in the establishment of the communication session may involve considerable latency and computat...

Routing User Data Entries To Applications

A user data entry is received at a mobile communications device. After receiving the user data entry, user selections of a first application and a second application are received. In response to the user selections, the user data entry is routed to both the first application and the second application. Additionally,...

Visualizing Camera Feeds On A Map

Feeds from cameras are better visualized by superimposing images based on the feeds onto map based on a two- or three-dimensional virtual map. For example, a traffic camera feed can be aligned with a roadway included in the map. Multiple videos can be aligned with roadways in the map and can also be aligned in time....

Dynamic Declarative Application Description

Embodiments described herein are directed to dynamically reconfiguring at least a portion of an operating software application. In one embodiment, a computer system receives an edit indicating that at least one portion of an operating software application is to be edited, where the edit includes changes that are to ...

Multi Client Collaboration To Access And Update Structured Data Elements

Tools and techniques for providing multi-client collaboration to access and update structured data elements are disclosed. Client systems may present user interfaces that provide libraries of published data elements that are available for collaboration. The clients may request selected data elements, while referenci...

User Interface For Scheduling Resource Assignments

A project management resources scheduling user interface is provided in which resource information may be displayed in a condensed timeline for each resource over the duration of a project. Individual tasks or groups of tasks displayed in the project management resources scheduling view may be moved from one resourc...

Resource Access Based On Multiple Credentials

A collection of multiple user credentials each associated with one of multiple different users is obtained at a device, and one or more of the multiple user credentials are verified. The collection of multiple user credentials is also compared to a threshold combination of user credentials to be satisfied to access ...

Providing Access To A Data Item Using Access Graphs

An approach is described for controlling access to a data item using one or more access graphs. The approach entails distributing a compact package of access-related information to a recipient that pertains to the access graphs. The recipient can use the access-related information to access the data item through the...

Search Based On Document Associations

A method and a processing device are provided. A group of documents may be selected from multiple documents of a search result. Associations among the selected group of documents may be determined and indicated. An indication of ones of the associations that are of interest and/or others of the associations that are...

Techniques To Modify A Document Using A Latent Transfer Surface

Techniques to modify a document using a latent transfer surface are described. An apparatus may comprise a document editing subsystem comprising a transfer surface creation module operative to embed a latent transfer surface in the document. A transfer control module may be communicatively coupled to the transfer su...

Social Network Powered Query Refinement And Recommendations

SOCIAL NETWORK POWERED QUERY REFINEMENT AND RECOMMENDATIONS Embodiments of the present invention enhance the search experience of a user by looking at the search history of one or more buddies to provide search enhancements to the user. Examples of search enhancements include an annotation or graphic adjacent to a ...

Concurrent Editing Of Online Drawings

A webpage contains a canvas. The canvas contains a drawing that is editable within the webpage by a user of a client device and by other users who use other client devices to open webpages that include the canvas. While the webpage is open on the client device the drawing is dynamically updated to reflect edits made...

Luminance Correction

Techniques are disclosed to improve quality of images that may be blurred or underexposed. In one described implementation, a method includes providing two images of a same scene. The method determines a spatial coherence and color statistics of the two images. The determined color statistics and spatial coherence a...

"Systems And Methods For Automatic Main"

The present invention is directed a logical consistency checker (LCC) working alone or in conjunction with a physical consistency checker (PCC) and/or a data reliability system (DRS) for a database files system of a hardware/software interface system. Logical data correction pertains to logical data corruptions for ...

Email Tags

Email tags are described. In embodiments email messages are received for distribution to client devices that correspond to respective recipients of the email messages. Email routing decisions are applied to route an email message to an email folder for a recipient of the email message where the email folder may incl...

"Scalabel Synchronous And Asynchronous Processing Of Monitoring Rules"

A rules runtime engine for scheduling and concurrently processing of rules. The engine efficiently runs a large number of rules in a parallel fashion. This is accomplished by authoring rules in a rule definition language, passing these rules through the translator for communication to the runtime engine and, schedul...

"Password Protection"

Systems and methods for password protection are described. In one aspect, an asymmetric key pair is deterministically formed by combining a password and other data. The public key of the asymmetric key pair is exported to an external device. The private key of the asymmetric key pair is used to effect subsequent aut...

Command Driven Web Site Browsing

Command driven web site browsing with web page command interpretation. As a part of web page command interpretation a web page (105) is displayed having a field (106) for accepting user input text. It is determined whether the user input text is a command. A specific application (140) is selected from a plurality of...

Managing Cache Data And Metadata

Techniques are provided for managing cache metadata that maps addresses on a storage medium (e.g., disk) to corresponding addresses on a cache device. Cache metadata may be stored in a hierarchical data structure. Only a subset of the levels of the hierarchy may be loaded to memory, thus reducing the cache metadata"...

"Bulk Transmission Of Messages Using A Single Http Request"

Example embodiments provide for keeping an HTTP reply flow for a communication open such that portions of an overall response corresponding to a single request may be sent across the HTTP reply flow. As the various portions of the overall response become available at a corresponding service endpoint, the service app...

"Features Such As Titles, Transitions And/Or Effects Which Vary According To Positions"

A software program for creating features for use with a plurality of media objects in a sequence. The program comprises a feature component specifying a feature having parameters affecting at least one variable aspect of the feature. An indicator component identifies a position of the specified feature relative to t...

"System And Method Of Aggregating The Knowledge Base Of Antivirus Software Applications"

In accordance with this invention, a system, method, and computer-readable medium that aggregates the knowledge base of a plurality of antivirus software applications are provided. User mode applications, such as antivirus software applications, gain access to file system operations through a common information mode...

Method And Apparatus For Discovering Network Devices

Multiple devices are identified in a network along with connection information associated with the multiple devices. The connection information associated with the multiple devices is converted into hierarchical structure and communication links between the multiple devices are identified.

"Method And Apparatus For Multi Sensory Speech Enhancement"

A method and apparatus determine a channel response for an alternative sensor using an alternative sensor signal and an air conduction microphone signal. The channel response is then used to estimate a clean speech value using at least a portion of the alternative sensor signal.

"Method And System For Securely Provisioning A Client Device"

Disclosed is a mechanism for securely provisioning a client by authenticating that client during a dynamic configuration process. Rather than relying on post-configuration authentication schemes, the present invention combines security and dynamic configuration into a unified scheme. Any client device attempting to ...

Publishing Digital Content Within A Defined Universe Such As An Organization In Accordance With A Digital Rights Management (Drm) System

A licensor receives a request from a requestor including an identifier identifying the requestor and rights data associated with digital content, where the rights data lists at least one identifier and rights associated therewith. The licensor thereafter locates the identifier of the requestor in a directory, and lo...

"Sending Messages In Response To Events Occurring On A Gaming Service"

Alerts are transmitted to subscribers to an alerts service in response to events that occur within a gaming environment. Communication within the gaming environment is limited to specific game consoles and the gaming service. A subscriber to the alert notification service can be alerted when a friend joins the gamin...

Token Based File Operations

Described are embodiments which allow token based file operations. The client may request a s0pecial offload file operation that is formatted according to a file access protocol. The file operation may be an offload read operation or an offload write operation. In an offload read operation the client requests that d...

"Licensing The Use Of Software On A Particular Cpu"

Software is licensed for use on a particular computing device, such as a gaming console or a multimedia console. An unlocking code is provided from a distribution service to the computing device (either directly or via a user), which in turn, unlocks the appropriate software or portion of software for use with the a...

"Methods For Operating A Computer System"

In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one embodiment, one portion of the non-volatile memory is used as a write buffer and a read cache for writes and reads to the long-term storage media. Interfaces are p...

"Architecture For Partition Computation And Propagation Of Changes In Data Replication"

The present invention provides for facilitating synchronization in a data source/data destination environment using data replicas. When a plurality of destinations request synchronization with a source, a first destination selected for synchronization is processed such that differences between the first destination ...

"System And Method For Displaying Images Utilizing Multi Blending"

A system and method for processing images utilizing varied feature class weights is provided. A Computer system associates two or more images with a set of feature class data, such as color and texture data. The computer system assigns a set of processing weights for each of the feature classes. The two or more imag...

Generic Model Editing Framework

In one embodiment, a computer system generates a view of entities associated with varying data types for presentation on a generic viewer. The entities and data types have relationships as defined in a corresponding schema. The schema is stored as data in a repository with the data types. The computer system receive...

"Memory Training Via Visual Journal"

ABSTRACT MEMORY TRAINING VIA VISUAL JOURNAL A system that can enhance cognitive ability by viewing sequences of images captured during an event is disclosed. For example, the innovation can employ captured event sequences to improve failing memories in patients with a diagnosed memory condition such as acquired br...

"Method And System For Providing Index Data For Print Job Data"

* Various embodiments develop (and consume), along with rendered print job data, metadata that describes certain characteristics of the print job data. This i metadata can be provided, along with the rendered data, from a client device to a print server and can allow the print server to ascertain the ...

"Functions Acting On Arbitrary Geometric Paths"

A facility for evaluating a spreadsheet cell is described. The facility reads a function call stored in a spreadsheet cell. The function call specifies an arbitrary geometric path and an operation to be performed on the specified path. The facility performs the specified operation on the specified path, and attribut...

System And Method For Creation Of An Object Within An Object Hierarchy Structure.

A system and method relating to creation of object(s) in an object hierarchy structure is provided. An object generator that in response to a command to expand a node/object provides a initiator node that facilitates generation of a new object within the object hierarchy upon expansion of the node. A display compone...

"Integrated Telephone Call And Context Notification Mechanism"

A mechanism for placing a telephone call (241) while at the same time communicating context (244) (e.g., subject, importance and/or nature) of the telephone call. The caller uses a mechanism on a user interface (400) to instruct a caller computing system (210) to place a telephone call to a callee computing system. ...

Secure Deployment Of Provable Identity For Dynamic Application Environments

An invention is described for securely deploying a provable identity for virtual machines (VMs) in a dynamic environment. In an embodiment a fabric controller instructs a VM host to create a VM and sends that VM a secret. The fabric controller sends that same secret (or a second secret such as the private key of a p...

Binding Content To An Entity

The present invention enforces digital rights within the confines of a content license by validating an entity certificate. Cryptographic information within a entity certificate is utilized to unlock protected content and authenticate the entity certificate. The entity certificate includes personal credentials, whic...

"Method For Generating User Interfaces"

A method, computer readable medium and system are provided which generate a model driven form user interface to represent an application model. The method includes selecting which of multiple different logical form types to use to generate the form user interface to represent the application model. The method also i...

"Instant Messaging For Multi User Computers"

An instant messaging system provides instant message communication between computers, including multi-user computers. The system provides multiple concurrent instant message user logins on a multi-user computer, one of the multiple concurrent instant message user logins being a registered buddy of a user of a secon...

"User Interface Accorded To Tiered Object Related Trust Decisions"

Adware and viruses are examples of objects that may be embedded in a webpage or linked to a webpage. When such an object is detected to be associated with a webpage loading on a browser, an analysis may be performed to determine a trust level for the object. The object may be blocked in accordance with the trust lev...

"System For Location Awareness"

A location service and method provides a location aware computing device that is extensible by allowing different types of location providers operate with the service. The method includes receiving a request for a location context, acquiring data associated with a current location from one or more location detection...

Channel Reuse With Cognitive Low Interference Signals

A computing system in which devices communicate wirelessly as secondary users in a band assigned to primary users. The computers communicate using new signals developed to reduce disruption to primary users of the band. The new signals may be produced by sensing, or otherwise determining, signals used by primary use...

"Delegating Right To Acess Resource Or The Like In Access Management System"

A resource of a first organization provides access thereto to a requestor of a second organization. A first administrator of the first organization issues a first credential to a second administrator of the second organization, including policy that the second administrator may issue a second credential to the reque...

Controling The Delegation Of Rights

ABSTRACT CONTROLLING THE DELEGATION OF RIGHTS The delegation of rights may be controlled in a number of manners. In an example implementation, a delegation authority assertion is formulated with a delegator principal, a delegatee principal, a verb phrase, a resource, and a delegation-directive verb. In another exam...

Translating Declarative Models

The present invention extends to methods, systems, and program products for translating declarative models. Embodiments of the present invention facilitate processing declarative models to perform various operations on such as, for example, application deployment,  updates, application control such as start and stop...

Systems And Methods For Improved Spell Checking

The present invention leverages iterative transformations of search query strings along with statistics extracted from search query logs and/or web data to provide possible alternative spellings for the search query strings. This provides a spell checking means that can be influenced to provide individualized sugges...

"Method And Apparatus For Multi Sensory Speech Enhancement On A Mobile Device"

A mobile device includes an air conduction microphone and an alternative sensor that provides an alternative sensor signal indicative of speech. A communication interface permits the mobile device to communicate directly with other mobile devices.

Support Of Multiple Pre Shared Keys In Access Point

A method of operating an access point (AP) configured to support multiple pre-shared keys. Each client device associated with the AP is provisioned with a key. To authenticate the client device, the AP determines which pre-shared key (PSK) of the multiple supported pre-shared keys, if any, matches information includ...

Project Time And Expense

A system for capturing time and expense information over a net and for processing the information into a project accounting system has a projecting accounting system adapted to store time and expense data associated with a project. A user interface provides a from accessible over a network by a user via a browser. T...

Suspension And/Or Throttling Of Processes For Connected Standby

One or more techniques and/or systems are provided for assigning power management classifications to a process transitioning a computing environment into a connected standby state based upon power management classifications assigned to processes and transitioning the computing environment from the connected standby ...

Media User Interface Start Menu

Embodiments of a media user interface are presented herein.

"Crawling Databases For Information"

A system facilitates the search engine to search for pieces of information in various databases and application documents without the need to know the specific protocols to communicate with the various databases and application documents, such as Microsoft Excel documents. Despite the multitude of possible prot...

"A Method Of Multi Radio Communication And Multi Radio Communicator Device"

Described herein is an implementation that reduces the battery consumption of an energy-constrained computing device that is capable of communicating over a wireless network. As conditions and circumstances warrant, the implementation selects one of multiple radios (e.g., two)-with each having a unique combination ...

Syndication Of Multiple Service Instances

Service provisioning tasks can be performed to provision or deprovision services for users reconcile overlapping services and apply effective service properties. A service can be provisioned by receiving a request to provision the service for a user reconciling new service properties with current service properties ...

"User Authentication Via A Mobile Telephone"

A mobile telephone automatically establishes communication with a system via a short-range wireless network. When communication is established, the mobile telephone user is automatically logged in to the system. The system can then apply personalized settings and/or provide access to personalized services based...

Improving Efficiency And Accuracy Of Geo Fencing Based On User History

Architecture that identifies and learns repeated user behavior (habits) related to routes of travel and points of interest. Once learned the habits of an individual can be used to make an algorithm more efficient and hence the user experience of an application more effective and enjoyable. The capability to more acc...

Conditional Access To Digital Rights Management Conversion

The present invention provides for an interface between two seemingly incompatible and different content protection systems. Accordingly, protected content may be transferred between the respective security kernels of a conditional access (CA) and digital rights management (DRM) system, while maintaining security of...

"Efficient Language Identification"

A system and methods of language identification of natural language text are presented. The system includes stored expected character counts and variances for a list of characters found in a natural language. Expected character counts and variances are stored f...

Building And Using Subwebs For Focused Search

A system that facilitates performance of a focused search over a collection of sites comprises a subweb that corresponds to a topic and/or user charateristic(s)that are of interest to the user. The subweb includes a plurality of domains and/or paths (e.g.sites) that are related to the topic and/or the user character...

Dynamic User Experience With Semantic Rich Objects

Semantic rich objects for a dynamic user experience. One or more actions in the process are represented by semantic rich objects (SROs) for exposing functionality of the process. Each of the SROs includes metadata associated with an action and an execution environment therefor. In response to an interactive gesture ...

Systems And Methods For Applying Model Tracking To Motion Capture

An image such as a depth image of a scene may be received, observed, or captured by a device and a model of a user in the image may be generated. The model may then be adjusted to mimic one or more movements by the user. For example, the model may be a skeletal model having joints and bones that may be adjusted into...

"Automated Collation Creation"

A collation creation process is provided to automatically establish collation support for sorted linguistic data. The sorted linguistic data is examined to determine if it matches an existing collation support. If not. a new collation support is created for the sorted linguistic data. The provider of the sorted ling...

Branded Browser Frame

In at least some embodiments a web browser user interface is designed to enable site branding and functionality. Specifically websites can provide content that can be utilized in a control layout area near the top of the web browser user interface to reinforce branding through the use of color and/or a site provided...

Abstracting Security Policy From, And Transforming To, Native Representations Of Access Check Mechanisms

Abstracting access control policy from access check mechanisms allows for richer expression of policy, using a declarative model with semantics, than what is permitted by the access check mechanisms. Further, abstracting access control policy allows for uniform expression of policy across multiple access check mech...

"Kinetic Energy Utilizing Input Device"

ABSTRACT IS NOT FOLED.

Edge Based Communication

An edge-based gateway (102) is employed to provide communication data routing and filtering via a plurality of communication mechanisms (108 and 110), selected independently of central authority. The communication mechanisms (108 and 110) include POTS, cellular networks and Internet. Each user (112) can constrain th...

Transactionally Consistent Change Tracking For Databases

A change tracking technique is used maintain the consistency of the source data with the destination data during transactional replication. A first functional characteristic is that it is a transactional database replication technique. A second characteristic is that the technique supports an incremental tracking of...

Three Way Validation And Authentication Of Boot Files Transmitted From Server To Client

A method and system of transferring boot files from a server to a client having a pre-installation environment. The server authenticates the client. The client authenticates the server. The boot files are transferred from the authenticated server to the authenticated client the boot files may be authenticated by the...

"Method And System For Transitioning Between Synchronous And Asynchronous Communication Modes"

Many different users may access, revise and update the same shared object simultaneously through several different transports. Clients may communicate asynchronously by accessing the shared object through a physical server. Clients may also communicate synchronously by accessing the shared object through a peer-to-p...

"System And Method For Associating Properties With Objects"

Described is a mechanism for allowing new functionality for an object to be expressed as a property that is not built into the class from which the object derives. More specifically, the mechanism associates properties in one class with another class. A computer-readable medium, that includes an object having a prop...

"Side By Side Shared Calendars"

Methods and systems are provided for presenting a plurality of shared calendars in a single electronic display frame or window where each of the plurality of shared calendars is displayed in a common view mode relative to other displayed shared calendars. Users may select one or more shared calendars to be displayed...

"Architecture And Fengine For Time Line Based Visualization Of Data"

The subject invention provides a unique system and method that facilitates management and navigation of various data objects by making use of a unique time-line based navigation tool. In particular, objects can organized into a plurality of bands based on their respective subject matter. Each band can be created to ...

Protective Shroud For Handheld Device

An apparatus for communicating with a handheld device (e.g., a cellular telephone) is provided herein. A protective shroud is configured to enclose the handheld device and protect it against incidents that commonly cause damage to handheld devices. Integral to the protective shroud is at least one of an input compon...

Rendering Incompatible Content Within A User Interface

An increasing amount of the world s content resides on the web in a form targeted to web browser rendering. It may be advantageous to utilize this web content within non web based rich client applications because such rich client applications may provide robust features and/or interactions that web based platforms l...

Selectively Using Multiple Entropy Models In Adaptive Codingand Decoding

Techniques and tools for selectively using multiple entropy models in adaptive coding and decoding are described herein. For example, for multiple symbols, an audio encoder selects an entropy model from a first model set that includes multiple entropy models. Each of the multiple entropy models includes a model s...

"Systems And Methods For Development Of Emulated Devices In A Virtual Machine Environment"

The present invention provides a means for dynamically adding virtual devices to a virtual computing environment. The system described in the invention includes a virtualized computing system with a manifest, which further includes device lists and an external device directory, which provides users of the virtualize...

Method And System For A Service Consumer To Control Applications That Behave Incorrectly When Requesting Services

A method in a consumer system for determining whether an application is misbehaving, the method comprising: when installing an application , estabishing a limit on  services of a service of a services of a service provider that the application is authorized to use; adn under control a runtime environment, providin...

"Distributing Membership Information For Multi Party Application Layer Sessions"

Membership information for participating computer systems participating in a multi-party conferencing session is distributed by intermittently exchanging link databases with one or more neighbor computer systems. A link database includes one or more link state records, each link state record identifying a participat...

"Service Discovery And Publication"

A system and methods for service discovery and publication are disclosed. Application programs write requests for service discovery, publication, and subscription to a service discovery application programming interface. The service discovery application programming interface invokes one or more lower-level protocol...

Configuration Of User Interfaces

Configuration of user interfaces is described. In an implementation, a method includes receiving a query from a device. The query is for a user interface (UI) from a client. A processing of the request determines whether the execution by the client of the control function is permitted. The processing is performed at...

"Method, System, And Apparatus For Creating An Archive Routine For Protecting Data In A Data Protection System."

A method for creating an archive protection plan for archiving a backup of data is provided. An indication of an archive data protection kind and an archive data protection duration are received. In response to receiving the archive data protection kind and the archive data protection duration, an archive scheme is ...

Automatic Labeling Of A Video Session

Described is labeling a video session with metadata representing a recognized person or object, such as to identify a person corresponding to a recognized face when that face is being shown during the video session. The identification may be made by overlaying text on the video session, e.g., the person"s name and/o...

Exposing Multi Mode Audio Device As A Single Coherent Audio Device

The driving of an audio device that supports two or more audio modes is accomplished by associating a first physical device object of an audio device with a first device identifier, the first physical device object representing a first audio mode enumerated by a bus enumerator; associating a second physical device o...

Web Based Collocation Error Proofing

ABSTRACT WEB-BASED COLLOCATION ERROR PROOFING Collocation errors can be automatically proofed using local and network-based corpora, including the Web. For example, according to one illustrative method, one or more collocations from a text sample are compared with a corpus such as the content of the Web. The colloc...

Formatting Multimedia Programming Information For Electronic Transfer

An exemplary global listings format (GLF) is metadata for electronically transferring multimedia programming content and electronic program guide information.The GLF metadata specifies a self-referential data structure having a self-consistency mechanism comprising interlocking and crosslocking data elements.The sel...

Instant Messaging With Search

Instant messaging with search is described. One or more techniques oflKe described techniques may be employed to provide a search during an instant messaging session, the results of which may then be shared between participants in the instant messaging session.

Branch Office Dns Storage And Resolution

Maintaining DNS records. A computing network system includes a local Domain Name Service (DNS) server connected to one or more local clients or resources at a local branch office in an enterprise network. The local DNS server advertises to the local clients or resources at the local branch office that the DNS server...

"Composting Desktop Window Manager"

A method and system for rendering a desktop on a computer using a composited desktop model operating system are disclosed. A composited desktop window manager, upon receiving content information from application programs, draws the window to a buffer memory for future reference, and takes advantage of advanced graph...

"Methods And Systems For Building Packages That Contain Pre Paginated Documents"

Modular content framework and document format methods and systems are described. The described framework and format define a set of building blocks for composing, packaging, distributing, and rendering document-centered content. These building blocks define a platform-independent framework for document formats that ...

Improving New Word Pronuciation Learning Using A Pronunciation Graph

A method and computer-readable medium convert the text of a word and a user's pronunciation of the word into a phonetic description to be added to a speech recognition lexicon. Initially, a plurality of at least two possible phonetic descriptions are generated. One phonetic description is formed by decoding a speech...

Consultative Call Transfer Using Non Voice Consultation Modes

ABSTRACT CONSULTATIVE CALL TRANSFER USING NON-VOICE CONSULTATION MODES Consultation architecture that allows a call assistant to use modes of consultation with the call recipient other than voice calls or vocal contact. The receptionist can place the incoming call (or message) on hold and send an instant message ...

Binding Content To A Domain

The present invention provides for a digital rights management system with a centralized domain service capable of creating and managing membership criteria for joining a domain in accordance with business rules defined by ac content owner. A domain identification is created that allows a content provider to uniquel...

"Propagating And Responding To Announcements In An Environment Having Pre Established Social Groups"

Strategies are described for propagating and responding to announcements within an environment having pre-established social groups, such as pre-established instant messenger social groups. More specifically, a member within a group can create an announcement, whereupon the announcement becomes associated with the m...

"System And Methods For Providing System Level Notification In A Multimedia Console"

A system for providing system level notifications in a multimedia console has a notification system application native to the multimedia console which subscribes to all notification events generated by the application manager of the multimedia console. Through an application programming interface (API), a game devel...

Intelligent Quarantining For Spam Prevention

The subject invention provides for an intelligent system and method that facilitates a more robust classification system in connection with spam prevention. The invention involves holding back some messages that appear to be questionable, suspicious, or untrustworthy from classification (as spam or good). In particu...

"Network Printer Connection Update Scheme For Printer Clients"

A printer connection administration/maintenance framework is disclosed. The framework is incorporated into a networked client machine. The framework maintains printer connections, in a network comprising printers, a directory comprising an enumeration of network entities and configuration definitions assignable t...

Search Engine Dash Board

A computer system that facilitates presentation of-ata to a user. A search engine component receives and executes queries on behalf of a user. Results of the query are received and analyzed by an analysis component that filters and organizes the results as a function of relevancy of the data to the user and associat...

Transmitting Location Data In Wireless Networks

A wireless access point in a wireless network that may be adapted to transmit data indicating its location. The location data may be embedded in a control message or announcement transmission transmitted by the wireless access point, or other message conventionally used to broadcast network characteristics necessary...

Distributed Routing Of Conferences Using Conference Identifier

Users attempting to join a conference facilitated by an enhanced communication system employing a network communication protocol such as SIP and having a distributed architecture are enabled to request the conference through a numeric conference identifier. The conference directory identifier is assigned to an assoc...

Network Load Balancing With Connection Manipulation

In an exemplary device implementation, a device includes: a connection migrator that is configured to migrate connections away from the device; the connection migrator capable of precipitating a compilation of protocol state for a connection across a protocol stack; the connection migrator adapted to aggregate the c...

System And Method For Sharing Objects Between Computers Over A Network

A method and system to share objects that may reside on different machines. These objects can be accessedd and shared using a computer network such as the Internet. The objects can comprise computer programming objects, that may include but are not limited to, application programming intercfaces (APIs), programmin...

Previewing Search Results For Suggested Refinement Terms And Vertical Searches

An embodiment of the current invention is directed to presenting a preview of search results for a suggested search. A search engine query is received. One or more search results are generated. One or more suggested, search terms are generated. A search engine results page is generated, including the one or more sea...

Combining Virus Checking And Replication Filtration

COMBINING VIRUS CHECKING AND REPLICATION FILTRATION ABSTRACT Data in backup systems can be effectively protected against viruses, even if definitions for certain viruses are found after infected data have been backed up to a backup server. In one implementation, a combined filter that includes antivirus and replic...

Motion Sensing Remote Control

A motion-sensing remote control is described. In an embodiment, a television remote control can include various sensors that sense a motion of the device. The television remote control also includes an integrated circuit that receives a motion signal corresponding to the motion from the sensors and converts the moti...

Framework For Creating Modular Web Applications

A framework for creating modular web pages. The framework enables the development of modular, customized, and personalized web applications including web portals and web page. The framework includes an extensible part base class and an extensible zone base class. Part controls that derive from the part base class in...

Universal Computing Device

The universal input device provides a common user interface for a variety of different computing platforms including printed documents. Using the present system, one may use the universal input device to control various computing devices as well as capture handwritten electronic ink and have the electronic ink be as...

Cross Channel Coauthoring Consistency

A computing device includes a processing unit, and a memory with instructions that, when executed by the processing unit, cause the processing unit to create: a document processing module that processes the creation and editing of document content; and a metadata processing module that generates, monitors and stores...

Augmenting A Call With Context

A method and system for providing context of a caller to a callee when a call is initiated is provided. The context system executing on the calling device collects context for the call. The calling device initiates the call and sends a message to the callee that includes the context. Upon receiving the message, the ...

'Reducing Effects Of Packet Loss In Video Transmissions"

An error correction system determines a level of error correction protection to apply to a frame of video data to be transmitted by a sending endpoint to a receiving endpoint based on the predicted impact of packet loss as well as the importance of the frame based on inter-frame dependencies, frame size, packet loss...

"System And Method For The Presentation Of Items To A User With A Contextual Presentation"

A system and method for presenting a plurality of items to a user with a contextual display. A computer system is provided which includes a data store. At least a portion of the items in the data store include one or more field entries. An explorer interacts with the data store, selects items having one or more desi...

Smart Card Terminal Side Data And Management Framework

ABSTRACT SMART CARD TERMINAL SIDE DATA AND MANAGEMENT FRAMEWORK A data and management framework of a smart card terminal functions to provide interoperability between the smart card terminal and a smart card, and in particular between applications of the terminal and the card. An application program interface (API...

Systems And Methods For Adaptive Handwriting Recognition

The present invention utilizes generic and user-specific of handwriting samples to provide adaptive handwriting recognition with a minimum level of user-specific enrollment data. By allowing generic and user-specific classifiers to facilitate in a recognition process, the features of a specific user"s handwriting ca...

Response For Spurious Timeout

A spurious timeout (STO) response allows a sending device to conservatively adjust congestion state parameters and maintain the packet flow, after detection of the STO. Since occurrence of an STO may be accompanied by data loss, the STO response couples the spurious timeout and the loss event by maintaining a value ...

"Programmability For Binding Data"

An object model allows code to be developed using a programming environment to access the functionality of an application, in a word processing application, for example. The object model may be used to manipulate one or more data bindings in an application. Code may also be developed using a programming environment ...

Skip Macroblock Coding

Various techniques and tools for encoding and decoding (e.g., in a video encoder/decoder) binary information (e.g., skipped macroblock information) are described. In some embodiments, the binary information is arranged in a bit plane, and the bit plane is coded at the picture/frame layer. The encoder and decoder pro...

"Efficient Transformation Of Interchange Format Messages"

In a computerized system, a sending computer system and recipient computer system exchange an interchange format message in a resource-efficient manner. For example, a transformation writer at the sending computer system selects and transforms only one or few of a plurality of units of the message at the time. ...

"System And Method For Transferring Computer Readable Objects Across A Remote Boundary"

A system and method for securely transferring computer-readable objects across a remote boundary is provided. The method decomposes any type of object into a hierarchy of sub-components based on a list of known object types. Each sub-component either corresponds to a known object type or an unknown object type. The ...

"Method And System For Transacted File Operations Over A Network"

A system to perform transacted remote file operations over a network includes a client and a server. The client and server each include a transaction manager (TM) and a file system (FS). The client also includes a redirector (RDR), while the server includes a server application (SRV). The RDR receives a request for ...

Ranking Functions Using An Incrementally Updatable, Modified Naive Bayesian Query Classifier

ABSTRACT OF THE DISCLOSURE RANKING FUNCTIONS USING AN INCREMENTALLY-UPDATABLE. MODIFIED NAIVE BAYESIAN QUERY CLASSIFIER Methods of ranking documents on a network using an incrementally-updatable system are disclosed. Computer readable medium having stored thereon computer-executable instructions for performing a m...

Registering For And Retrieving Database Table Change Information That Can Be Used To Invalidate Cache Entries

A server provides Web responses that can include content from data tables in a database. The server maintains a cache (e.g., in system memory) that can store content (including content from data tables) so as to increase the efficiency of subsequently providing the same content to satisfy client Web requests. The se...

Optical System Design For A Universal Computing Device

The universal input device provides a common user interface for a variety of different computing platforms including printed documents. Using the present system, one may use the universal input device to control various computing devices as well as capture handwritten electronic ink and have the electronic ink be as...

"Sub Component Based Rendering Of Objects Having Spatial Frequency Dominance Parallel To The Striping Direction Of The Display"

Mechanisms for rendering an object on a portion of a display that includes pixel sub-components for each pixel. The pixel sub-components are striped along a certain direction (e.g.. vertically or horizontally). The computing system determines (400) that the object has spatial frequency dominance in a direction wh...

"Method And System For A Service Consumer To Control Applications That Behave Incorrectly When Requesting Service"

An electric boosting system includes a plurality of molybdenum electrode bars for generating electric resistance heat of the molten glass, and a power supply connected to the molybdenum electrode bars to apply thereto a power needed for operation of the molybdenum electrode bars. The molybdenum electrode bars are pr...

"System For Transferring Documents And Resources To A Printer"

A system and process for controlling printing of a print job by a printer. A print request is sent from a client to the printer. The request includes a unique source identifier for the print job; a type of the document or documents that make up the print job; an source address where a plurality of document resources...

Strategies For Queuing Events For Subsequent Processing

In one exemplary implementation, strategies are described which transmit notification information from a first device (e.g., a media server) to a second device (e.g., a remote media device). Based on this notification information, a recipient-user can use the first device to generate an event pertaining to the notif...

"Software Based Audio Rendering"

Software-based audio rendering is described. The software-based audio rendering may also be synchronization to an external clock and/or a video rendering clock in some implementations. A particular implementation includes computer readable media configured to measure a first drift rate between an external clock and ...

Automatic Conversation Techniques

Automatic conversation techniques are described. An apparatus may comprise a computing device having an incoming message module operative to receive an incoming message, a conversation identification module communicatively coupled to the incoming message module, the conversation identification module operative to de...

System And Method For Protecting A Computing Device From Computer Exploits Delivered Over A Networked Environment In A Secured Communication

A network security module, interposed between a computing device and a network such that all network activities between the computing device and the network pass through the network security module, for protecting the computing device from an identified security threat on the network, the network security module com...

Extensible Wireless Framework

An extensible wireless framework for connecting to a wireless network is provided. The extensible wireless framework includes a network roaming service with a registration component and a network service component. The registration component registers extensible service modules and extensible drivers for providing n...

Drm Aspects Of Peer To Peer Digital Content Distribution

ABSTRACT DRM ASPECTS OF PEER-TO-PEER DIGITAL CONTENT DISTRIBUTION Aspects of peer-to-peer distribution of digital content items protected by predetermined intellectual property rights are described. The digital content items are distributed between a source communication device operated by a source entity and a pro...

"Word Processing Document Stored In A Single Xml File That May Be Manipulated By Applications That Understand Xml"

A word processor including a native XML file format is provided. The well formed XML file fully represents the word-processor document, and fully supports 100% of word-processor"s rich formatting. There are no feature losses when saving the word-processor documents as XML. A published XSD file defines all the rules ...

"Routing Hints"

A first exemplary media implementation includes processor-executable instructions that direct a device to perform actions including: creating a session identifier (210) using a host identifier (214); and formulating a host session initiation message with the created session identifier. An exemplary device im...

"Method And System For Synchronizing Multiple User Revisions To A Shared Object"

Many different users may access, revise and update the same shared object simultaneously through several different transports. Revisions to the shared object are automatically synchronized such that all users can view the revisions to the shared object. Conflicting revisions are reconciled and merged into a current ...

"System And Method For Composition Of Mappings Given By Dependencies"

A system that facilitates composition of schema mappings. A general algorithm is provided for composing a broad class of mappings, where one or both mappings are not functions, such as constraints between two schemas and the inverse of functions. A composition component performs composition on schema mappings of dis...

"Unified Model For Authoring And Executing Flow Based And Constraint Based Workflows"

Designing and executing a workflow having flow-based and constraint-based regions. A user selects one or more activities to be part of a constraint-based region. Each constraint-based region has a constraint associated therewith. The workflow is executed by executing the flow-based region and the constraint-based re...

"Method For System For Asymmetric Key Security"

Exemplary embodiments disclosed herein may include a method and system for creating pair-wise security keys, comprising receiving an identity key from a website, generating a master key, creating a pair-wise symmetric key or asymmetric key pair by utilizing an encryption function of the identity key and the master k...

"Creating A Speech Recognition Grammar For Alphanumeric Concepts"

A method and system to generate a grammar adapted for use by a speech recognizer includes receiving a representation of an alphanumeric expression. For instance, the representation can take the form of a regular expression or a mask. The grammar is generated based on the representation.

"Collaboratively Locating Disconnected Clients And Rogue Access Points In A Wireless Networks"

Methods are described for using collaboration of neighboring wireless devices to enable location of disconnected wireless devices and rogue wireless access points. A central server computes the locations of the neighboring clients and uses those locations to estimate the location of a disconnected client. These tech...

"Method And System For Synchronizing Data Between Electronic Devices"

Electronic devices often need to synchronize data themselves. A synchronization engine includes a database that supports the tracking of changed data, filtering, and recovery synchronization. Data changes that occur in the electronic devices are tracked for data synchronization. Data may be filtered by the database ...

Process And System For Identifying A Position In Video Using Content Based Video Timelines

A process and system for processing a video to reliably identify a position in the video. The video position identification process and system use content-based video timeless. These timeless are composed of an ordered sequence of video "fingerprints" or "signatures" of video content that exploit the spatial charact...

Method And Apparatus For Viewing And Managing Collaboration Data From Within The Context Of A Shared Document

Methods, systems, and apparatus are provided for viewing and managing collaboration data from within the context of a shared electronic document. A document editing pane is displayed for editing the shared document. In conjunction with the document editing pane; a collaboration pane is displayed for displaying the c...

"Auxiliary Peripheral For Alerting A Computer Of An Incoming Call"

ABSTRACT AUXILIARY PERIPHERAL FOR ALERTING A COMPUTER OF AN INCOMING CALL An auxiliary call control component is coupled to a computing system alerts the computing system of an incoming call in instances where the computing system is not capable of processing the incoming call. When the auxiliary call control comp...

"Architecture For Distributed Computing System And Automated Design, Deployment, And Management Of Distributed Applications"

A design tool includes a service definition model to enable abstract description of distributed computing systems and distributed applications. The design tool also includes a schema to dictate how functional operations within the service definition model are to be specified. The functional operations include desig...

"Semantic Object Synchronous Understnding For Highly Interactive Interface"

A method and system provide a speech input mode which dynamically reports partial semantic parses, while audio captioning is still in progress. The semantic prases can be evaluated with an outcome immediately reported back to the user. The net effect is that task conventionally performed in the system turn are now c...

Shared Job Scheduling In Electronic Notebook

Architecture that synchronizes a job to shared notebook eliminating the need for user intervention and guaranteeing that only one instance of the notebook client performs the task. A job tracking component creates and maintains tracking information of jobs processed against shared notebook information. A scheduling ...

Using Tables To Learn Trees

Systems and methods are described that facilitate learning a Bayesian network with decision trees via employing a learning algorithm to learn a Bayesian network with complete tables. The learning algorithm can comprise a search algorithm that can reverse edges in the Bayesian network with complete tables in order to...

"Method And System Of Taskbar Button Interfaces"

The present invention provides a system or method for displaying rich presentation taskbar buttons for a corresponding application. In one example, the rich presentation taskbar button may receive content from an application through a programming interface. The present invention further relates to a system and metho...

"System And Method For Updating Installation Components In A Networked Environment"

A system and method for managing the installation of files on a computing device are provided. A client computing device obtains installation information identifying a version of a baseline installation component stored on the client computing device. The installation information also includes an installation compon...

Enabling Web Analytics For Interactive Web Applications

ABSTRACT ENABLING WEB ANALYTICS FOR INTERACTIVE WEB APPLICATIONS |0038| A method is provided for tracking user-interaction with an interactive web application associated with a web page. The method includes providing one or more modified HTML elements for use with the web page. The default behavior of the HTML. el...

"Mobile Device Expansion System"

An expansion device is provided for expanding the functionality of a mobile electronic device while in a mobile mode and/or in a desktop mode. The expansion device may be a media slice that provides multimedia functionality to a mobile electronic device. The media slice may be configured to receive an electro-mechan...

"System And Method For Automatic Negotiation Of A Security Protocol"

A protocol negotiation platform permits a computer or other node lying outside of a security-enabled domain to negotiate a supported security protocol with a server or other node within that domain . Active Directory TM, Kerberos and other secure network technologies permit agent or nodes within a domain to commu...

"Optical System Design For A Universal Computing Device"

The universal input device provides a common user interface for a variety of different computing platforms including printed documents. Using the present system, one may use the universal input device to control various computing devices as well as capture handwritten electronic ink and have the electronic ink be as...

Automatically Instrumenting A Set Of Web Documents

Embodiments of the invention provide a method and system for automatically instrumenting a set of web documents, such as web pages, as well as embedding structures that present advertising content via the web pages. The instrumenting automatically embeds tags that enable usage information associated with the web doc...

"Methods And Systems For Defining Documents With Selectable And/Or Sequenceable Parts"

Modular content framework and document format methods and systems are described. The described framework and format define a set of building blocks for composing, packaging, distributing, and rendering document-centered content. These building blocks define a platform-independent framework for document formats that ...

Targeting Applications With Advertisements

Collecting application execution data by a push service and targeting application programs with advertisements based on the collected data. Statistics such as activity, popularity, and frequency of execution for each of the application programs are generated based on the collected data. The statistics are matched to...

"Lightweight Input/Output Protocol"

A method and system for offloading I/O processing from a first computer to a second computer, using RDMA-capable network interconnects, are disclosed. The method and system include a client on the first computer communicating over an RDMA connection to a server on the second computer by way of a lightweight input/ou...

"Schema Hierarchy For Electronic Messages"

The present invention extends to methods, systems, computer program products, and data structures for efficiently storing and accessing electronic messages. Generally, electronic messages are created and transformed in accordance with an electronic message schema hierarchy (150). Electronic messages can be created a...

Suspension And/Or Throttling Of Processes For Connected Standby

One or more techniques and/or systems are provided for assigning power management classifications to a process transitioning a computing environment into a connected standby state based upon power management classifications assigned to processes and transitioning the computing environment from the connected standby ...

Priority Binding

Priority binding enables a one-to-many mapping of a target to a source without requiring complex code development by the specification of one or more binding statements. During runtime, these bindings are evaluated. The highest priority binding that evaluates successfully is executed, controlling the two-way transfe...

Method And System For Probe Optimization While Instrumenting A Program

A method and system is provided for instrumenting a program by optimizing prode insertion. The number of prode insertions into instrumented code is reduced by providing optimal prode insertion points. The control flow of the code is analyzed along with the arc and block relationships to build a post-dominator tree. ...

Reducing Network Configuration Complexity With Transparent Virtual Private Network

A firewall acts as transparent gateway to a server within a private network by initiating an unsolicited challenge to client to provide authentication credentials. After receiving the client’s credentials, the firewall verifies the authentication credentials and establishes a secure channel for accessing the server....

"Architecture And Run Time Environment For Network Filter Drivers"

Filtering data packets in a manner that promotes efficient flow of data through a communication path. A filter stack includes one or more filter instances that may filter data packets that pass through the filter stack. The filter stack is associated with one or more protocol stacks that function in communication pa...

"A Computer System For Detecting Network Connected Hardware Devices"

A computer-implemented method and system are provided for supporting hardware devices that are connected to the computer via a network. The existence of any hardware device connected on the network is detected in the method. Information descriptive of the connected device is then obtained, either from the device or ...

"System For Storing Session Data To A Specified Data Offset On A Sequential Access Storage Medium"

A system, a method and a program product provide access to variable-length data segments on a sequential access storage medium using an iterative search for a specified data offset based un estimates of media offsets. The data is recorded in variable-length data segments aligned to predetermined alignment intervals...

System And Method For Selecting A View Mode And Setting

A method and apparatus for selecting a view mode from aplurality of view modes and for selecting a setting within the selected view mode for displaying one or more items in a screen display.  A single user input    indicates both a selected view mode and a selected setting within that view mode. The input mechani...

Embedded Licenses For Content

In accordance with one or more aspects, a license for content is retrieved, the license having been previously embedded in the content. A requested action is allowed to be performed with the content only if a standalone license, or both a leaf license and a root license, indicate that the action with the content is ...
A data protection application if provided. The data protection application includes a job for providing protection to data.  That job contains a plurality of tasks configured to perform the job. Also included is a task executor for managing the progress of each of the plurality of tasks.

"Generating 2 D Transitions Using A 3 D Model"

A system and method for generating a 2D transition between a first media object and a second media object. A 3D model is defined corresponding to a desired 2D transition pattern. A graphics processing unit (GPU) or a set of instructions generates a transition between the first media object and the second media objec...

Wireless Support For Portable Media Player Devices

ABSTRACT WIRELESS SUPPORT FOR PORTABLE MEDIA PLAYER DEVICES A portable media player device is capable of operating in a wireless network. The wireless portable media player device can bootstrap and synchronize with an ad hoe network with low power consumption. Neighbor portable media player deuces in an ad hoe net...

"A Framework For Seamlessly Authoring And Editing Workflows At Design And Runtime"

Modifying a componentized workflow model during execution of the workflow. Each step of the workflow is modeled as an activity that has metadata to describe design time aspects, compile time aspects, and runtime aspects of the workflow step. A user selects and arranges the activities to create the workflow via user ...

"Business Inquiries And Operations Using Messaging Service"

The present invention provides a system by which entities interact with one another in a manufacturing channel. The entities (such as a seller and customer) use a messaging system to perform status inquiry and functional processing steps with respect to data stored at the resource management system of the other. ...

"System And Method For Storing And Retrieving Xml Data Encapsulated As An Object In A Database Store"

A system and method are provided for modeling structured, semi-structured, and unstructured data all within a single instance of a user defined type (UDT) within a database store. In particular, the XML data model is extended to fields of a UDT. As a result, the properties of the XML data model — such as document or...

Systems And Methods For Providing Alternate Views When Rendering Audio/Video Content In A Computing System

Systems and methods for transitioning between alternate views when rendering A/V content in a computing system are provided. In various embodiments, a "Now Playing" state is exposed to a user experiencing media on a media device via a user interface, wherein the Now Playing" state has a plurality of associated "Now ...

Adaptive Image Rendering And Use Of Imposter

Images and/or collections of images may be rendered in a way that adapts to ambient circumstances and that may enhance a user s perception of experience quality. When an image is requested for display it is determined whether a rendered version of the image exists. If no rendered version of the image exists then an ...

"Apis To Build Peer To Peer Messaging Applications"

The claimed method and system is an API set to support a multicast programming model for implementation on top of a service oriented framework, specifically a service oriented messaging system.

Network Dna

A derivative network DNA component and a raw network component are included in the network DNA. The raw network DNA component can be acquired from a local source or a remote source. The derivative network DNA component can be produced in accordance with a specification of the derivative network DNA component. The ne...

Dragging And Dropping Objects Between Local And Remote Modules

DRAGGING AND DROPPING OBJECTS BETWEEN LOCAL AND REMOTE MODULES ABSTRACT The present invention extends to métiers, systems, and computer program products for dragging and dropping objects between local and remote modules Terminal server components simulate the functionality of participants in drag and drag operat...

"Runtime Polymorphism"

Runtime polymorphism may be enabled with metadata that is usable for casting objects to casted objects. In an exemplary media implementation, processor-executable instructions cause operations including: discover at least one type of an objectt while in a runtime environment; and create a casted object from the obje...

Loyalty Offer

Loyalty offer techniques are described. In one or more implementations data is received from a plurality of merchants via a network the data describing transactions for goods or services initiated at physical locations of respective said merchants and including identifiers that uniquely identify mobile communication...

Automatically Provisioning A Wwan Device

Network connection information is requested by a wireless wide area network device via the internet. Such information may include configuration information, data roaming partner information, and/or cost information regarding roaming partner connection and/or a subscriber plan related to the wireless wide area networ...

Trusted E Mail Communication In A Multi Tenant Environment

Trusted e mail communication may be provided. A message source organization may be validated. When a message is received from the validated message source organization for a recipient organization a determination may be made as to whether the recipient organization supports an attribution data extension. If so the m...

Efficient Interrupt Message Definition

An efficient interrupt system for a multi-processor computer. Devices interrupt a processor or group of processors using pre-defined message address and data payload communicated with a memory write transaction over a PCI, PCI-X, or PCI Express bus. The devices are configured with messages that each targets a proces...

"Just My Code Debugging"

Systems and methods for Just-My-Code(JMC) debugging are described. In one aspect, debugging probes are automatically inserted into respective programming constructs representing interesting code. The debugging probes are insered during computer computer-program compiling operations that generate native code. The nat...

Reputation Checking Obtained Files

A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file...

Decorating A Display Environment

Disclosed herein are systems and methods for decorating a display environment. In one embodiment, a user may decorate a display environment by making one or more gestures, using voice commands, using a suitable interface device, and/or combinations thereof. A voice command can be detected for user selection of an ar...

Security Authorization Queries

ABSTRACT SECURITY AUTHORIZATION QUERIES In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of negations. In another example implementation, an authorization query table maps respective resource-specific opera...

Digital Cameras With Luminance Correction

Techniques are disclosed to improve quality of images that may be blurred or underexposed (e.g., because of camera shake, taken in dim lighting conditions, or taken of high action scenes). The techniques may be implemented in a digital camera, digital video camera, or a digital camera capable of capturing video. In...

"Network Zones"

A computer assigns networks to network zones based on predefined properties for each zone and/or the properties of the networks. An application program installed on the computer provides the computer with preference information that indicates the network zone whose network policies or properties are best suited for ...

"System And Methods For The Implementation Of A Peer To Peer Rule Based Pull Autonomous Synchronization System"

The present invention relates to a synchronization system that utilizes a synchronization wizard ("PullSync") residing on a first computer device to request and receive (or "pull") data from a second computer device. The first computer device (the "syncer") copies files from shared folders on the second computer dev...

"Protocol For Exchanging Control Data To Mitigate Interference Problems In Wireless Networking"

Described is a protocol by which wireless network communication devices comprising peer nodes (such as a computer system and an access point) cooperatively exchange information about RF interference detected in the network. The protocol administers the exchange of formatted control data corresponding to the detected...

Print Plug In Isolation

Print plug-in isolation is described. In embodiment(s), a print system input can be received at a print system, and the print system input can be redirected from the print system to an isolation module that isolates one or more print plug-ins from the print system. The print system input can be processed at the isol...

Clustered Client Failover

An application instance identifier is employed with various systems and methods in order to provide a requestor with continuous access to a resource when operating in a client clustered environment. A requestor residing on a first client in may attempt to access a resource. The first client sends a request to access...

Role Based User Interface For Limited Display Devices

A role based graphical user interface (UI) is used for receiving user input for entry/editing relating to projects/tasks using a limited display device. Functional components are grouped into logical hubs that may be displayed within the user interface. The groupings of the components are based on a role of a user (...

Establishing Content Navigation Direction Based On Directional User Gestures

Techniques involving the establishment of content navigational pattern direction based on directionally desired or intuitive gestures by users. One representative technique includes receiving user input that is indicative of a direction in which presented content that is arranged by sequence will be advanced. A navi...

Menus With Translucency And Live Preview

A region menu is used to easily access menu items. Generally, the region menu includes a number of regions with associated menus that are located close to an initial mouse position from where the region menu is evoked. Hovering over any of the regions of the region menu displays the menu item that is associated with...

Real Time Spam Look Up System

A system and method of managing unsolicited email sent to an email system over a network. Email messages are received at a message at an inbound mail transfer agent. A determination is made as to whether the email message is suspected to be an unsolicited suspect message. One or more queries for additional informati...

Segmented Media Content Rights Management

Segmented media content rights management is described. In embodiment(s), a media device can receive segments of protected media content from media content streams that each include a different version of the protected media content. A media content file can be generated to include the segments of the protected medi...

Shader Interfaces

Allocation of memory registers for shaders by a processor is described herein. For each shader, registers are allocated based on the shader"s level of complexity. Simpler shader instances are restricted to a smaller number of memory registers. More complex shader instances are allotted more registers. To do so, deve...

Semantic Zoom In A Virtual Three Dimensional Graphical User Interface

A GUI adapted for use with portable electronic devices such as media players (110) is provided in which Interactive objects are arranged in a virtual three-dimensional space (400) (i.e., one represented on a two-dimensional display screen (218)). The user (105) manipulates controls (223) on the player (110) to maneu...

Dynamic Selection Of Sensitivity Of Tilt Functionality

Disclosed is a gaming system having a processing device and a remote input device that is operationally coupled to the processing device. The remote input device may include a motion sensor. The resolution of the motion sensor may be set dynamically from the game software, such that both gross and fine gestures can ...

Real Time Media Based Social Network Notifications

Real time media-based social network notifications (312) are utilized to provide updates of events (400) that occur in a social network (325) in real time. By providing a data feed of events which are monitored in the social network to a real time media system such as a presence-based messaging network (260), users ...

Virtual Touchpad

Embodiments described herein are directed to simultaneously presenting a virtual touchpad and a graphical user interface of an operating system on the same display. A user can interact with the OS using the virtual touchpad, and user touches are read by a touch-screen portion of the display assigned to the touchpad....

Techniques To Manage Communications Between Relay Servers

Techniques to manage communications between relay servers are described. A system may include multiple relay servers each having an enhanced relay control module. The enhanced relay control module may be operative to manage communications between private clients communicating over the first relay server and the seco...

Using Visual Landmarks To Organize Diagrams

The present invention extends to methods, systems, and computer program products for using Visual landmarks to organize diagrams. Embodiments of the invention facilitate using Visual landmarks to organize elements within a diagram. Elements of a diagram can be arranged in accordance with configurable defined propert...

Protected Mode Scheduling Of Operations

The present invention extends to methods, systems, and computer program products for protected mode scheduling of operations. Protected mode (e.g., user mode) scheduling can facilitate the development of programming frameworks that better reflect the requirements of the workloads through the use of workload-specific...

Licensing Protected Content To Application Sets

The present invention extends to methods, systems, and computer program products for licensing protected content to application sets. Embodiments of the invention permit a local machine to increase its participation in authorizing access to protected content. For example, an operating system within an appropriate co...

Declarative Workflow Designer

A workflow designer enables a user to author a workflow by arranging building blocks in a particular order using a combination of a graphical designer and a rules based editor. The building blocks are encapsulated and displayed graphically to the user. The building blocks may correspond to events, conditions or acti...

User Interface For Editing A Value In Place

A user interface element is displayed for in place editing of values within a document. For example in response to selecting a value a user interface is displayed near the value that receives a slide gesture for adjusting the value in place. The user interface may be configured to select one of the discrete parts of...

A Method Of Wirelessly Receiving By A First Device Service Information Regarding At Least One Service Provided By A Second Device

The normal roles of wireless stations and wireless access points in initiating wireless connections may be reversed without changing network interfaces for either the station or access point device. This may allow wireless devices acting as access points, but on which service clients operate, to initiate a connectio...

Pan And Zoom Control

[0045] Technologies are described herein for providing a pan and zoom control in conjunction with a timeline for navigating project schedule data in a project management application. The project management application displays a pan and zoom control in conjunction with a project schedule timeline, with the pan and ...

Multi Column Notebook Interaction

A note taking application displays a notebook with a multi column hierarchical navigation display. Each column has navigation elements that are activated to navigate through one or more notebooks. The user can control the display to expose more or fewer navigation columns.

Providing Topic Based Search Guidance

Methods systems and computer readable media for providing topical search suggestions are provided. Topical search suggestions allow a user to receive search results related to the designated topic or subject matter. The present invention may generate multiple topics based on search input provided by a user. The sear...

Techniques For Managing Annotation Transformations For Context Changes

Techniques for managing annotation transformations are described. An apparatus may include a processor coupled to memory. The memory may store a shared application manager (SAM) module for execution by the processor. The SAM module may comprise a client user interface component operative to generate a shared applica...

State Separation For Application Changes

Application states may be stored and retrieved using policies that define various contexts in which the application is used. The application states may define configurations or uses of the application, including connections to and interactions with other applications. Applications that are virtualized may have state...

Motion Controlled List Scrolling

Motion controlled list scrolling includes outputting to a display device a user interface including a plurality of selectable items and receiving a world space position of a hand of a human subject. Responsive to the position of the hand of the human subject being within a first region the plurality of selectable it...

Communicating Unexpected Collaboration Server Responses On Reconnection

A set of workflows are provided for supporting proper user notifications after an action is taken by the user in conjunction with an asynchronous communication service. Timing and/or type of the notifications or an action to be taken by the service is determined based on one or more of a nature of the user action th...

Techniques For Managing And Viewing Followed Content

Techniques to view and manage followed content are described. A technique may include receiving a selection to follow a content item. A reference to a content item selected for following may be stored for a user. The references for the user may be displayed in a centralized location in a user interface. The display ...

Recovery Of A Computer That Includes Virtual Disks

Described is the backup and/or restore of virtual disks In general, metadata is backed up for restoring a virtual disk. To restore the disk, a physical disk is created, with the virtual disk the created on a partition of the physical disk. Backup and restore is described for nested virtual disks, including for block...

Ambient Correction In Rolling Image Capture System

Embodiments are disclosed that relate to the correction of an image acquired in a rolling image capture system for ambient light. One embodiment provides a device comprising a screen, a rolling image capture system, a local light source, and a controller. The controller is configured to operate the local light sourc...

Auto Generating A Visual Representation

Techniques for auto-generating the target's visual representation may reduce or eliminate the manual input required for the generation of the target's visual representation. For example, a system having a capture device may detect various features of a user in the physical space and make feature selections from a li...

Brokering System For Location Based Tasks

Brokering locations for the completion of tasks. Location information for a plurality of sellers is maintained. Buyers define tasks to be performed at particular task locations at particular times. A brokering system notifies the sellers of the defined tasks, and selects sellers near the task locations to complet...

Automatic Relationship Detection For Reporting On Spreadsheet Data

A system for creating a report in a spreadsheet includes: a central processing unit; and a memory encoding instructions that when executed by the central processing unit cause the central processing unit to create: a data source module programmed to identify tables associated with the spreadsheet; a relationship mod...

Automatic Scoping Of Data Entities

A system for creating a report in a spreadsheet includes a data source module programmed to identify sources of data items associated with the spreadsheet an active module programmed to identify which of the data items are associated with the report that is generated in the spreadsheet and a display module programme...

Identification Of Sharing Level

Technologies are described herein for identifying a sharing level of content items in a content library. The content library includes a first content item having a first sharing configuration and a second content item having a second sharing configuration. The first sharing state associated with the first content it...

Communication Channel Claim Dependent Security Precautions

A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication channel. The security claims are stored, as is a digital signature generated over the set of security claims by an entity...

Adapting Pushed Content Delivery Based On Predictiveness

Correlating user activity and location-based prediction of network access events with the delivery of pushed content to a computing device. Location information for the computing device is received by the computing device. One or more network access events are predicted, or network access characteristics are determi...

Advertising As A Real Time Video Call

The claimed subject matter provides systems and/or methods that effectuate distribution of advertising as real-time video calls. The system can include devices that detect whether or not a mobile device associated with a user is in the vicinity of a retail establishment, ascertains whether or not the proximate mobil...

Inferring User Specific Location Semantics From User Data

Determining semantics for locations based on user data such as user activities and/or user communications. The user data is captured and analyzed to identify keywords including locations. Location data describing the locations is obtained and associated with the user and keywords. The associations represent user con...

"Mechanism Of Distributing Voice Call Using Email Distribution Groups"

The claimed subject matter provides a system and/or a method that facilitates routing an incoming data communication in connection with unified communications. A unified communications component can employ unified communications for a data communication with an email data communication mode, a voice data communicati...

Enabling Immersive Search Engine Home Pages

Systems methods and computer readable storage media for enabling immersive interactive search engine home pages are provided. Upon receiving a request for a search engine home page an image is presented that covers only a portion of the available display. The image includes a portion of a larger image but appears as...

Semantic Trading Floor

Review and filtering of search results is facilitated by providing additional types of results beyond links to existing documents can be provided in addition to or in place of links to existing documents. These additional results can facilitate modifying a search request to filter out unwanted documents. The additio...

Viral Advertisements

The claimed subject matter provides systems and/or methods for propagating viral advertising content to multiple mobile devices without utilizing an intermediary interposing hosting and/or distribution service. The system includes devices that receive viral advertising content on a mobile device, modify the viral ad...

Event Service For Local Client Applications Through Local Server

In server/client architectures the server application and client applications are often developed in different languages and execute in different environments specialized for the different contexts of each application (e.g. low level performant platform specialized and stateless instructions on the server and high l...

Device Linking

Device linking is described. In one or more implementations data is maintained at a network service that describes characteristics of a plurality of devices that are associated with a user account of the network service. A communication is formed to be received by one of the plurality of devices that includes a port...

Early Media And Forking In 3 Pcc

A control server initiates a call to a first device. After creating a connection to the device, the control server reverses the direction of the message flow between the device and the control server such that the device becomes the initiator of the call (the caller) and the control server becomes the device that is...

Learning Student Dnn Via Output Distribution

Systems and methods are provided for generating a DNN classifier by "learning" a "student" DNN model from a larger more accurate "teacher" DNN model. The student DNN may be trained from unlabeled training data by passing the unlabeled training data through the teacher DNN which may be trained from labeled data. In o...

Flow Tracking Of Environmental Substances

An environmental tracking system provides facilities for modeling the processes of an organization that have an impact on the environment. The environmental tracking system allows each process to be modeled by its input substances and its resulting output substances. The environmental tracking system allows links to...

Conversion Operations In Scalable Video Encoding And Decoding

Techniques and tools for conversion operations between modules in a scalable video encoding tool or scalable video decoding tool are described. For example, given reconstructed base layer video in a low resolution format (e.g., 4:2:0 video with 8 bits per sample) an encoding tool and decoding tool adaptively filter ...

Sections Of A Presentation Having User Definable Properties

In general, this disclosure describes techniques that employ user-defined values of properties of sections of an electronic presentation. As described herein, a user may configure a presentation to include a plurality of sections. Each of the sections includes zero or more slides of the electronic slide presentation...

Portable Device Association

A technique that enables a portable device to be automatically associated with a plurality of computers. Information that a computer can use to authenticate a portable device and establish a trusted relationship prior to creating an association with the portable device is created and stored in a data store that is a...

Application Display On A Locked Device

A user request to display an application while the device is locked is received. In response to this user request, one or more images generated by the application are obtained and displayed while the device is locked. Additionally, an indication of an application to be displayed upon resuming operation from a power-...

Real Time Document Presentation Data Synchronization Through Generic Service

A generic means for synchronizing information about a user s view of a document or other content within an application across native client and web applications is provided. Attendees of an online broadcast are enabled to see what the presenter is seeing within their own application. In addition meeting specific inf...

Cross Store Electronic Discovery

An electronic discovery (eDiscovery) application is used in managing an electronic discovery process across different electronic data sources using a central interface. The eDiscovery application assists in managing: authentication support for the different data sources; accessing the different data sources; placing...

Routing Query Results

Systems and method for routing search query results in a networked computing environment. An initial search query is reformulated into at least one sub query in accordance with one or more configurable rules. The sub query is sent to at least one information system or source and any potential hits associated with th...

Adjusting Content To Avoid Occlusion By A Virtual Input Panel

The display of a content area is automatically adjusted such that the display of a virtual input panel (e.g. virtual keyboard gesture area handwriting area ) does not occlude content with which the user is interacting. After adjusting the display of the content area the content being interacted with is visible withi...

Spam Reduction In Real Time Communications By Human Interaction Proof

The claimed subject matter provides a system and/or a method that facilitates authenticating a data communication. An interface component can receive data related to a real time data communication between two or more clients. A verification component can employ a human interaction proof (HIP) to a client participati...

Using Flash Storage Device To Prevent Unauthorized Use Of Software

A flash storage device and a method for using the flash storage device to prevent unauthorized use of a software application are provided. An identifier may be encoded within specific sectors of the flash storage device. One bits of the identifier may be encoded as unusable ones of the specific sectors and zero bits...

Internal Scroll Activation And Cursor Adornment

INTERNAL SCROLL ACTIVATION AND CURSOR ADORNMENT Mechanisms for allowing a user to scroll through a displayed viewer. Upon detected using input while the viewer is being displayed, the user input is identified is being a scrolling gesture. In response, a scrolling control is activated at an interior portion of the...

Techniques For Resource Location And Migration Across Data Centers

An exemplary system includes a front-end component, one or more distributed computation and storage (DCS) components, and a location services component. The front-end component is configured to receive requests for resources in a data center, associate each request with identifying information, locate resources for ...

Adaptively Selecting Electronic Message Scanning Rules

The present invention extends to methods systems and computer program products for adaptively selecting electronic message scanning rules. Embodiments of the invention relate to dynamically (and potentially unpredictably) varying the depth/thoroughness of classifying electronic messages to protect against undesirabl...

Speech To Text Transcription For Personal Communication Devices

A speech-to-text transcription system for a personal communication device (PCD) is housed in a communications server that is communicatively coupled to one or more PCDs. A user of the PCD, dictates an e-mail, for example, into the PCD. The PCD converts the user"s voice into a speech signal that is transmitted to the...

Pivotable Events Timeline

A pivotable events timeline is described. In embodiment(s), a pivotable events timeline can include event indicators of events associated with television media content. The event indicators can be displayed to indicate a sequence of the events along the pivotable events timeline. An event on the pivotable events tim...

Enabling Service Features Within Productivity Applications

Systems methods and software are described herein for enhancing features within program applications. In an implementation a user associated with a productivity application is identified and a service application associated with the user is identified. A service feature that corresponds to the service is enabled wit...

Automatic Accompaniment For Vocal Melodies

A method for generating an accompaniment for a recorded audio melody includes providing a recorded audio melody that includes segments; performing a frequency analysis of the recorded audio melody; summing the total duration of each fundamental frequency within a segment of the melody; based on the summing, computin...

Crisscross Cancellation Protocol

Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A sends message 3 towards Node B and, shortly thereafter, Node B sends message X to Node A, Node A would like to know whether or not message X reflects Node B"s s...

Accessing Device Hosted Services From Scripting And Other Programming Environments

An arrangement for exposing self-describing device-hosted services on a client device to a host application or processes over MTP (Media Transfer Protocol) is provided by which an MTP extension comprising new MTP commands enables the device-hosted services to be backwards and forward compatible with existing MTP imp...

Animating Objects Using A Declarative Animation Scheme

Technologies are described herein for animating objects through the use of animation schemes. An animation scheme is defined using a declarative language that includes instructions defining the animations and/or visual effects to be applied to one or more objects and how the animations or visual effects should be ap...

Software Deployment In Large Scale Networked Systems

Software deployment to server nodes within large-scale networked systems is provided using image-based deployment. A mostly immutable image is provided at a central service and transferred from the central service to the server nodes. The image includes a base image, which is immutable, and a delta image, which is w...

Client Application File Access

One or more techniques and/or systems are disclosed for providing a client application with access to a file based upon a local offline version of the file and/or web online version of the file. That is a file may be shared/synchronized from a remote source such as a web storage service. A web online version of the ...

Syndicated Advertising And Commerce Through Widgets

SYNDICATED ADVERTISING AND COMMERCE THROUGH WIDGETS An Internet host user posts, or embeds an advertising link, or widget into an interactive program located on a website. The advertising link is viewed by other users who visit the website and participate in the interactive program. A backend infrastructure provi...

Automatic Tag Generation Based On Image Content

Automatic extraction of data from and tagging of a photo (or video) having an image of identifiable objects is provided. A combination of image recognition and extracted metadata including geographical and date/time information is used to find and recognize objects in a photo or video. Upon finding a matching identi...

"Audio Pattern Matching For Device Activation"

A system and method are disclosed for activating an electric device from a standby power mode to a full power mode. The system may include one or more microphones for monitoring audio signals in the vicinity of the electric device and a standby power activation unit including a low power microprocessor and a non vol...

System And Methods For Communication Between Instant Message Users And Short Message Service Users

A routing system receives an instant message (I M) from a user via an I M service. The I M contains a source address associated with the I M user and a destination address associated with a contact in the I M user's "buddy" list. A temporary mobile device number is allocated to the I M user. The I M is converted to ...

Asynchronous Queued Messaging For Web Applications

Various embodiments enable local web applications to communicate asynchronously with web based services and applications based on a local device's current state and a user's communications preferences. In at least some embodiments, a synchronization engine receives a message in a "Web Inbox" from a web based service...

Multi Level Event Computing Model

ABSTRACT MULTI-LEVEL EVENT COMPUTING MODEL High-order events may be generated and consumed in a cascading computing model. Low level information, such as changes in physical sensor readings, may be communicated to an application in the form of event messages that are generated by an operating system service. In one...

Automatically Finding Contextually Related Items Of A Task

ABSTRACT AUTOMATICALLY FINDING CONTEXTUALLY RELATED ITEMS OF A TASK Architecture for enabling a user to automatically recover documents and other information associated with work contexts and recover documents and other information artifacts associated with a specific project. The architecture enables monitoring ...

User Selectable Environments For Mobile Communications Devices

At a mobile communications device, a communication is received from a communication source. An indication of an environment type associated with the communication source is obtained, and a check is made as to whether the indication of the environment type associated with the communication source matches a current en...

Identification Of Semantic Relationships Within Reported Speech

Methods and computer-readable media for associating words or groups of words distilled from content, such as reported speech or an attitude report, of a document to form semantic relationships collectively used to generate a semantic representation of the content are provided. Semantic representations may include el...

Message Queue Management

Various embodiments provide message queue management techniques designed to reduce the likelihood of multi component applications becoming nonresponsive and enable recovery options for individual components if they do become nonresponsive. In at least some embodiments a message queue manager detects when a component...

Drag Able Tabs

Various embodiments enable a tab within a web browser user interface to be dragged out of an associated tab band in which it appears. When dragged outside of the tab band content can be rendered within a window associated with the tab. This permits side by side viewing of content in the primary web browser user inte...

Visualizing Video Within Existing Still Images

Video from a video camera can be integrated into a still image with which it shares common elements to provide greater context and understandability. Pre processing can derive transformation parameters for transforming and aligning the video to be integrated into the still image in a visually fluid manner. The trans...

Computing System With Visual Clipboard

ABSTRACT COMPUTING SYSTEM WITH VISUAL CLIPBOARD A visual clipboard system and method are provided, in which drag-and-release operations are employed to move copies of a displayed object onto and off of a predefined clipboard area. When a copy of a displayed object is placed on the predefined clipboard area, the dis...

Message Communication Of Sensor And Other Data

ABSTRACT MESSAGE COMMUNICATION OF SENSOR AND OTHER DATA A service may be provided that reads sensors, and that communicates information based on the sensor readings to applications. In one example, an operating system provides a sensor interface that allows programs that run on a machine to read the values of senso...

Camera Based Scanning

Embodiments of camera-based scanning are described. In various embodiments, scanned documents can be created using images captured by a camera associated with a device. An image captured by the camera is processed to identify portions within the image that correspond to rectangular objects such as pap...

See Through Display Optic Structure

An optical structure useful in a see through head mounted display apparatus allows is provided. A first and a second partially reflective and transmissive elements are configured to receive the output of any number of optical sources via an optical element. Each reflective and transmissive element is positioned alon...

Gaze Tracking Through Eyewear

A method (74) to furnish input representing gaze direction in a computer system operatively coupled to a vision system. In this method a first image of an eye at a first level of illumination is acquired by a camera of the vision system (78). The first image is obtained from the camera and a second image of the eye ...

Display Of Shadows Via See Through Display

Various embodiments are disclosed that relate to the presentation of images of shadows cast over a real world background by images of objects displayed on a see through display. For example one disclosed embodiment provides a method of operating a display device having a see through display screen The method compris...

Offload Reads And Writes

Aspects of the subject matter described herein relate to offload reads and writes. In aspects a requestor that seeks to transfer data sends a request for a representation of the data. In response the requestor receives one or more tokens that represent the data. The requestor may then provide one or more of these to...

Working Set Swapping Using A Sequentially Ordered Swap File

Techniques described enable efficient swapping of memory pages to and from a working set of pages for a process through the use of large writes and reads of pages to and from sequentially ordered locations in secondary storage. When writing pages from a working set of a process into secondary storage the pages may b...

Autonomous Network Streaming

Embodiments are directed to dynamically delivering virtual software applications and to allocating application data between local and network data stores. In one scenario a computer system establishes a data input/output (I/O) filter configured to intercept data file requests being sent from a virtual software appli...

Application Driven Cdn Pre Caching

Techniques are provided for the caching of content prior to the content being requested. A request for desired content may be received from a client application at a caching server. The request may also indicate additional content related to the desired content that may be subsequently requested by the client applic...

Directory Leasing

Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease which allows the client to cache the directory metadata locally and service requests received from the same application which originally requested the director...

Integrating Enterprise Identity Authorization In Conferences

Evaluating Effectiveness Of Memory Management Techniques Selectively Using Mitigations To Reduce Errors

Web Page Behavior Enhancement Controls

A web page behavior enhancement (WPBE) control element is provided on a rendered web page enabling a user to perform actions on at least a portion of the web page content such as customizing editing sharing analyzing exporting and/or annotating the content. The processed content may be presented on the original web ...

Memory Management Techniques Selectively Using Mitigations To Reduce Errors

Suggesting Things To Do During Time Slots In A Schedule

Synchronization Of Web Service Endpoints In A Multi Master Synchronization Environment

A Web service synchronization protocol is provided that sets forth the metadata and messaging by which endpoints roam, share and synchronize common information with one another in a multi-master networked computing ecosystem. A general SOAP-based protocol is defined for synchronizing data between two endpoints where...

Rendering Three Dimensional Objects On A Server Computer

Technologies are described herein for rendering documents containing three-dimensional objects. A client computer receives a request to display a document. If a program utilized to create the document is not available to display the document, the client computer transmits a request to a server computer to render the...

Coreference Resolution In An Ambiguity Sensitive Natural Language Processing System

Technologies are described herein for coreference resolution in an ambiguity-sensitive natural language processing system. Techniques for integrating reference resolution functionality into a natural language processing system can processes documents to be indexed within an information search and retrieval system. A...

Unified Messaging State Machine

A unified messaging (UM) application benefits from platform independence and human intelligibility of extended Markup Language (XML). A finite state machine (FSM) of the UM application is created utilizing an XML feature to create a valid menu state based upon a UM software component. For a UM software component tha...

Securely Rendering Online Ads In A Host Page

One or more techniques and/or systems are disclosed for rendering online ads on a webpage. A first inter frame communication channel is created which comprises a first communication channel between a first cross domain frame and a host page such as the webpage. The first cross domain frame comprises content from a d...

Multiple Parallel User Experiences Provided By A Single Set Of Internet Hosting Machines

Fine Grained Client Side Control Of Scalable Media Delivery

Dynamically Transforming Data To The Context Of An Intended Recipient

ABSTRACT DYNAMICALLY TRANSFORMING DATA TO THE CONTEXT OF AN INTENDED RECIPIENT [0061] A sender can create a message for transmission to an intended recipient. During creation of the message, the sender may insert data into the message that is expressed with reference to the context of the sender. When the sender ...

Nested File System Support

Aggregation Of Write Traffic To A Data Store

Human Tracking System

An image such as a depth image of a scene may be received, observed, or captured by a device. A grid of voxels may then be generated based on the depth image such that the depth image may be downsampled. A background included in the grid of voxels may also be removed to isolate one or more voxels associated with a f...

Creation And Deployment Of Distributed, Extensible Applications

Creating a distributed application includes selecting a group of components from a list of components available on a remote server cluster. Data required to install the selected components is received from the remote server cluster. A list of instructions is created in response to the received data. The list of inst...

Multi Modal Approach To Search Query Input

Search queries containing multiple modes of query input are used to identify responsive results. The search queries can be composed of combinations of keyword or text input image input video input audio input or other modes of input. The multiple modes of query input can be present in an initial search request or an...

Displaying Battery Life Resulting From Setting Changes

An indication of a remaining battery life currently available based on a current resource setting for a resource of a computing device is displayed. A user input to change the resource to a new resource setting is received and in response to the user input an indication of the remaining battery life currently availa...

Mobile Telephone Hosted Meeting Controls

Technologies are described herein for controlling components associated with a room using a mobile phone. A gateway is configured to receive a command from a mobile phone. Upon receiving the command the gateway determines whether the command is a room command or a presentation command. If the command is a room comma...

Secure Storage Of Temporary Secrets

Temporarily sensitive information can be stored in the non-volatile storage of a TPM, from which it can be securely, and irretrievably, deleted. Additionally, information stored in a TPM can secure information stored on communication ally dis connectable storage media such that, when communication ally disconnected,...

Transparent Display Configuration Modes

Embodiments of transparent display configuration modes are described. A portable device includes a handheld base movably coupled to a display device that is configurable to open and close over the handheld base. The display device displays an image and the display device includes a first display surface through whic...

Active Lookup Via Mobile Device

A system and methodology that enables a mobile device user to privately retrieve information while engaged in an active communication session is provided. The innovation enables a user to prompt lookup and retrieval of information (e.g., calendar appointments, contact information, task information) without interrupt...

Multiple Orientation Battery Connector

A connector is provided for electrically coupling a battery with a battery-powered device. The connector includes a first dual-contact assembly and a second dual-contact assembly. Each dual-contact assembly includes a positive contact for contacting a positive PP3 terminal of a PP3 battery, and a negative contact fo...

User Authentication Management

End users of a multi-factor authentication service can utilize an account management service, and third-party website can register to utilize the multi-factor authentication service. Registering a third-party website can comprise the multi-factor authentication service receiving a valid digital identity certificate ...

Dynamic Fragmentation Of Digital Media

Media fragmentation may be provided. First, a request for a manifest may be received from a cl ient. Then, in response to the received request for the manifest, the manifest may be sent to the client. Next, a request may be received from the client for a file fragment. The request may indicate a start time and an en...

Formula Detection Engine

A formula detection engine and associated method. The formula detection engine locates formulas within a fixed format document portion by identifying formula seeds. The formula detection engine creates and expands a boundary around the formula seed to define a formula area. To eliminate overlap with surrounding norm...

People Presence Detection In A Multidocument Knowledge Base

User presence is detected in a notebook that includes multiple different documents. The user identity and location within the notebook can be displayed to other users to facilitate collaboration.

Opportunistic Page Largification

Page tables in the last level of a hierarchical page table system are scanned Tor candidate page tables. Candidate page tables are converted to large pages, having a page table entry in a level before the last level of the hierarchical page table system adjusted to be associated with the newly created large page. Up...

Virtualized Storage Assignment Method

ABSTRACT VIRTUALIZED STORAGE ASSIGNMENT METHOD Various aspects are disclosed for building a device driver stack in a virtual machine partition that does not physically control the device represented by the stack. In an embodiment, a secondary interface and driver for an I/O device may be instantiated. Information f...

Atomic Multiple Modification Of Data In A Distributed Storage System

Atomic multiple modifications of streams is provided. Streams are selected for the application of an atomic multiple modification. A lock is acquired on the meta-data associated with the streams. Each stream is de-coupled from its name. Multiple modifications are applied to the selected streams. After performing the...

Location Integration In Software Defined Radio

A computing device having a software defined radio (SDR) wireless network interface is automatically configured to support a wireless service in response to a request from the user to access the service. The computing device may determine the appropriate profile and obtain it by querying a remote database. The query...

Reduced Dc Gain Mismatch And Dc Leakage In Overlap Transform Processing

ABSTRACT REDUCED DC GAIN MISMATCH AND DC LEAKAGE IN OVERLAP TRANSFORM PROCESSING In certain embodiments, overlap operators are applied during encoding and/or decoding of digital media, where the overlap operators have reduced DC gain mismatch and/or DC leakage between interior overlap operators and overlap operat...

External Encryption And Recovery Management With Hardware Encrypted Storage Devices

ABSTRACT EXTERNAL ENCRYPTION AND RECOVERY MANAGEMENT WITH HARDWARE ENCRYPTED STORAGE DEVICES Hardware encrypting storage devices can provide for hardware encryption of data being written to the storage media of such storage devices, and hardware decryption of data being read from that storage media. To utilize exi...

Interactive Design Environments To Visually Model, Debug And Execute Resource Oriented Programs

ABSTRACT INTERACTIVE DESIGN ENVIRONMENTS TO VISUALLY MODEL, DEBUG AND EXECUTE RESOURCE ORIENTED PROGRAMS In scenarios involving a data set accessible through a protocol, operations sets may be formulated for performing various operations on the data set, and may be expressed as resource scripts according to a scri...

Stateful Applications Operating In A Stateless Cloud Computing Environment

A cloud computing environment may use a virtualization layer within a stateless cloud computing process to capture store and retrieve state information generated by a stateful application executing within the process. The virtualization layer may monitor various state storage systems to identify changes to stateful ...

Transaction Processing For Side Effecting Actions In Transactional Memory

ABSTRACT TRANSACTION PROCESSING FOR SIDE-EFFECTING ACTIONS IN TRANSACTIONAL MEMORY A processing system includes a transactional memory, first and second resource managers, and a transaction manager for a concurrent program having a thread including an atomic transaction having a side-effecting action. The first...

Spreadsheet Workbook Part Libraries

Disclosed are systems and methods that enable a workbook author to break a workbook out into a set of logically separate pieces, referred to herein as "workbook parts." Calculation dependencies between the workbook parts may be maintained, so that all the calculations are correct across the entire spreadsheet. An or...

Synchronizing Online Document Edits

Online documents services are provided by application servers for editing by users. Documents are stored in component based structures in an application server s local memory to provide granularity in coauthoring and conflict resolution. Component level locking is utilized to minimize simultaneous user edit based co...

Location Based Service Middleware

A middleware system is provided that is situated between the user applications and the various content databases that are to be searched in order to simplify the creation of user applications for mobile devices that use location-based services that employ ontology-based search systems. The middleware system exposes ...

Tracking Data Usage Under A Schematized Data Plan

Embodiments provide a schema for representing data usage plans and data usage statistics. The data usage plan describes threshold values associated with network connections of computing devices of the user. A web service dynamically generates data usage statistics for the computing devices to represent data consumed...

Pre Fetching Content Items Based On Social Distance

Retrieving content items based on a social distance between a user and content providers. The social distance is determined based on, for example, user interaction with the content providers. The content providers are ranked, for the user, based on the determined social distance. Prior to a request from the user, th...

Contextual Solicitation In A Starter Application

A reduced capability subset of an application referred to as a "starter application" is provided on a computer device prior to purchase and intended for use by a user purchasing the computer device. The starter application may monitor input from the user when the starter application is executing to ascertain opportu...

Maintaining Privacy Of User Data

Methods, systems, and computer-readable media for facilitating personalization of web content is provided, while protecting privacy of the user data utilized to personalize user's experience. A privacy vault may collect user data including user activity data, demographic data, and user interests submitted by user. I...

Quality Of Service (Qos) Based System, Networks, And Advisors

Techniques and technologies for routing communications based on Quality of Service (QOS) related information. More particularly, this document discloses techniques and technologies for selecting communications paths which partially overlap other communication paths for which QOS related information has been measured...

Inherited Product Activation For Virtual Machines

Methods and systems are disclosed in which inherited activation opens a secure communication path from the host operating system (OS) to the guest (virtual machine) OS. The license state of the software on the host is passed through this channel and software installed in the guest uses this information to inform its...

Trusted And Confidential Remote Tpm Initialization

ABSTRACT TRUSTED AND CONFIDENTIAL REMOTE TPM INITIALIZATION Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.

Installation Engine And Package Format For Parallelizable Reliable Installations

In one embodiment an application updater may cleanly update a computer application without causing a fault or a reboot of either the system or the process. A processor may execute a predecessor version of a computer application. The processor may install a successor version of the computer application on a user acco...

System And Method For Blended Presentation Of Locally And Remotely Stored Electronic Messages

An electronic messaging client caches copies of a subset of electronic messages available in a remote store in a local store of a user device. When the user device is in an online state the client provides for the blended presentation of electronic messages such that a user can concurrently view information about th...

Intelligent Editing Of Relational Models

In one embodiment, receives a user gesture indicating an edit to be performed on a target object within a model. The model is based on an underlying schema including constraints that define relationships between objects in the model, including the target object. The computer system determines that at least one of th...

Multi Touch Manipulation Of Application Objects

The manipulation system described herein provides a common platform and application-programming interface (API) for applications to communicate with various multi-touch hardware devices, and facilitates the interpretation of multi-touch input as one or more manipulations. Manipulations map more directly to user inte...

Add On Performance Advisor

Various embodiments provide an add on advisor that is designed to assist users in managing add ons for a browser and/or other application programs. In at least some embodiments the add on advisor can be implemented to detect newly installed add ons and provide notifications to a user of the detected add ons. The not...

Two Pass Hash Extraction Of Text Strings

Data compression and key word recognition may be provided. A first pass may walk a text string, generate terms, and calculate a hash value for each generated term. For each hash value, a hash bucket may be created where an associated occurrence count may be maintained. The hash buckets may be sorted by occurrence co...

Key Certification In One Round Trip

Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client that requests the certificate. The client creates a certificate request, and then has the TPM create an attestation identit...

Multi Touch Object Inertia Simulation

The inertia system provides a common platform and application-programming interface (APr) for applications to extend the input received from various multi-touch hardware devices to simulate real-world behavior of application objects. To move naturally, application objects should exhibit physical characteristics such...

Roaming Of Note Taking Application Features

Methods are disclosed for managing configuration variables and settings within a note taking application such that application features are adjusted globally across an entire note taking application regardless of the particular device from which application content is accessed. The configuration variables and settin...

Network Location Determination For Direct Access Networks

A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall and connected indirectly through an access device. The client computer is configured to attempt communication with a device on the network. Based on the response, t...

Multi Os (Operating System) Boot On A Mobile Device

A system that facilitates different levels of operating system (OS) boot so as to provide users with rapid access to certain mobile device functionalities, security, applications, etc. is provided. An OS can be loaded in phases or stages commensurate with policies, preferences, actions, context, etc. Similarly, a pa...

Declarative Model Interpretation

Embodiments described herein are directed to the constructing software applications based on data models and automatically reconfiguring runtime object graphs according to data model edits input by a user. In one embodiment, a computer system performs a method for constructing at least a portion of a software applic...

Partition Management In A Partitioned, Scalable, And Available Structured Storage

Partition management for a scalable, structured storage system is provided. The storage system provides storage represented by one or more tables, each of which includes rows that represent data entities. A table is partitioned into a number of partitions, each partition including a contiguous range of rows. The par...

Target Display For Gamma Calibration

User interfaces are provided that allow for the display of a target element that may be used to adjust a gamma value of a display device. The target element includes three layers. A bottom static layer is alternating light and dark lines, which in one instance may be black and white lines of equal height. A gray sta...

Child Window Surfacing And Management

Tabs or other display elements that do not comply with traditional "window" requirements can be individually presented to a user when the window containing such tabs or other display elements is hidden or obscured. The user can be enabled to perform tab-specific actions, such as closing a particular tab, or viewing ...

Multiple Access Level Lock Screen

A multiple access level lock screen system allows different levels of functionality to be accessed on a computing device. For example when a device is in a locked state a user can select (e.g. by making one or more gestures on a touchscreen) a full access lock screen pane and provide input that causes device to be f...

Employing Overlays For Securing Connections Across Networks

Computerized methods, systems, and computer-storage media for establishing and managing a virtual network overlay ("overlay") are provided. The overlay spans between a data center and a private enterprise network and includes endpoints, of a service application, that reside in each location. The service-application ...

Ip Security Certificate Exchange Based On Certificate Attributes

Architecture that provides Internet Protocol security (IPsec) certificate exchange based on certificate attributes. An IPsec endpoint can validate the security context of another IPsec endpoint certificate by referencing certificate attributes. By facilitating IPsec certificate exchange using certificate attributes ...

Presenting Actions And Providers Associated With Entities

Computer readable media computer systems and computing devices method of facilitating presentation of actions and providers associated with entities. The method includes determining a query intent of a received query. Entity sets having an entity that matches the determined query intent are recognized. Each entity s...

Synchronising Views During Real Time Spreadsheet Collaboration

Techniques for performing a process during a real time collaboration by multiple users or clients on a spreadsheet file are disclosed herein which may permit calculations to be performed locally by at least one of the clients. By doing so, increases in performance are realized since only data updates need to be prov...

Pre Send Evaluation Of E Mail Communications

A system for identifying attributes associated with content of an e-mail message and alerting a user includes a client device programmed to allow a user to create an e-mail message including at least one recipient and a message content, a server programmed to check an attribute of the e-mail message, and to send the...

Real Time Personalized Recommendation Of Location Related Entities

A location related entity ranking technique is described that allows a user see the ranking of location related entities near a desired location in response to a query. The technique can leverage the searches performed by a community of mobile device users at a given location and at a given time to infer the locatio...

Room Based Computing Environments

Concepts and technologies for creating and accessing room based computing environments are disclosed. Resources are categorized and/or bundled into categories or bundles of resources. Resources are associated with the room based computing environment and various data relating to the resources is stored including dat...

Personalizable Cards Shared Via A Computerized Card Service

PERSONALIZABLE CARDS SHARED VIA A COMPUTERIZED CARD SERVICE Systems and methods for sharing personalizable cards via a computerized card service are provided. One disclosed method includes, at a card client program executable on a computing device, creating a personalizable card having extensible data, and sendin...

Model Based Composite Application Platform

Embodiments provide an architecture to enable composite, autonomous composite applications and services to be built and deployed. In addition, an infrastructure is provided to enable communication between and amongst distributed applications and services. In one or more embodiments, an example architecture includes ...

Cognitive Error Control Coding For Channels With Memory

Techniques for adapting error control codes (ECCs) based on memory conditions in a channel. A wireless communication system may be adapted to detect and quantify memory in a channel, such as memory resulting from multipath fading, and adjust an ECC to reduce the possibility of errors impacting communication in the c...

Collaborative Authoring

A collaborative authoring application provides an authoring environment in which two or more users can edit a document concurrently. Each user edits a copy of the document, sends updates to a master copy of the document, and receives updates from the master copy of the document. The authoring environment generally i...

Statisical Counting For Memory Hierarchy Optimization

Systems and methods that optimize memory allocation in hierarchical and/or distributed iata storage. A memory management component facilitates a compact manner of dentifying approximately how often the memory chunk is being used, to promote efficient )peration of the system as a whole. Each memory location can be ch...

Distributed Messaging System With Configurable Assurances

The present invention extends to methods, systems, and computer program products for configuring assurances within distributed messaging systems. A defined set of message log and cursor components are configurably activatable and deactivatable to compose a variety of different capture assurances, transfer assurances...

Adaptive Filtering For Image Transform Processes

Adaptive filtering techniques are set forth that improve video playback performance. A color similarity metric is computed for source pixels undergoing an image transform operation to determine color values of a target pixel location. The value of the color similarity metric defines what algorithm is used to determi...

Profiling System For Online Marketplace

A profiling system provides customized, relevant, and targeted experience to customers of its clients throughout various touch points in an online marketplace. The profiling system utilizes gathered data on customers such as online marketplace behavior, subscriber information, usage, and the like to determine releva...

Transferring Multiple Communication Modalities During A Conversation

A conversation may be established using any supported type of communication modalities, including voice, video, desktop sharing, IM, application sharing , and the like. During the conversation, a user may transfer all or part of the modalities of the conversation at the same time to one or more destinations. The tra...

Flexible Size And Orientation Battery System

A battery receptacle system is provided to accept various types or sizes of batteries in different orientations. The battery receptacle system includes a first radial notch for positioning a first positive terminal of a first battery to electrically connect with the first positive contact at a first position, and a ...

Infrared Vision With Liquid Crystal Display Device

Various embodiments related to infrared vision for a liquid crystal display (LCD) device are disclosed herein. For example, one disclosed embodiment provides a display system, comprising an LCD device and a display backlight configured to illuminate the LCD device by directing visible light toward an interior surfac...

Managing Virtual Hard Drives As Blobs

Cloud computing platforms having computer-readable media that perform methods to manage virtual hard drives as blobs are provided. The cloud computing platform includes fabric computers and blob stores. The fabric computers execute virtual machines that implement one or more applications that access virtual hard dri...

Multimodal Telephone Calls

A method for establishing a multimodal telephone call is provided. On a first computing device a telephone call is received from a second computing device. On the first computing device a response is sent to the second computing device that a telephony session is established between the first computing device and th...

Codeless Sharing Of Spreadsheet Objects

A user interface that when selected triggers the automatic sharing of a spreadsheet object in a spreadsheet with a chosen network service (e.g. social network blog or some other network location). For example cells tables charts and other objects of the spreadsheet may be selected to be shared using the user interfa...

Policy Enforcement For Multi Radio Transmission And Reception

A process for controlling radio transmission and/or reception (2) to enforce certain constraints (4) with either single or multiple radio communication is disclosed. In one embodiment, the enforcement control may be by the corporate administrator (such as an Information Technology (IT) department) (9) that is respon...

Context Based Search Query Formation

Searching is assisted by recognizing a selection of text from a document as an indication that a user wishes to initiate a search based on the selected text. The user is provided with query suggestions based on the selected text and the query suggestions are ranked based on a context provided by the document. The us...

Controlling Resource Access Based On Resource Properties

Described is a technology by which access to a resource is determined by evaluating a resource label of the resource against a user claim of an access request, according to policy decoupled from the resource. The resource may be a file, and the resource label may be obtained by classifying the file into classificati...

Common Configuration Application Programming Interface

A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity. The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising s...

Lte Antenna Pair For Mimo/Diversity Operation In The Lte/Gsm Bands

There is disclosed a multiple  input multiple  output (MIMO) antenna system comprising first and second folded or compacted loop antennas (12 121). The antennas each have a longitudinal extent and are mounted substantially parallel to each other on a dielectric substrate (3) having a conductive groundplane (31 32). ...

System And Method For Using Packed Compressed Buffers For Improved Client Server Communications

A method of batching multiple sets of responses on a server and sending the responses to a client in a single batch (i.e., a “chained” or “packed” batch). The sets of responses may be each be obfuscated and/or compressed. Once the batch is received by the client, each set is processed individually. The client may...

Real Time Media Optimization Over Remoted Sessions

Real time media optimization may be provided. First a remote session may be established with a remote computing device. Then during the remote session non real time media data may be exchanged with the remote computing device over a server path. Moreover real time media data may be exchanged with the remote computin...

Providing Transparent Failover In A File System

A connection state system is described herein that allows a client to resume a connection with a server or a different replacement server by remotely storing client state information in association with a resume key. The system provides a resume key filter operating at the server that facilitates the storing of vola...

Sleep Mode For Mobile Communication Device

A method and apparatus for operating a mobile communication device in a sleep mode. The mobile communication device displays a time in an easily readable format at a low- light intensity, provides an alert to a user at an alarm time in a particular manner specified by the user, changes the buttons on the mobile comm...

Quick Access Utility

Users are enabled to perform tasks such as creating new content, searching for items, communicating with other users through a simplified access interface, at the same time defining a location for the access interface. A user may begin typing at any location on a canvas. The system ranks possible outcomes, suggestin...

User Authored Notes On Shared Documents

User-authored notes on shared documents may be provided. A shared document may be stored and at least one note may be associated with the document. When a user displays the document, the associated not may be retrieved and a user interface element may be provided to allow the user to view the note. ...

Creating Cross Technology Configuration Settings

A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity. The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising s...

Providing Suggested Sites Associated With Target Sites

Systems, methods, and computer storage media having computer-executable instructions embodied thereon that facilitate providing suggested sites in accordance with target sites are provided. Web-browsed data is locally stored on a user device and uploaded to a suggestion engine. Additional web-browsed data is communi...

Using Text Messages To Interact With Spreadsheets

Text messages are used to interact with objects in a spreadsheet. For example text messages may be used to enter/receive data in the spreadsheet. One or more text messages may be associated with a spreadsheet. Text messages may be associated with cells tables charts and other objects of the spreadsheet. When the spr...

Location Aware Spreadsheet Actions

Location information is integrated with spreadsheet formulas and operations. Location information may be used in filtering data detecting data sources performing calculations and the like. The data may be filtered by location individuals places and other location based information. The location information may be in...

Webpage Domain Monitoring

Webpage domain monitoring is described. In an implementation, one or more web pages are obtained at a client, with each said web page including a plurality of content that is provided, respectively, via a plurality of domains. The plurality of domains that were used to provide the plurality of content is identified ...

Document Merge

Methods and systems of merging a first document with at least a second document to generate a third document. Each of the first and second documents includes at least one data unit. Each data unit is associated with a unit identifier and an edit identifier. The unit identifiers of each of the documents are compared ...

Identity Based Network Policy Enablement

Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, e...

Kernel Processor Grouping

Techniques for grouping individual processors into assignment entities are discussed. Statically grouping processors may permit threads to be assigned on a group basis. In this manner, the burden of scheduling threads for processing may be minimized, while the processor within the assignment entity may be selected b...

Efficient Method For Operating System Deployment

Method and computer storage media for efficiently deploying an operating system are provided. A virtual hard drive file is received by a computing device. Upon receipt of the virtual hard drive file, the computing device is enhanced to expose and mount the virtual hard drive as a drive and boot option for the comput...

Direct Connection With Side Channel Control

A wireless computer that pairs with a remote audio video presentation device such as a television. As a result of the pairing a communication channel is established for the computer to transmit audio video content for presentation through that device. Additionally as part of the pairing the computer and remote devic...

Decomposing And Merging Regular Expressions

The present invention extends to methods systems and computer program products for decomposing and merging regular expressions. Embodiments of the invention decompose a regular expression into multiple simple keyword graphs merge those keyword graphs in a compact and efficient manner and produce a directed acyclic g...

Three State Touch Input Method

A touch screen input device is provided which simulates a 3-state input device such as a mouse. One of these states is used to preview the effect of activating a graphical user interface element when the screen is touched. In this preview state touching a graphical user interface element on the screen with a finger ...

Sandboxed Execution Of Plug Ins

A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are c...

Online Service Syndication

Embodiments described herein are directed to syndicating an online service to at least one syndication partner of a syndicator. In one embodiment, a computer system determines that a syndication relationship has been established between a syndicator and a syndication partner, where the syndication relationship is es...

Determining Whether A Device Is Inside A Network

A network address of a computing device is obtained and an unencrypted request is sent to a resource access manager of a particular network. If both a response is received from the resource access manager and the computing device has a network address within a desired range of network addresses then a determination ...

Software Defined Cognitive Radio

A computing device with a software defined radio. The software defined radio has an architecture with separate components to provide control functions and data processing functions. The control components configure the data processing components so that the software defined radio provides desired operating character...

Consistency Without Ordering Dependency

Aspects of the subject matter described herein relate to maintaining consistency in a storage system. In aspects, one or more objects may be updated in the context of a transaction. In conjunction with updating the objects, logical copies of the objects may be obtained and modified. A request to write the updated lo...

Accelerating Bitmap Remoting By Identifying And Extracting 2 D Patterns From Source Bitmaps

Systems, methods and computer-readable storage media are disclosed for accelerating bitmap remoting by extracting non-grid tiles from source bitmaps. A server takes a source image, identifies possibly repetitive features, and tiles the image. For each tile that contains part of a possibly repetitive feature, the ser...

Sensory Outputs For Communicating Data Values

Architecture for communicating data values that enables visually impaired persons to perceive a non-image indicator corresponding to the data values. For example, an organized data set such as a chart or a graph can be displayed on a computer monitor or other user interface output component. A user employs a mouse o...

Isolating Received Information On A Locked Device

Quarantining data received while a computing device is locked. While the computing device is locked, content items such as images, notifications, voice memos, telephone numbers, and the like are stored in a first memory area. The content items are transferred to a second memory area, separate from the first memory a...

Surfacing Content Including Content Accessed From Jump List Tasks And Items

Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments client side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction and have those bounda...

Cloud Computing Monitoring And Management System

A cloud computing monitoring system has an alert capturing system and a message transfer system that provides performance tracking and alert management to a local monitoring system. The alert capturing system may operate as part of a managed code framework and may capture and route alerts that may be transmitted to ...

Intelligent Code Differencing Using Code Clone Detection

The subject disclosure relates to systems and methods for intelligent code differencing employing code clone detection technology. A large complex source code change (e.g. moving and renaming functions across source files) may involve edits in multiple source files. As such developers and/or code reviewers may have ...

Supporting Intelligent User Interface Interactions

Concepts and technologies are described herein for supporting intelligent user interface interactions. Commands accepted by applications can be published or determined. Before or during access of the application the commands can be presented at clients to indicate commands available for interfacing with the applicat...

Techniques For Electronic Aggregation Of Information

Techniques for an electronic montage system are described. An apparatus may comprise a logic device arranged to execute a montage application comprising an authoring component operative to provide a presentation surface having multiple presentation tiles receive control directives to associate content files with pre...

Multi Layered Storage And Management Of Software Components

Architecture that employs multi-row entities to store solution components using columns, properties and logic that track solution components by storing different versions (states) of the component into multiple rows. Component modification includes adding and/or modifying multiple rows, thereby facilitating support ...

Automatic Discovery Of Alternate Mailboxes

As described herein, a client system is automatically configured to access message objects in a plurality of mailboxes stored at a server system. The client system sends an autodiscover request to the server system. In response, the server system sends to the client system an autodiscover response that contains an a...

Soft Keyboard Control

This document describes tools associated with soft keyboard control functions. In some implementations, the tools recognize a keyboard launch gesture on a touch sensitive screen and present a preview of a keyboard on the touch sensitive screen responsive to the launch gesture. The tools can also display the keyboard...

Trade Card Services

The claimed subject matter provides a system and/or a method that facilitates servicing a portion of a trade card via a web service. A web service can provide a portion of data to enhance a trade card, wherein the portion of data is at least one of a portion of trade card document-specific data, an intelligent gadge...

Migration Of Computer Secrets

Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical source computing machine to a physically different destination machine. For example, migration of TPM secrets allows migration of a virtual machine from one physi...

Pyramidal Volumes Of Advertising Space

The claimed subject matter relates to an architecture that can facilitate advertising models in connection with pyramidal volumes of advertising space. In particular, a pixel at one plane of view of an image can be associated with four pixels at a lower plane of view and so on. Advertising rights with respect to the...

Staged Access Points

Various embodiments are described herein that relate to determining an intent of a user to initiate an action on an interactive display system. For example one disclosed embodiment provides a method of initiating an action on an interactive display device the interactive display device including a touch sensitive di...

Extensible Mechanism For Conveying Feature Capabilities In Conversation Systems

Feature capabilities of conversation clients are conveyed to participants in a conversation such that real time decisions can be made and a common set of capabilities are selected to be used in the conversation. User interfaces of participating clients are then adjusted to reflect those capabilities. Further decisio...

Dual Display Mobile Communication Device

A dual display mobile device comprises a first device with a first display and a second device with a second display. The mobile device can operate as a mobile cell phone. In a closed configuration of the mobile device, the first display is exposed and the second display is hidden. In an open configuration, both dis...

Offloading Content Retrieval And Decoding In Pluggable Content Handling Systems

Systems, methods and computer-readable storage media are disclosed for offloading content retrieval and decoding in pluggable content-handling systems. This may be accomplished by the server sending the client a frame that comprises video as two parts - the un-decoded video data, and the rest of the frame. The clien...

Wireless Access Point Supporting Control By Multiple Applications

A computing device configurable as a wireless network access point that can be controlled from multiple applications. The computing device provides an interface through which applications may input commands to change the state of the access point. The interface responds to these commands and other events, such as as...

Techniques To Automatically Syndicate Content Over A Network

Techniques to automatically syndicate content over a network are described. An apparatus may comprise a client computer having a processing system with a processor and computer-readable medium. The computer readable medium may store program instructions for a syndication manager component communicatively coupled to ...

Transforming User Script Code For Debugging

User script code that is developed to be run in a host application, for example, as a macro can be transformed into debuggable code so that the host application may continue to operate during a debugging stop operation. Traceback methods can be created that call back into the host application to allow the host appli...

Virtualstorage Target Offload Techniques

A virtual machine storage service can be use a unique network identifier and a SR-IOV compliant device can be used to transport I/O between a virtual machine and the virtual machine storage service. The virtual machine storage service can be offloaded to a child partition or migrated to another physical machine alon...

Creating And Editing Dynamic Graphics Via A Web Interface

Technologies are described herein for creating and editing dynamic graphics via a World Wide Web ("Web") interface. A Web service is provided for generating dynamic graphics in response to requests received from client computers. In response to requests from client computers, the Web service generates requested dyna...

Changing Visual Content Communication

Techniques for presenting changing visual content, including video, animation and so on, as an overlay are discussed. Changing visual content, included in a visual presentation, may be identified from other visual elements included in the visual presentation. The changing visual content may be manipulated based on a...

Asynchronous Replication

Contents of a copy of a server file may be saved to a down load file, a base file, and a working file. An indication may be received from an application that the application has edited the working file and a copy of the edited working file may be saved to an upload file. A server computer may be queried to determine...

Triggering Animation Actions And Media Object Actions

A request may be received to trigger an animation action in response to reaching a bookmark during playback of a media object. In response to the request, data is stored defining a new animation timeline configured to perform the animation action when playback of the media object reaches the bookmark. When the media...

Bi Directional Updata Of A Grid And Associated Visualizations

Architecture that facilitates the attachment of multiple visualization types (e.g., charts) to the data of a grid and the presentation of the visualization next to the grid. The infrastructure allows each data view to be associated with a set of visualizations. These visualizations are rendered along with the grid (...

Use Of Scientific Models In Environmental Simulation

Use of scientific models to generate graphical virtual environments is described. In an embodiment at least two different scientific models are used. Input data which is representative of a real world environment is used by a first scientific model, such as a climate model, and data output by the first scientific mo...

Techniques To Manage And Display Related Communications

Techniques to manage and display related communications are described. A system may comprise a communication management tool (CMT) operative on a computer, the CMT comprising a threading component operative to associate a plurality of communications from a plurality of communication types with a conversation thread,...

Debugging Pipeline

A debugging pipeline may be developed to create a debugging experience for computer code operating in an execution environment, using a debugging tool outside of the execution environment. A producer can publish a debugging pipeline, configured to link the producer to a consumer (e.g., a debugging tool) by exposing ...

Dual Antenna Structure Having Circular Polarisation Characteristics

There is disclosed an antenna device made up of at least first second and third conductive metal plates arranged in a parallelepiped configuration. The third plate defines a lower plane and the first and second plates together define an upper plane substantially parallel to the lower plane. The first and second plat...

Media Portability And Compatibility For Different Destination Platforms

Tools and techniques for media portability and compatibility for different destination platforms are provided. These tools may receive commands to launch a media portability capability, and may receive source media as input for transformation. These tools may also receive indications of profile settings for specifyi...

Selective Authorization Based On Authentication Input Attributes

Embodiments for providing differentiated access based on authentication input attributes are disclosed. In accordance with one embodiment, a method includes receiving an authentication input at an authentication authority using an authentication protocol. The authentication input being associated with a client. The ...

Configuration Of A Peer Group

Embodiments of the present invention relate to systems and methods for configuring computing devices to join a peer group. A peer group may be created on a subnetwork by a computing device. When a new computing device enters the subnetwork, it may join the peer group and be given access to the shared resources on th...

Mobile Device Management Scheduling

A mobile device management system is provided. The mobile device management system may include a device management client configured to be executed on a mobile computing device. The device management client may include a client scheduler module configured to contact a device management server via a computer network ...

Formatting Data By Example

Data formatting rules to convert data from one form to another form are automatically determined based on a user s edits. A machine learning heuristic is applied to a user s edits to determine a data formatting rule that may be applied to data. For example a user may make edits that add/remove characters from data c...

Secure And Extensible Policy Driven Application Platform

System of evaluating security of script content. A processor executes computer- executable instructions for defining a policy for the script content in a web page. The script content provides interactions between a user and other content within the web page. The defined policy indicates an execution boundary of the ...

Cloud Based Movable Component Binding

This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing device in a cryptographically secure manner without requiring the movable component to perform a complex cryptographic fun...

System And Method For Targeted Recommendations Using Social Gaming Networks

Systems, methods and computer readable media are disclosed for targeting a recommendation to a first user of an online multi-player gaming environment based on tracked data of a second user with which the first user has a relationship on the online multi-player gaming environment. In addition to the general system, ...

Synchronizing Presentation States Between Multiple Applications

A presentation state is received from the presenting application. The presentation state may represent a current state of the local presentation. A request for the presentation state is received from the viewing application. In response to receiving the request for the presentation state, the presentation state is p...

Revealing Of Truncated Content On Scrollable Grid

Various embodiments related to the revealing of truncated content on a scrollable grid are disclosed. One disclosed embodiment provides a computing device comprising a display, a processor, and memory comprising instructions executable by the processor to display a cell of a grid of content at a first, smaller size ...

Policy Service System Architecture For Sessions Created Using Stun

Described herein are embodiments for setting, managing, and monitoring connection policies for a plurality of network paths from a first endpoint to a second endpoint. In embodiments, a set of candidate addresses from a first endpoint and a set of candidate addresses from a second endpoint are received. Each candida...

Efficient Geometric Tessellation And Displacement

Methods and computer-storage media are provided for rendering three-dimensional (3D) graphics by tessellating objects using novel structures and algorithms. Rendering utilizing "patches," configurable functions that include a specified number of control points, allows for computation on a per-patch or per-control-po...

Fine Grained Location Determination Of Networked Computers

Location of a communication network subscriber is determined employing confidence metrics such as remote vs. local computer usage primary user in a multi user computing environment likelihood of forgery and comparable ones. A fine grained location determination is then made based on the metric results and directory ...

Extensibility For Web Based Diagram Visualization

Extensible architecture and data flow in a web based diagram visualization service is accomplished by enabling a diagram update engine to launch custom data modules. Data modules for data sources that are not inherently supported are created by third parties through a specially defined interface (e.g. .NET® assembli...

Markup Language Based Selection And Utilization Of Recognizers For Utterance Processing

Embodiments are provided for selecting and utilizing multiple recognizers to process an utterance based on a markup language document. The markup language document and an utterance are received in a computing device. One or more recognizers are selected from among the multiple recognizers for returning a results set...

Apportioning And Reducing Data Center Environmental Impacts, Including A Carbon Footprint

Determining and apportioning the environmental impacts of a data center provides useful business intelligence for data center consumers. In one embodiment, apportioned carbon footprints are determined by identifying a data center and an application, determining the carbon footprint of a data center, and apportioning...

Video Encoding Using Previously Calculated Motion Information

A video encoder uses previously calculated motion information for inter frame coding to achieve faster computation speed for video compression. In a multi bit rate application, motion information produced by motion estimation for inter frame coding of a compressed video bit stream at one bit rate is passed on to a s...

Roaming Application Settings Across Multiple Computing Devices

Application settings are roamed across multiple computing devices. Provider modules on the computing devices are run to retrieve application settings to be roamed and to roam those application settings across the multiple computing devices. Application setting changes initiated on a particular computing device are a...

Software Application Verification

Various embodiments for software application verification are disclosed. Software application verification applies digital rights management to applications that run protected content on a playback device. In this way, protected content may be provided to approved applications and withheld from applications that hav...

Shared Television Sessions

Shared television sessions are described. In embodiment(s), television content can be received via a tuner of a tuner device. A shared television session can be established between rendering devices that share the tuner of the tuner device to receive the television content. A tuner configuration input can be receive...

Energy Aware Server Management

The described implementations relate to energy-aware server management. One implementation involves an adaptive control unit configured to manage energy usage in a server farm by transitioning individual servers between active and inactive states while maintaining response times for the server farm at a predefined l...

Video Sharing

Video sharing is described. In an embodiment, mobile video capture devices such as mobile telephones capture video streams of the same event. A video sharing system obtains contextual information about the video streams and uses that to form a video output from the streams, that output being for sharing by other ent...

Contextual Queries

Systems methods and computer storage media for generating contextual queries are provided. The system includes a search engine to receive user queries and contexts a query understanding component to generate a semantic representation of the query and a data source command generator to transform the semantic represen...

Managing Resources To Display Media Content

This document describes tools capable of enabling a media device to assign available resources to media content prior to receiving a request to display that media content. In one embodiment, the tools determiner a next media content to be requested and available resources on a media device to display that next conte...

Activation By Trust Delegation

A mechanism for delegating trust to activate a target program from the vendor (or its intermediary) to a customer (or its intermediary) using an issuance license. The customer may then activate using their own authentication implementation. Also, a method for formulating an issuance license that permits such delegat...

Diffusing Screen

Various embodiments related to a rear projection display screen configured to reduce an intensity of light at a viewing angle at which the light is less likely to be viewed by a user are disclosed. One disclosed embodiment provides a diffusing screen comprising a sheet-like structure transparent to one or more wavel...

Font Handling For Viewing Documents On The Web

A request is received for a rendered document corresponding to a document. The document is retrieved from a storage device. The document is transformed into the rendered document. One or more server font files associated with the rendered document are generated. The rendered document and the server font files are st...

Service Access Using A Service Address

A method is disclosed that includes assigning a service address to a service of a private network. The service of the private network is accessible, via a gateway, by a client computer. The method also includes turning off duplicate address detection at the gateway. The gateway is associated with a public network ad...

Command User Interface For Displaying Multiple Sections Of Software Functionality Controls

To increase command-access efficiency and to optimize a user"s available user interface work space, an improved user interface is provided for displaying logical groupings of selectable software functionality controls that are associated with one or more selected top-level functionalities. Upon selection of a top-le...

Multi Layer User Interface With Flexible Parallel Movement

A user interface (UI) system calculates movements in a multi layer graphical user interface. The UI system receives user input corresponding to gestures on a touchscreen. The UI system calculates a movement of a first layer in a first direction (e.g. a horizontal direction) at a first movement rate. For example the ...

Multi Layer User Interface With Flexible Parallel And Orthogonal Movement

A user interface (UI) system calculates movements in a multi layer graphical user interface. The UI system receives user input corresponding to gestures on a touchscreen. The UI system calculates a movement of a first layer in a first direction (e.g. a horizontal direction) at a first movement rate. The UI system ca...

Extension Point Declarative Registration For Virtualization

An extension point virtualization system uses operating system provided reparse points to provide minimal extension point registration. Reparse points preserve application isolation while removing the scale problem of writing custom extension point proxies for each extension point. Instead the system can use a singl...

Configuration And Distribution Of Content At Capture

Configuring a computing device to capture content, and distributing the content to one or more content destinations at a point of capture. The user select the content destinations from a list of destinations, or the content destinations are selected automatically based on previous user activities or selections. Conf...

Techniques To Automatically Identify Participants For A Multimedia Conference Event

Techniques to automatically identify participants for a multimedia conference event are described. An apparatus may comprise a content-based annotation component operative to receive a meeting invitee list for a multimedia conference event. The content-based annotation component may receive multiple input media stre...

Efficient And Transparent Remote Wakeup

Systems and methods that facilitate remote wake up are described that provide for efficient and transparent wake up of target hosts by remote hosts. In various embodiments, a separate address can be used by a target host for wake up network traffic, which is different from a regular address associated with a target ...

Location Information In Presence

Architecture that facilitates the combining and presentation of location information with presence information in a communications system. The location information can be virtual location information published from a location source and/or associated location systems to a presence system. The presence system then ma...

Rule Based Assignment Of Control Of Peripherals Of A Computing Device

Described herein are various techniques and principles for determining how to assign control of peripherals and assigning control of peripherals. In some embodiments determining how to assign control of peripherals comprises reviewing connections of peripherals to the computing device and evaluating rules to determi...

Trusted Entity Based Anti Cheating Mechanism

An anti-cheating system may comprise a combination of a modified environment, such as a modified operating system, in conjunction with a trusted external entity to verify that the modified environment is running on a particular device. The modified environment may be may be modified in a particular manner to create ...

Dynamic Rear Projected User Interface

A dynamic projected user interface includes a light source for generating a light beam and a spatial light modulator for receiving and dynamically modulating the light beam to create a plurality of display images that are respectively projected onto a plurality of keys in a keyboard. An optical arrangement is dispos...

Tracking Online Advertising Using Payment Services

A user"s online activity is tracked and offers associated with online advertisements presented to the user are identified. Information regarding these offers are provided to a payment service, which associates the information with an account for the user. When the user performs an activity using a payment card or ot...

Editing A Document Using A Transitory Editing Surface

[0049] Technologies are described herein for editing a document using a transitory editing surface. A word processing program displays a document in a window. Upon detection of the placement of an insertion pointer within a paragraph of text in the document, an editing surface is created overlaying the paragraph in ...

Virtual Machine Power Consumption Measurement And Management

Embodiments of the virtual machine power metering system and method measure the power consumption of individual virtual machines. Power meter measurements for a physical host server are converted into individual virtual machine power meters that measure the power consumption of each individual virtual machine residi...

Data Structure Mapping And Navigation

Embodiments provide navigable and other information to users. In an embodiment a handheld computing device can be configured to provide a navigable map that includes a number of map list items corresponding to aspects of an underlying data structure. In one embodiment a process includes displaying a number of linked...

Communication Transport Optimized For Data Center Environment

Methods and apparatus for congestion control in computer networks achieve high burst tolerance low latency and high throughput with shallow buffered switches. A method for controlling congestion includes transmitting a set of data packets on a network connection from a first computing device to a second computing de...

Adaptation For Statistical Language Model

Architecture that suppresses the unexpected appearance of words by applying appropriate restrictions to long-term and short-term memory. The quickness of adaptation is also realized by leveraging the restriction. The architecture includes a history component for processing user input history for conversion of a pho...

Information Protection Using Zones

Some embodiments are directed to an information protection scheme in which devices users and domains in an information space may be grouped into zones. When information is transferred across a zone boundary information protection rules may be applied to determine whether the transfer should be permitted or blocked a...

Smart Routing

A router module receives a client request. In response to receiving the request, the router module obtains the network address of a server module to fulfill the request. The router module then determines whether it is executing on the same physical computer as the server module. If the router module determines that ...

Delivering Composite Media To A Client Application

An approach is provided for generating composite media and delivering the composite media to a client application. Data is received from one or more external sources, and a portion of the data is selected to be used in the composite media according to the time period of delivery of the client application, user infor...

Multimodal Conversation State And Transfer Through Centralized Notification

A mechanism is provided for enabling subscribers of an enhanced communication system to switch endpoints during a conversation add or remove modalities invite new participants while continuing the conversation seamlessly. Active endpoints associated with a participant in a conversation may publish their states to a ...

Data Center Using Wireless Communication

A data center includes a plurality of computing units that communicate with each other using wireless communication such as high frequency RF wireless communication. The data center may organize the computing units into groups (e.g. racks). In one implementation each group may form a three dimensional structure such...

Intra Language Statistical Machine Translation

Training data may be provided, the training data including pairs of source phrases and target phrases. The pairs may be used to train an intra-language statistical machine translation model, where the intra-language statistical machine translation model, when given an input phrase of text in the human language, can ...

Chromeless User Interface

Techniques are described to implement a user interface for a display of a mobile device. In an implementation, the user interface may include a chromeless menu configured to be displayed when menu-based user input to the mobile device is available; a system tray configured to be displayed on the display when a notic...

Cross Cloud Management And Troubleshooting

A cloud management system is described herein that provides the ability for an application to span two or more clouds while allowing operation management and troubleshooting of the distributed application as a single application. The system provides infrastructure that communicates across datacenters for execution a...

User Interface For Portable Storage Devices

A user interface for portable storage devices is disclosed. The user interface includes an icon that is displayed as part of the portable storage device. The icon can provide storage information, and synchronization, backup, and file transfer animations. The following visual cues can be provided: indicating the amou...

Web Based Multiuser Collaboration

Tools and techniques are described for web-based multiuser collaboration. These tools may provide methods that enable users to collaborate remotely on documents using respective browsers. These methods may send representations of portions of a given document to the browsers, and associate portions of the documents w...

Controlling Playback Of Media Content

Techniques are disclosed herein for controlling playback of digital media. In one aspect, while playback of the media content is progressing as normal a snapshot such as a thumbnail is displayed to show the user a representation of the media content that is associated with a seek location. In another aspect, the fun...

Multi Layered Slide Transitions

Architecture that enhances the visual experience of a slide presentation by animating slide content as "actors" in the same background "scene". This is provided by multi-layered transitions between slides, where a slide is first separated into "layers" (e.g., with a level of transparency). Each layer can then be tra...

Smooth Layout Animation Of Continuous And Non Continuous Properties

A layout animation system is described herein that performs smooth transitions for properties of a layout, regardless of whether the layout properties are discrete or automatically calculated. Before a transition is executed, the layout animation system extracts and stores the positioning, sizing, and visibility of ...

Service Initiation Techniques

Service initiation techniques are described. In at least one implementation, a computing device receives a selection of text that is displayed in a user interface by an application. Selection is detected of one of a plurality of services that are displayed in the user interface. Responsive to the detection, the sele...

Brokered Item Access For Isolated Applications

A broker module of a computing device receives requests from an isolated application to access one or more items of an item source. In response to a request storage item objects representing items of the item source are generated and returned to the isolated application for each item of the item source that the isol...

Creating And Propagating Annotated Information

Content may be collected annotated and propagated in a unified process. In one example a mobile device such as a smart phone is used to collect information. The information may be text video audio etc. The information may be sent to a reaction service which may return an annotation of the information. The annotation...

Dual Screen Portable Touch Sensitive Computing System

A touch sensitive computing system is provided, including a first touch sensitive display and a second touch sensitive display. The displays are operatively coupled with a processing subsystem, and with a memory subsystem which stores a plurality of content pages. User interface instructions are stored in the memory...

Hardware Interface For Enabling Direct Access And Security Assessment Sharing

Native IPv6 capabilities are provided to an IPv4 network node, device, or endpoint using a hardware interface that supports network communication under a Direct Access model. The Direct Access model supports IPv6 communication with IPsec and enforces Network Access Protection ("NAP") health requirement policies for ...

Delivering Cacheavle Streaming Media Presentations

A smooth streaming system provides a stateless protocol between a client and server in which the server embeds incremental control information in media fragments. The server provides uniform media fragment responses to media fragment requests that are cacheable by existing Internet cache infrastructure. The smooth s...

Customizable Controls Provided By A Messaging Application For Performing Selected Actions

Technologies are described herein for providing users of a messaging application with controls that perform one or more selected actions with a message. Any number of default custom action controls may be displayed in a gallery. The selection of a custom action control performs various actions to an active message. ...

Hid Over Simple Peripheral Buses

In embodiments of HID over simple peripheral buses a peripheral sensor receives inputs from a peripheral device and the peripheral sensor implements an HID SPB interface to interface the peripheral device with a computing system via a simple peripheral bus (SPB) in an HID data format. The peripheral sensor can also ...

Device User Interface To Input Emoji And Other Symbols

An integrated symbols user interface (UI) provides a collection of different symbols for inputting symbols into messages such as email message IM messages and SMS text messages. The integrated symbols UI may group symbols in a number of different category panes. Additionally the integrated symbols UI may provide a h...

Time Based Licenses

A method and a system are provided for issuing a number of different types of time-based licenses associated with software products. The system may include an activation server, which may maintain licensing information in a licensing database, and a licensing platform, which may request issuance and renewal of time-...

Platform Or User Sensitive Advertising

In accordance with one or more aspects of the platform or user sensitive advertising, appropriate ads to be served for playback via a platform are identified based at least in part on one or more platform rules for the platform. The timing of when the appropriate ads are to be served can also be based at least in pa...

Self Described Rendering Of Data

An exemplary data package for a network-based instant messaging system includes descriptive data about a user of the instant messaging system and data indicating a network location of a gadget to render the descriptive data, the location accessible by one or more other users of the instant messaging system. Various ...

Virtual Non Uniform Memory Architecture For Virtual Machines

Techniques for effectuating a virtual NUMA architecture for virtual machines are disclosed herein.

Dynamic Formulas For Spreadsheet Cells

Multiple formulas are associated with a single cell of a spreadsheet. A base formula represents the actual value extracted from a data source. Adjustment formulas represent formulas for calculating adjustments to the value contained within the cell and other formulas can represent different calculation scenarios. Ea...

Application Management Within Deployable Object Hierarchy

The management of applications in a computing environment often involves a significant number of computing operations, such as acquiring the application, deploying data objects in various locations, and configuring the application with respect to the deployed device. Conventional computing environments may provide i...

Adaptable Relevance Techniques For Social Activity Streams

A social networking activity reporting system ("SNARS") and techniques notify a user of a client side electronic device about updates ("activity items " or "AIs") from the user s social network. A relevance formula including at least one time dependent portion and at least one time independent portion calculates a r...

Clustering Videos By Location

Described is a technology in which video shots are clustered based upon the location at which the shots were captured. A global energy function is optimized, including a first term that computes clusters so as to be reasonably dense and well connected, to match the possible shots that are captured at a location, e.g...

Sequenced Transmission Of Digital Content Items

The disclosure provides a system and method for managing and sequencing the transmission of digital content items from a network- accessible content service to a portable digital content device. The content service includes a cache management subsystem and provides storage for a plurality of playlists which are vari...

Presenting Search Results Based Upon Subject Versions

Systems  methods  and computer-readable storage media for identifying queries having a version-intent and presenting search results in accordance with the version-intent are provided. Subject-versions associated with retrievable documents are identified and associated therewith as subject-version tags. When a sea...

Automatic Customization And Rendering Of Ads Based On Detected Features In A Web Page

Media and system are provided for customizing ads for delivery based on features in a web page. Text in a web page is evaluated to determine the sentiment of the web page. The sentiment can be based on the overall web page or on individual blocks of text within the web page. Based on the sentiment, an ad is created ...

High Fidelity Rendering Of Documents In Viewer Clients

HIGH-FIDELITY RENDERING OF DOCUMENTS IN VIEWER CLIENTS Tools and techniques are described for high-fidelity rendering of documents in viewer clients. Methods provided by these tools and techniques may detect whether client systems have a plug-in installed for rendering high-fidelity content, in response to detectin...

Search Results Ranking Using Editing Distance And Document Information

Architecture for extracting document information from documents received as search results based on a query string, and computing an edit distance between the data string and the query string. The edit distance is employed in determining relevance of the document as part of result ranking by detecting near-matches o...

Zone Classification Of Electronic Mail Messages

Embodiments of the invention relate to techniques for classifying received e mails and e mails to be sent. In some embodiments a set of e mail zones may be defined and e mails may be classified into one of the plurality of zones. An indication of the zone into which an e mail has been classified may be displayed in ...

Generating Personalized Social Based Data For A Social Network Participant

Technologies pertaining to the creation of personalized data for an individual including personalized data based on a social networking participant s social networking data entity extraction and automatic collage generation are described herein. In one implementation the personalized data is used to provide a person...

Input Content To Application Via Web Browser

The disclosed architecture allows markup language (e.g., HTML) pages to facilitate the insertion of content (e.g., text) into an application to which an input method is attached. In this way, a plug-in developer can implement any UI look and behavior using a web page language (e.g., HTML), communicate with a backend...

Communications Application Having Conversation And Meeting Environments

Architecture for a communication system providing a user experience that includes a conversation environment and a meeting embodiment in a single application. A navigation menu enables the user to select between multiple communications environments, including a conversations environment. Multiple conversation thread...

Inserting A Multimedia File Through A Web Based Desktop Productivity Application

Technologies are described herein for inserting a multimedia file through a web-based desktop productivity application. A request for the multimedia file is received from a client computer over a network. A request for the multimedia file is transmitted to a server computer over the network. The request for the mult...

Document Glancing And Navigation

When viewing a document a user may switch between detailed reading of the document and glancing at the structure of the document in a single smooth flow of actions. In one example a document is shown with a navigation bar that has a thumb. Before the user clicks the thumb the document is shown at its current positio...

Virtual Application Extension Points

A virtual application may be configured with several extension points within a host operating system. The virtual application may be configured with a private namespace in which various components such as registry settings dynamic linked libraries and other components may reside. During configuration links may be pl...

Power Aware Thread Scheduling And Dynamic Use Of Processors

Techniques and apparatuses for providing power-aware thread scheduling and dynamic use of processors are disclosed. In some aspects, a multi-core system is monitored to determine core activity. The core activity may be compared to a power policy that balances a power savings plan with a performance plan. One or more...

Online Content Service With Catalog Based Interaction

An online content system is provided, including a plurality of user accounts maintained at a network-accessible online service, where associated with each user account are a plurality of content items. A catalog service is operable to provide offline metadata for the plurality of user accounts, whereby, for the plur...

Standard Schema And User Interface For Website Maps

Various embodiments provide a standardized schema that can be used by site developers to define a site map and its associated hierarchy. In at least some embodiments, a corresponding user interface can be created within an application such as, for example, a Web browser, to allow the user to specify locations at whi...

Platform For The Production Of Seemless Orthographic Imagery

Systems and methods are provided for the production of seamless, geo-referenced orthographic images that can comprise a composite of two or more underlying images. Illustratively, an exemplary image processing environment comprises an image processing engine and an instruction set comprising at least one instruction...

Schema For Federated Searching

Embodiments of the present invention provide a schema to describe the structure of a data store that may be used to query the data store. The schema may include a property description describing static and contextual attributes of a property of the data store. The schema may also include a property reference describ...

Hosted Application Platform With Extensible Media Format

A media interaction system is described herein that allows hosted applications to consume and/or produce rich media content independent of the format of the media content, while still maintaining the security of the host. The media interaction system accepts raw, uncompressed media data from a hosted application, an...

Simultaneous Collaborative Review Of A Document

A document is simultaneously opened by different clients for a collaborative review of the document. Each of the clients may make comments to the document at the same while the document is also being edited. Comments made on the document by one client are automatically synchronized with the other clients that are si...

Controlling Access To Documents Using File Locks

Examples are related to systems and methods for controlling access to document files on a document server. One example system includes document files stored on a document server, at least one of the document files referencing a file lock, and a document access processing module. The example document access processin...

Efficient Stream Sharing For Multi User Sensor Data Collection

The claimed subject matter provides systems and/or techniques that facilitate and/or effectuate efficient stream sharing for multi-user sensor data collection. The system includes mechanisms that locate within a query a specification that includes spatial regions over which data is required, based on the spatial reg...

Document Synchronization Over Stateless Protocols

Example systems, methods, and data structures are directed at synchronizing documents. One example data structure includes receiving a request from a first client to edit a document, and sending short-term check out metadata to the first client to begin an editing session. The data structure includes a plurality of ...

Aggregating Recurrent Schedules To Optimize Resource Consumption

Coalescing schedules that use a resource to extend battery life. Each of the schedules is defined to execute at a recurrent activation time within a defined tolerance. After receiving notification of an event, the schedules are accessed to identify the schedules that may be executed early based on their activation t...

Synchronizing Clocks In An Asynchronous Distributed System

The present invention extends to methods, systems, and computer program products for synchronizing clocks in an asynchronous distributed system. Embodiments of the invention facilitate creation of a trustable and practical common time (time of day) reference across a set of peer nodes (observers), such as, for examp...

Flexible Logging, Such As For A Web Server

A flexible logging system is described herein that operates with a web server to provide activity logging in a way that is customizable to include a variety of data fields, can capture both client and server log information to a single location, and can provide data to an analysis engine directly to provide near rea...

Virtual Object Manipulation

Systems, methods and computer readable media are disclosed for manipulating virtual objects. A user may utilize a manipulated by the cursor controller, such as his hand, in physical space to associate with a cursor in a virtual environment. As the user manipulates the controller in physical space, this is captured b...

Platform Independent Presentation Composition

Architecture that includes a platform independent configuration driven presentation composition engine. The composition engine that allows dynamic generation of multiplatform user experience (UX) based on a data contract. By composition the user can select the parts interactions and constraints between the interacti...

Rich Web Site Authoring And Design

Embodiments described provide web site design features and functionality, but are not so limited. In an embodiment, a computing system includes a design component that can be used to author rich web site templates. A user can use and modify aspects of a web site template as a model for a particular web site or other...

Content Management That Addresses Levels Of Functionality

Data can be provided via devices based on levels of functionalities of the devices. In one example, a broker receives content from a data source and sends the content to devices in a network for presentation to a user. The devices may have different functionalities and the broker may modify the data content in accor...

Context Based State Change For An Adaptive Input Device

Various embodiments of systems and methods to implement a context-based state change for an adaptive input device are provided. For example, a method is disclosed that may include receiving a state input indicating a change in a system state, changing adaptive input device data in response to the state input, the ad...

Mobile Content Delivery On A Mobile Network

Embodiments related to mobile content delivery are disclosed. One disclosed embodiment provides a method of facilitating mobile content delivery on a mobile network. The method comprises receiving a purchase request from a network client at a mobile marketplace system; prompting the network client to provide a billi...

Linking Visual Properties Of Charts To Cells Within Tables

Tools and techniques are described for linking visual properties of charts to cells within tables. Methods provided by these tools enable users to select visual properties that are associated with graphical displays of chart data, and to link these visual properties to respective cells within the tables. User interf...

Data Visualization Platform Performance Optimization

Data visualization platform optimization may be provided. Applications may provide data values and request creation of a visualization from a data visualization platform (DVP). The DVP may composite a plurality of geometry records associated with a subset of the visualization"s data values. The application may ren...

Most Recently Used List For Attaching Files To Messages

A user may select an attachment for an electronic message from a most recently used (MRU) list of files. For example when a user is composing an electronic message they may select a file to attach to the message from the MRU list. The recently used files that are included within the MRU list may be related to or mor...

Summarization Of Conversation Threads

Automatically summarizing electronic communication conversation threads is provided. Electronic mails text messages tasks questions and answers meeting requests calendar items and the like are processed via a combination of natural language processing and heuristics. For a given conversation thread for example an el...

Indexing And Searching Employing Virtual Documents

Relationships between linked and/or embedded documents as well as documents sharing data source(s) are captured and rendered through virtual documents. Virtual documents are created representing linked / embedded documents and data sources associated with a relevant document. Relationships between real and virtual d...

System For Managing Multimedia Operations In Remote Sessions

Techniques relating to managing multimedia transmissions in terminal services scenarios are described. In an example, a method sends a user-interface component from a server to a remote client. The exemplary method further streams a media component for presentation on the remote client in combination with the user-i...

Image Display Via Multiple Light Guide Sections

Various embodiments related to a multi-section light guide and computing devices comprising a plurality of wedge light guides are disclosed. For example, one disclosed embodiment comprises a multi-section light guide having a monolithic wedge-shaped body comprising a plurality of logical light guide sections. Each l...

Multi Axis Navigation

Multi axis navigation techniques are described. In implementations a user interface is output by a computing device the user interface includes a first axis and a second axis that include parameters that are navigable via one or more gestures. One or more items are chosen by the computing device for concurrent displ...

Caching And Exposing Pre Send Data Relating To The Sender Or Recipient Of An Electronic Mail Message

[0062] Technologies are described herein for caching and exposing pre-send data relating to the sender or recipient of an e-mail message. A mail client program is configured to cache recipient and configuration mail tips at a client computer. The configuration mail tips may be retrieved from a server computer and c...

User Based Authentication For Realtime Communications

Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. ...

Selective Enablement Of Runtime Based Application Behaviors

A system and method for deploying software from a central location to a plurality of remote install sites. The system includes a network-accessible server system and a plurality of computing devices. Based on delivery of a general application deliverable from the server system, a runtime-based application is install...

Virtual Machine Image Update Service

Systems methods and computer readable media for updating a component utilized by an application within a distributed computing environment. An inventory of components relied on by applications within a distributed computing environment is created and maintained to facilitate identifying applications utilizing a part...

Ranking Visualization Types Based Upon Fitness For Visualizing A Data Set

Technologies are described herein for ranking visualization types. In order to rank the visualization types, visualization metadata is generated for each of the visualization types and data set metadata is generated for the data set. A suitability score is then computed based upon the visualization metadata and the ...

Virtual Desktop View Scrolling

Example embodiments of the present disclosure are related to scrolling the view of a virtual desktop on a client. The client can be in communication with a server that has a display driver. The server can be configured to transmit signals indicative of images to the client and the client can be configured draw the i...

Media Content Programming, Delivery, And Consumption

A media content programming, delivery, and consumption model is provided by which consumers can receive programming that is personalized to their tastes and interests and discover new media content that they will likely enjoy, without having to put in a lot of effort or needing to be technically adept. The received ...

Virtual Non Uniform Memory Architecture For Virtual Machines

Techniques for effectuating a virtual NUMA architecture for virtual machines and adjusting memory in virtual NUMA nodes are described herein.

Extending Collaboration Capabilities To External Data

A computing device includes instructions that, when executed by a processing unit, cause the processing unit to: create a business data catalog module that accesses and manipulates data residing on an internal data store and an external data store, wherein the business data catalog module receives a request for data...

Implicit Rating Of Advertisements

Methods for measuring resonance of an ad with a user. Ads are delivered to a user during a commercial break of a program being delivered by a content provider. Each ad is associated with a unique identifier and at least one tag describing an attribute of the ad. Input from the user is received during presentation of...

Chaining Animations

In applications that display a representation of a user, it may be reasonable to insert a pre-canned animation rather than animating a user's captured motion. For example, in a tennis swing, the ball toss and take back in a serve could be a pre-canned animation, whereas the actual forward swing may be mapped from th...

Virtual Machine Migration Tool

Tools and techniques for migrating applications to compute clouds are described herein. A tool may be used to migrate any arbitrary application to a specific implementation of a compute cloud. The tool may use a library of migration rules apply the rules to a selected application and in the process generate migratio...

Transparent Failover

Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifier generated by th...

Associating Input With Computer Based Content

Notes and other input may be entered directly onto computer based content. The notes may be taken on a portable computing device that contains metadata from the computer based content. The metadata and input are stored and once the portable computing device is in communication with the second computing device displa...

Managing Virtual Ports

Techniques for managing virtual ports are disclosed herein. Each such virtual port may have different associated features such as, for example, privileges, rights or options. When one or more users are in a capture scene of a gesture based system, the system may associate virtual ports with the users and maintain th...

Capturing And Loading Operating Systems States

Operating system states capture and loading technique embodiments are presented that involve the capture and loading of baseline system states. This is accomplished, in one embodiment, by storing the states of a computer's operating system memory that it is desired to restore at a future time. No changes are permitt...

Exception Raised Notification

An exception notification system is described herein that provides an early notification that a software exception has occurred before exception handling code has run. The exception notification system receives a registration request from program code to register a handler to receive an early notification when an ex...

Launcher For Context Based Menus

A launching mechanism for context based menus is provided. A launcher indicator may be provided at a fixed or dynamic location on a user interface enabling a user to activate a context based menu through a variety of touch or gesture actions as well as keyboard mouse or similar device inputs directly related to the ...

Using Attributes To Identify And Filter Pluggable Functionality

In a composition model for large-scale extensible applications, applications are constructed in a modular fashion. The modules integrate with each other by producing and consuming functionality that conforms to a common definition. Producer moduks, and consumer modules are kept independent of one another, and are li...

Fault Tolerant Communications In Routed Networks

A method for providing fault-tolerant network communications between a plurality of nodes for an application, including providing a plurality of initial communications pathways over a plurality of networks coupled between the plurality of nodes, receiving a data packet on a sending node from the applicatfdh, -the s...

Prepaid Or Pay As You Go Software, Content And Services Delivered In A Secure Manner

A computer participates in a system for licensing use in a metered fashion using individual licenses cryptographically linked to the computer and a particular I 2 £ service provider or underwriter. The computer may have a cryptographic Junft,? secure memory, sanction and metering functions as part of a secure...

Processing Unit Enclosed Operating System

A processing unit for use in an electronic device includes standard instruction processing and communication interfaces and also includes functional capability in addition to or in place of those found in an operating system. A secure memory within the processing unit may contain a hardware identifier, policy data ...

Remoting Redirection Layer For Graphics Device Interface

Remoting a display. A method that may be practiced, for example, in a networked computing environment including a local computer system running one or more applications and a remote computer that displays graphical information to a user for the one or more applications at the local computer system. The remote comp...

Tuning Product Policy Using Observed Evidence Of Customer Behavior

A computer adapted for pay-as-you go or other metered use has a policy for| determined what measurements to take to detect fraud as well as steps to take when fraud is found. To optimize between good performance and sufficient tests to reduce the risk of fraud, a policy is developed based on observation of the user...

Type Ahead Keypad Input

Type-ahead keypad input is described. In an embodiment, keypad inputs that are entered as characters of a search term on a keypad of an input device, such as a television remote control, are received by a television-based client device. A user interface displays the keypad inputs as they are received, and displays ...

Initial Server Side Content Rendering For Client Scrip Web Pages

In a distributed computing system including at least one server and at least one client, the server simulates and executes a client-side script that generates the initial content of a Web page. Specifically, the server simulates a client-side execution environment to run the client-side script that generates the ini...

Server Side Service Framework

Supplementing the traditional means of exposing a server service through a URL that maps to a physical file with a special extension containing the service, a pseudo virtual path mapping directly to the service is provided to clients requesting the service. The pseudo virtual path includes a special token that ident...

Script Application Framework

A script application framework is provided to abstract common scripting patterns and to provide a structure for scripting. The script application framework encapsulates scripting logic into script components, manages lifetime of script objects, and builds relationships among different script objects. The script appl...

Providing Consistent Application Aware Firewall Traversal

Implementations of the present invention relate to a communication framework that is readily adaptable to a wide variety of resources intended to be accessible through a firewall. In general, a communication framework at a gateway server can provide a specific connection to a requested resource in accordance with a ...

Sharing A Port With Multiple Processes

A port listening service operating in at system level is assigned to listen on a static port. The static port can index a plurality of unique IDs associated with a plurality of applications operating in a session level. The server application can then provide to a client the unique connection ID, the IP address of t...

Preservation Of Type Information Between A Client And Server

In a distributed computing system containing multiple entities such as servers and clients, an object passed between the entities is attached with metadata identifying the type of the object and/or types and values of properties associated with the object. Before the object is passed to an entity in the distributed ...

Delivering Policy Updates For Protected Content

Various embodiments permit policy updates, such as DRM policy to be delivered and updated for a given piece of protected content. In at least some embodiments, various protocols can be extended to permit policy updates to be represented and carried by the protocol. In one embodiment, Hypertext Transport Protocol or...

Gpu Timeline With Render Ahead Queue

Video editing and video playback utilizing a render-ahead queue for storing rendered video frames. The render-ahead queue facilitates the smooth playback of video in forward and reverse timeline direction, avoiding video glitches that occur when video frames are rendered at a rate that is less than the timeline rate...

Single View Of Data In Networked Computer System With Distributed Storage

A host computer system obtains a request for an aggregated view of content in a computer network corresponding to a criterion. The host computer system queries networked computer systems to identify data objects according to the criterion. Each responding computer system provides an identification set of specified d...

Paging Hierarchical Data

Architecture that provides the ability to intelligently page (slice) hierarchical datasets through viewing operations of a hierarchical view. This further provides the capability to make additions to/deletions from the hierarchy view and manage the parent/child relationship of view records without ever sending the e...

Displaying Transition Images During A Slide Transition

One or more transition images are displayed during a transition period between a display of slides within a presentation. The displayed transition images include images of different slides that are contained within the presentation. The transition images provide the audience with a glimpse of slides that are display...

"Entertainment Access Service"

This document describes tools capable of managing digital content based on a user"s identity. By so doing, the tools free people from the limitations of their storage media and devices. If a user"s CD breaks or hard drive fails, the tools permit a user to continuing accessing his content. If a user wants to use a ne...

Interaction Model To Migrate States And Data

A party associated with a digital license is identified from a digital license bound to a user's user ID. This digital license identifies a set of rights for a software product. A determination is made as to when an additional sale associated with the software license is made, and an indication that the party is rec...

Multimodal Conversation Park And Retrieval

Established multimodal conversations are enabled to be parked within an enhanced communication system such that a subscriber of the system can be notified through a variety of means and enabled to retrieve selected or all modalities for continuing the conversation. Different modalities may be parked together or sepa...

Trusted Device Specific Authentication

An authentication system combines device credential verification with user credential verification to provide a more robust authentication mechanism that is convenient to the user and effective across enterprise boundaries. In one implementation, user credential verification and device credential verification are co...

Defining, Distributing And Presenting Device Experiences

Platforms and techniques for defining, authorizing/authenticating, distributing, and presenting dynamic device experiences using a number of hierarchically-related, declarative language data structures, such as extensible markup language ("XML") elements or attributes. A dynamic device experience is presented when t...

Mapping Universal Plug And Play Discovered Items To An Smb Location

ABSTRACT OF THE DISCLOSURE MAPPING UNIVERSAL PLUG AND PLAY DISCOVERED ITEMS TO AN SMB LOCATION An arrangement is provided in which a Univeral Plug and Play (UPnP) device exposes a service for mapping a UPnP discovered content item to a server message block (SMB) location. The service is arranged to expose an SMB ...

Feed And Email Content

System(s) and/or method(s) ("tools") are described that present content in a user interface tailored to trait(s) of the content. The tools can analyze content to determine its traits, classify the content based on its traits, and present the content in a user interface tailored to the classification. The tools can ...

"Collaborative Downloading For Multi Homed Wireless Devices"

A system is disclosed for collaborative downloading that uses both the WLAN and the WWAN in combination, in an attempt to bridge the range-speed dichotomy. Devices in close vicinity band together their WWAN links, with the high-speed WLAN serving as the glue, to boost the effective wide-area bandwidth available to t...

Securing Network Services Using Network Action Control Lists

A computer system having secured network services is presented. The computer system comprises a processor, a memory, and a network action processing module. The network action processing module processes network actions from one or more network services executing on the computer system. The computer system is furthe...

Playback System For Synchronously Managing Graphics, Audio, And Video Multimedia Objects

A security system is described which controls the access of applications to system resources in the field of interactive multimedia. The system establishes a framework for application security, including a signature system, and further provides file formats that support security. Signed applications are afforded hig...

Merging Search Results

Merging search results is required, for example, where an information retrieval system issues a query to multiple sources and obtains multiple results lists. In an embodiment a search engine at an Enterprise domain sends a query to the Enterprise search engine and also to a public Internet search engine. In embodime...

Pre Populated Search Results In Electronic Program Guide Data

Pre-populated search results in electronic program guide (EPG) data is described. In an embodiment, EPG data includes asset information which corresponds to a media content asset where a value is associated with a descriptor category to describe the media content asset, and a tag is associated with the value to pre-...

Location Based, Software Control Of Mobile Devices

ABSTRACT [0060] Methods are disclosed for controlling mobile computing devices such as laptops, PDAs and cellular telephones, based on their location. A mobile computing device may include a software-rendered map of defined geographic regions, location handlers for defining behavior of a mobile device in a given ge...

Back Off Mechanism For Search

Indexing documents is performed using low priority I/O requests. This aspect can be implemented in systems having an operating system that supports at least two priority levels for I/O requests to its filing system. Low priority I/O requests can be used for accessing documents to be indexed. Low priority I/O request...

Active Content Trust Model

A computer-implemented method of providing security in a help system includes receiving a call from a calling application to access active content. A determination is made, based on predetermined criteria, which execution mode to use to access the active content. The active content is then accessed in the determined...

Hybrid Mobile Phone Geopositioning

A hybrid positioning system for continuously and accurately determining a location of a mobile device is provided. Samples of GPS locations from a pool of mobile devices and accompanying cell tower data WLAN data or other comparable network signals are used to construct a dynamic map of particular regions. The dynam...

Regaining Control Of A Processing Resource That Executes An External Execution Context

A scheduler in a process of a computer system allows an external execution context to execute on a processing resource allocated to the scheduler. The scheduler provides control of the processing resource to the external execution context. The scheduler registers for a notification of an exit event associated with t...

Blocking And Bounding Wrapper For Thread Safe Data Collections

A membership interface provides procedure headings to add and remove elements of a data collection, without specifying the organizational structure of the data collection. A membership implementation associated with the membership interface provides thread-safe operations to implement the interface procedures. A blo...

Advanced Bi Directional Predictive Coding Of Interlaced Video

For interlaced B-fields or interlaced B-frames, forward motion vectors are predicted by an encoder/decoder using forward motion vectors from a forward motion vector buffer, and backward motion vectors are predicted using backward motion vectors from a backward motion vector buffer. The resulting motion vectors are ...

Delivering Messages Using User Defined Agents

User-defined agents and connectors are defined to process messages for a messaging application. The user-defined agents are configured to extend the capabilities of the messaging application. Each user-defined agent is associated with a connector that is configured to route messages for a particular address space ac...

Agile Data Center Network Architecture

This patent application relates to an agile network architecture that can be employed in data centers, among others. One implementation provides a virtual layer-2 network connecting machines of a layer-3 infrastructure. FIG.1

A Method Executed At Least In Part In A Mobile Device For Displaying A Street View Of A Location On The Mobile Device

Intuitive and user friendly user interface (UI) techniques are provided for navigating street view applications on a mobile device enabling users to view different angles and segments of available street level images. Additionally retrieval and presentation of street view images are managed to mitigate delays in ret...

Simulated Video With Extra Viewpoints And Enhanced Resolution For Traffic Cameras

Simulated high resolution multi view video based on video input from low resolution single direction cameras is provided. Video received from traffic cameras security cameras monitoring cameras and comparable ones is fused with patches from a database of pre captured images and/or temporally shifted video to create ...

Moving Data From File On Storage Volume To Alternate Location To Free Space

To reconstitute a ghosted file for use, a single ghosting filter on a computing device locates ghosting information in the metadata of the ghosted file and locates within the ghosting information an identification of a particular ghosting manager of the computing device, where the identified ghosting manager is resp...

Account Synchronization For Common Identity In An Unmanaged Network

A platform supports an unmanaged secured workgroup, without a server, for common user access and secure resource sharing among the computers in the group. User accounts are synchronized by replicating and modifying the accounts at each computer of the unmanaged secured workgroup. A computer advertises a change in ac...

Background Network Bandwidth Sharing Behind Gateway Devices

Example embodiments allow a local network client to access information about a shared gateway to determine its actual amount of bandwidth consumption. The client can also obtain the total capacity of such shared gateway. Using its knowledge of its own bandwidth consumption, it can determine the other local network c...

Smooth Transitions Between Animations

Smooth transitions between rich media (e.g., animations of visual elements of a UI) are provided when a "second" animation is started on a property of a visual element for which a "first" animation is already running. When the second animation is started, an animation system causes a current value of the property th...

Rich Drag Drop User Interface

ABSTRACT In an electronic file system, preview information is provided to the user during a drag operation of a selected object onto a target object. The information indicates what type(s) of action is to be taken should the selected object be dropped onto the target object. The action(s) to be taken may depend upo...

Temporary Domain Membership For Content Sharing

In accordance with one or more aspects, a first device receives a digital certificate of a second device. The first device generates a digitally signed temporary domain join request and sends the request to a domain controller. The domain controller generates, for the first device, a temporary domain certificate all...

Generating Text Manipulation Programs Using Input Output Examples

A program creation system is described which generates a data manipulation program based on input output examples. The created program may include a collection of subprograms together with a collection of corresponding selection conditions. When a new input item is received a program execution module uses the select...

Feature Set Differentiation By Tenant And User

A system for online collaboration includes an application for online collaboration the application including an application feature set a control module programmed to receive a request from a user to access a tenancy associated with the application on the system the tenancy including a site provisioned for a tenant ...

Copying Of Animation Effects From A Source Object To At Least One Target Object

A method and a processing device may be provided for copying animation effects of a source object to one or more target objects of a presentation. The source object and the target objects may be included in presentation templates, or presentation slides of presentation files. The one or more target objects may be in...

Automated Content Submission To A Share Site

Methods  systems  and computer-readable media for remotely submitting content to a website without navigating to the website are provided. The website is a content-sharing website that accepts public content submissions and makes the content available to multiple users. Initially  a client application may download r...

Techniques For Peforming Symmetric Cryptography

Techniques are described for performing decryption using a key-specific decryption engine. A message including an encrypted data portion is received. The encrypted data portion is formed by performing a symmetric encryption operation using a symmetric key. The encrypted data portion is decrypted using a key-specific...

Large Character Set Handling In Limited Devices

Limited devices have memories that are typically too small to store a complete font having an extended character set. The ability to handle necessary characters can be provided by leveraging connectivity of a limited device to a PC or server without requiring significant bandwidth or substantially reducing performan...

Image Blending

Previously, Poisson blending has been used for image blending including cloning an object onto a target background and blending pairs of source images together. Such Poisson blending works well in many situations. However, whilst this method is always workable, we have found that discolorations sometimes occur. We r...

Systems And Methods For Applying Animations Or Motions To A Character

An virtual character such as an on-screen object, an avatar, an on-screen character, or the like may be animated using a live motion of a user and a pre-recorded motion. For example, a live motion of a user may be captured and a pre-recorded motion such as a pre recorded artist generated motion, a pre-recorded motio...

Gesture Shortcuts

Systems, methods and computer readable media are disclosed for gesture shortcuts. A user's movement or body position is captured by a capture device of a system, and is used as input to control the system. For a system-recognized gesture, there may be a full version of the gesture and a shortcut of the gesture. Wher...

Avatar Integrated Shared Media Selection

A method and system are disclosed in which a group of people are able to replicate the physical world experience of going with a group of friends to pick a movie, watch the movie together, and provide commentary on the movie itself in the virtual world on a virtual couch while each user is sitting in different physi...

Swarm Based Synchronization Over A Network Of Object Stores

An object set may be redundantly stored by a set of computers, each configured to store a local representation of corresponding objects. When a computer changes the object set (e.g., by adding or altering an object), the updated object may be synchronized across the computers by iteratively forming and using an ad h...

Utilizing Server Pre Processing To Deploy Renditions Of Electronic Documents In A Computer Network

Embodiments are provided for utilizing server pre-processing to deploy static renditions of electronic documents in a computer network. An electronic document may be published from a client computer to a first server computer in the computer network. During publication, the first server computer may create a static ...

Web Application Home Button

Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments client side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction and have those bounda...

Checkpoints For A File System

Aspects of the subject matter described herein relate to checkpoints for a file system. In aspects updates to the file system are organized into checkpoint buckets. When a checkpoint is desired subsequent updates are directed to another checkpoint bucket. After global tables have been updated for updates in the curr...

Avatar Integrated Shared Media Experience

A method and system are disclosed in which a group of people are able to replicate the physical world experience of going with a group of friends to pick a movie, watch the movie together, and provide commentary on the movie itself in the virtual world on a virtual couch while each user is sitting in different physi...

Role Based Presentation Views

A presentation state that includes a presentation and other information is synchronized between one or more client computers executing a presentation client application. A client computer executing the presentation client application receives the presentation state including the presentation and is assigned a role. ...

Augmentation And Correction Of Location Based Data Through User Feedback

User feedback such as "crowd sourcing" is utilized for supplementing and correcting augmented location information like augmented maps and/or street view images. User feedback on missing or incorrect information is elicited through "treasure hunt" style augmented reality games monetary or similar rewards and compara...

Video Rate Control Based On Transform Coefficients Histogram

A quantization factor is determined using information from a histogram of transform coefficients that are produced from a transformed video frame. The histogram is used in estimating an encoded frame size of the video frame that is currently in the process of being encoded. The quantization factor used in the quanti...

Providing Search Results To A Computing Device

Systems and methods for providing search results to a mobile computing device are provided herein. One exemplary method includes receiving a search request from the mobile computing device, where the search request includes location data identifying a location of the mobile computing device. If the search request in...

Touch Anywhere To Speak

The present invention provides a user interface for providing press-to-talk-interaction via utilization of a touch-anywhere-to-speak module on a mobile computing device. Upon receiving an indication of a touch anywhere on the screen of a touch screen interface, the touch-anywhere-to-speak module activates the listen...

Search Index Format Optimizations

[0057] A search index structure which extends a typical composite index by incorporating an index which is optimized for fast retrieval from storage and which eliminates data which is specific to phrase searching. Other data is represented in a manner which allows it to be calculated rather than stored. Associating ...

Synchronizing Virtual Machine And Application Life Cycles

A virtual environment can be configured to coordinate life cycles of virtual machines and application programs executing therein. In one implementation, the virtual environment includes an application layer and a virtual machine layer. The application layer communicates with the virtual machine layer to coordinate a...

Handling Payment Receipts With A Receipt Store

A receipt store may be provided as a service. Electronic payment receipts generated in any type of transaction may be delivered to the receipt store. A customer may subscribe to a particular receipt store, to be used as a repository for that customer"s receipts. The customer may carry a device that is used to commun...

Data Center Interconnect And Traffic Engineering

[00101] A system for commoditizing data center networking is disclosed. The system includes an interconnection topology for a data center having a plurality of servers and a plurality of nodes of a network in the data center through which data packets may be routed. The system uses a routing scheme where the routing...

3 D Content Aggregation Built Into Devices

The claimed subject matter provides a system and/or a method that facilitates capturing a portion 2-dimensional (2D) data for implementation within a 3-dimentional (3D) virtual environment. A device that can capture one or more 2D images, wherein the 2D image is representative of a corporeal object from a perspectiv...

Virtual Controller For Visual Displays

ABSTRACT VIRTUAL CONTROLLER FOR VISUAL DISPLAYS Virtual controllers for visual displays are described. In one implementation, a camera captures an image of hands against a background. The image is segmented into hand areas and background areas. Various hand and finger gestures isolate parts of the background into i...

Coding And Decoding For Interlaced Video

Various techniques and tools for coding and decoding interlaced video are described, including (1) hybrid motion vector prediction for interlaced forward-predicted fields, (2) using motion vector block patterns, (3) selecting between dominant and non-dominant polarities for motion vector predictors, (4) joint coding...

Managing Associations In Ad Hoc Networks

ABSTRACT MANAGING ASSOCIATIONS IN AD HOC NETWORKS A first wireless devices establishes an association with a second wireless device by sending a connection request packet to a previously-discovered second wireless device. The second wireless device identifies the received packet as a connection request and respond...

"Testing Packages"

A system, method, and data structure for testing packages are described. Tests may be combined into testing packages at testing packages user interface (301) to make testing of computer systems easier for developers. Testing packages may be sets of one or more testing procedures that may be applied to computer syste...

Synchronizing File Partitions Utilizing A Server Storage Model

Embodiments are provided for synchronizing file partitions utilizing a server storage model in a client-server computer network. Edits to content of an electronic document may be received at a client computer. The content may be included in a first partition of a file stored on a server computer. The first partition...

Scrubbing Variable Content Paths

Various embodiments provide techniques for scrubbing variable paths in content. By way of example and not limitation, scrubbing can include receiving user input that defines a scrub path and navigating a data path through content based on the scrub path. According to some embodiments, a data path can include one or ...

Recognition Using Re Recognition And Statistical Classification

Architecture that employs an overall grammar as a set of context-specific grammars for recognition of an input, each responsible for a specific context, such as subtask category, geographic region, etc. The grammars together cover the entire domain. Moreover, multiple recognitions can be run in parallel against the ...

Intelligent Container Index And Search

Aspects are introduced for indexing files and file references within a file container (e.g., a list file, zip file, cabinet file, and so forth). An intelligent protocol handler is created for accessing file containers and selectively indexing their contents in order to prevent duplicate entries of files in search re...

Database Fragment Cloning And Management

Mechanisms and techniques for database fragment cloning and management are provided. A database object, such as a table, rowset or index, is divided into fragments. Each fragment is cloned to create cloned fragments, which operationally are substantially identical to one another. One or more of the cloned fragments ...

Customizing A Search Experience Using Images

Systems methods and computer storage media having computer executable instructions embodied thereon that present images customized for a user. In embodiments a search query input by a user and user data associated with the user are referenced. The search query and/or user data is utilized to select one or more image...

Virtual Magnifying Glass With On The Fly Control Functionalities

A display screen magnifier is controllable by a user to magnify selected portions of a desktop including windows open on the screen. A moveable magnifier frame is provided, within which a magnified image is presented. The magnified image corresponds to screen content located within a magnification region underlying ...

Controlling Access To Software Component State

A request is received from a software component of a software product to access a value of a public setting of the software component. A check is made as to whether the request conforms to an appropriate format for the public setting. If the request conforms to the appropriate format, then the requested access is pe...

Access Control To Secured Application Features Using Client Trust Levels

Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the ...

Presenting Advertisements Based On Web Page Interaction

Embodiments of the invention provide a method, system, and media for presenting advertisements (or other information) based on user interaction with web page. One embodiment of the method includes determining that programmatic code that describes the web page is to be dynamically modified before it is presented on a...

User Avatar Available Across Computing Applications And Devices

An avatar along with its accessories, emotes, and animations may be system provided and omnipresent. In this manner, the avatar and its accessories, emotes, and animations may be available across multiple environments provided or exposed by multiple avatar computing applications, such as computer games, chats, forum...

Transacted Double Buffering For Graphical User Interface Rendering

Technologies are described herein for improving a user experience during the rendering, or repainting, of a graphical interface. A user interface related transaction can be initiated in response to a requested user operation. One or more windows associated with the requested operation can be identified. User interfa...

Method And System Of Using A Local Hosted Cache And Cryptographic Hash Functions To Reduce Network Traffic

The described method and system enables a client at a branch office to retrieve data from a local hosted cache instead of an application server over a WAN to improve latency and reduce overall WAN traffic. A server at the data center may be adapted to provide either a list of hashes or the requested data based on wh...

Techniques For Advertiser Geotargeting Using Map Coordinates

Techniques to provide geo targeted advertising are described. A technique may include displaying a map to an advertiser at a first zoom level. The advertiser may stay at the first zoom level or change to a second zoom level. The advertiser may also create a user defined area of the map. The advertiser may select an ...

Online Service Access Controls Using Scale Out Directory Features

Embodiments provide application and/or resource access control features of an online computing environment but are not so limited. In an embodiment a computer implemented method provides access control features for an online application environment based in part on the use of a number of directory service instances ...

Content Mesh Searching

Described is a technology by which private content maintained behind a firewall (e.g., in a "mesh") may be searched, browsed, and accessed via an index that exists outside of the firewall. Searching of the index may include checking permissions of a user against permissions associated with metadata in the index, e.g...

Optimization Of Storage And Transmission Of Data

The present invention extends to methods systems and computer program products for end to end optimization of data storage and transmission of data. Details of how data is stored within a data store are exposed to clients and applications. Clients and applications are enabled to makes requests to data stores to obta...

Contextual Control Of Dynamic Input Device

A computing system includes one or more input device user interface runtime applications to dynamically display images on a dynamic input device. The one or more input device user interface runtime applications are executed in a currently active desktop. The computing system further includes a dominant application c...

Parametric Font Animation

Font animation technique embodiments are presented which animate alpha-numeric characters of a message or document. In one general embodiment this is accomplished by the sender transmitting parametric information and animation instructions pertaining to the display of characters found in the message or document to a...

Multi Modal Communication Through Modal Specific Interfaces

Technologies are described herein for providing multi-modal communication through modal-specific interfaces. In one method, a communication in a first modality is received from a first interface across a computer network. The communication is converted into a second modality. Upon converting the communication into t...

Dual Layered Access Control List

A layer of abstraction for use by access control lists is provided for the creation and maintenance of user permissions on computer resources. First, a set of permissions can be associated with any number of computer resources. Also, computer resources can store references to any number of sets of permissions, and w...

Media Asset Recommendation Service

A media asset recommendation service is described. In embodiments, friends of a user are identified in a social graph that is associated with the user, and interactions with media assets by the friends of the user are compiled. Friend interaction data for each of the media assets can be determined from the media ass...

Registration Of Street Level Imagery To 3 D Building Models

Point of origin information for image data may be inaccurately registered against a geographic location absolute. A process for aligning image and highly accurate model data adjusts a point of origin of the image data by matching elements in the image with corresponding elements of the model. In a street-level image...

Authorization For Transient Storage Devices With Multiple Authentication Silos

In a transient storage device (TSD) (100) with multiple authentication silos (302, 304, 406, 308, 310), a host computing device connected to the TSD (100) is configured by the TSD (100) to discover and act upon various types of authentication information in the silos. One or more logical combinations of authenticati...

Structured Coauthoring Of A Document

A system is presented for structured coauthoring of a document, the system comprising a server. The server includes one or more documents organized into sections, a document permissions module that stores user access permissions for each section of a document, a document update processing module that processes reque...

Piecewise Planar Reconstruction Of Three Dimensional Scenes

Methods, systems, and computer-readable media for reconstruction a three-dimensional scene from a collection of two-dimensional images are provided. A computerized reconstruction system executes computer vision algorithms on the collection of two-dimensional images to identify candidate planes that are used to model...

Viewer Centric User Interface For Stereoscopic Cinema

Described is a user interface that displays a representation of a stereo scene, and includes interactive mechanisms for changing parameter values that determine the perceived appearance of that scene. The scene is modeled as if viewed from above, including a representation of a viewer's eyes, a representation of a v...

Environment State Changes To Alter Functionality

ABSTRACT OF THE DISCLOSURE ENVIRONMENT STATE CHANGES TO ALTER FUNCTIONALITY In an embodiment, environmental functionality of the system software may be changed by altering guarded system data which may affect behavior of the system software. A user may provide state change information for altering a state of the sy...

Efficient Coding And Decoding Of Transform Blocks

A block transform-based digital media codec more efficiently encodes transform coefficients by jointly-coding non-zero coefficients along with succeeding runs of zero-value coefficients. When a non-zero coefficient is the last in its block, a last indicator is substituted for the run value in the symbol for that coe...

Techniques For Ensuring Authentication And Integrity Of Communications

Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key...

Associating A Telephone Call With A Dialog Based On A Computer Protocol Such As Sip

Providing non-voice capabilities relating to a phone call at a computing device includes receiving a request to begin a telephone call from a first telephone to a second telephone, wherein the requesting is performed using messaging between computing devices connected via a computer network, and wherein the messagin...

Partial Item Change Tracking And Synchronization

Embodiments herein change the way item syncing is handled and tracked between two devices. Changes to items are tracked in accordance with well defined property groups and each group is tracked independently of the other. For example, one group could contain large data items, e.g., attachments, while another group c...

Ranking Functions Using A Biased Click Distance Of A Document On A Network

Methods of providing a document relevance score to a document on a network are disclosed. Computer readable medium having stored thereon computer-executable instructions for performing a method of providing a document relevance score to a document on a network are also disclosed. Further, computing systems containin...

Customizable Spreadsheet Table Styles

Table styles provide a way to format an entire spreadsheet table quickly and easily. According to described implementations, table styles can be created and customized for repeated use in a spreadsheet application. As a result, a user does not have to manually modify multiple formatting options for each table includ...

Integrating Digital Book And Zoom Interface Displays

In accordance with one or more aspects, different pages of a digital book are displayed in each of two display areas of a device using a book display model. In response to a request to semantically zoom out, the digital book is displayed in a broader context, the broader context using a context display model rather ...

Synchronized Distributed Media Assets

Synchronized distributed media assets is described. In embodiments, a global media catalog of global metadata is maintained for media assets that are accessible by client devices registered to a user. The global metadata corresponds to the media assets that are located remotely from one or more of the client devices...

Social Graph Playlist Service

A social graph playlist service is described. In embodiments, a social graph that associates a user and friends of the user is maintained. The social graph is based on parameters that define a social relationship between the user and the friends of the user. Interaction data that identifies recently played media ass...

Remote Access Control Of Storage Devices

An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storag...

Solver Based Visualization Framework

Visualization frameworks may include solvers. The solvers may be used to determine the properties of view components of view compositions. In some instances, the solvers may be explicitly composed using a relational structure, such as a dependency tree. In some instances, the solvers may be implicitly composed based...

Searching Regular Expressions With Virtualized Massively Parallel Programmable Hardware

Logic and state information suitable for execution on a programmable hardware device may be generated from a task, such as evaluating a regular expression against a corpus. Hardware capacity requirements of the logic and state information on the programmable hardware device may be estimated. Once estimated, a plural...

Adaptive Coding And Decoding Of Wide Range Coefficients

A block transform-based digital media codec more efficiently encodes wide dynamic range transform coefficients in two parts: a normalized coefficient and bin address. The normalized coefficient relates to a grouping of coefficient values of the wide dynamic range into bins, whereas the bin address is an index of the...

Prediction Of Transform Coefficients For Image Compression

A block transform-based digital media codec uses a transform coefficient prediction that takes into account a dominant directionality of the digital media data (e.g., an image with strong horizontal or vertical features), and further operates compatibly with a two-stage transform. For DC and DCAC coefficients from a...

Media Content Service For Renting Jukeboxes And Playlists Adapted For Personal Media Players

An online media content service is adapted for use with a personal media player (125) to provide targeted media content (131) to the player (125) on a rental basis and is architected to enable users to access music using new models. The targeted media content (131) includes content that has special context or meanin...

"Automated Generation Of Message Exchange Pattern Simulation Code"

Mechanisms for automatically generating code that tests capabilities of a test computing system to simulate a message exchange pattern. The code generation computing system uses a message exchange pattern definition to generate the simulation code. For each state in which the message exchange pattern definition allo...

"Communication Channel Model"

The present invention provides for a channel model capable of generating a runtime communication channel with pluggable modular channel components. These channel components implement one of a set of standard interfaces that allow processing details of communication semantics between components to be represented in a...

Markup Based Extensibility For User Interfaces

Methods, systems, and computer products are provided for exposing the programming of an application user interface to allow modification of the associated user interface to include adding, removing, disabling, enabling and repurposing new or existing user interface components.

Device To Pc Authentication For Real Time Communications

ABSTRACT DKVICK TO PC AUTHENTICATION FOR REAL IIMK CO M MU NIC AITONS A mcfhod tor securely pairing an II' phone uitil a compuling device during VoIP conimuniealion on an fP ncnvork comprising a plurality of IP phoncs and computing devices is disclosed. The method pairs an IP phone with a computing deviee. the IP...

"Mechanisms For Transferring Raw Data From One Data Structure To Another Representing The Same Item"

The transfer of raw data from a source data structure to a target data structure that represent the same item. During the data transfer, if there is a given field in the target data structure that does not correspond to a field supplied by the source data structure, the transfer mechanism determines whether or not i...

"Security Critical Data Containers"

Described are security critical data containers for platform code, comprising a Get container and Set container that allow data to be marked as security critical for critical usage of that data, but left unmarked for non-critical usage. The number of critical methods in the code is reduced, facilitating better code ...

"Maping Between Object Oriented And Service Oriented Representations Of A Distributed Application"

The present invention extends to mapping between object oriented and service oriented representations of a distributed application. A computer system accesses an annotated object oriented representation of a service, which is annotated with service description attributes mapping included objects to corresponding ser...

"Retry Strategies For Use In A Streaming Environment"

Strategies are described for performing retry analysis in an environment which involves the transmission of media information from a source module to a target module. In the context of the source module, the retry analysis determines whether the source module should satisfy the retry requests issued by the target mo...

"Mixed Media Service Collections For Multimedia Platforms"

A mixed-media service collection for multimedia platforms allows simultaneous access to various mixed-media services for rendering multimedia content, depending on current client conditions. In one implementation, in response to the client accessing a service collection, for example, by changing channels, only some ...

"System And Method For Building And Using Communication Binding Objects"

The present invention provides for an automated, user friendly way of constructing and using a binding object. A developer is presenting and selects binding elements that will ultimately be used to create a runtime communication channel for transporting a message between a client and service endpoint. After receivin...

"Utilizing Abstract Description To Generate, Exchange And Configure Service And Client Runtimes"

The present invention extends utilizing abstract descriptions to generate, exchange, and configure service and client runtimes. A computer system parses compiled code and potentially optional configuration information for implementing a service and converts the compiled code and any configuration information into an...

Networking Through Electronic Messaging And Mail

A social networking service is integrated with a traditional communication service. The communication service may include an instant messaging service, an electronic mail service, a content page management service, or other communication service. The communication service provides one or more interfaces allowing a u...

"Mechanism For Preserving Session State When Using An Access Limited Buffer"

Preserving session state correlation in a distributed computing environment in which a service module instance receives messages from a general input buffer. The general input buffer is not accessed by a service module instance one the service module instance is determined to be recycled. After the service module in...

"Local Localization Using Fast Image Match"

An efficient technique is disclosed for determining a portion of a document corresponding to a captured image. When a user employs a pen to create a stroke in a document, images of the document are captured by a camera mounted on the pen. While the location of some of the images will be determined from, for example,...

"Baseline Architecture Monitor Application For Distributed Systems"

A system for presenting a visual representation of a computing system is disclosed. The system comprises a matching engine that accesses a data store of patterns that can be used as composable design elements to map components of a computing system to a pattern. The system further comprises a visualizer that present...

"A System For Adapting To A Computing Environment"

An improved system and method for a context-awareness that may be used to adapt an execution environment is provided. A framework with interfaces for setting, tracking, and getting context information about the execution environment of a computer system includes a context engine and a unified data store for ag...

"System Controal By Stylus Location

A system and method for controlling a stylus-based computer based on the location of a stylus is described. In some aspects, removing a stylus from storage may turn on the computer system. In other aspects, power consumed by a digitizer may be modified in accordance with the location of a stylus. ...

Method Of Speech Reconnition Using Multimodal Variational Inference With Switching State Space Models

A method of efficently setting posterior probility parameters for a switching state space model begins by defining a window containing at least two but fewer than all of the framess. A separate posterior probability parameter is determined for each frame in the window. The window is then shifted sequentially from le...

Systems And Methods For Constructing And Using Models Of Memorability In Computing And Communications Applications

One or more models of memorability are provided that facilitate various computer-based applications including those centering on the storage,retrieval,and processing of information, applications that remind people about items they risk not recalling or overlooking,and facilitating communications of reminders.In one ...

"System And Method For Storing A Document In A Serial Binary Format"

A computer-readable medium having a data structure for storing document data in a serialized binary format so that the document data is accessible to other applications. A document structure is generated that includes root node data. The document is stored in a serial binary data format. The serial binary forma...

Detection Of Code Free Files

Detection of code-free files is described. According to one implementation, an input file is parsed to recognize a file format. Contents of the input file are checked according to the recognized file format, if available, in an effort to determine whether executable code might exist within the input file. A status i...

On Device Application Catalog Updated By Management Servers

Embodiments of the present invention relate to methods, systems, and computer-readable media for providing software applications to a mobile device. A server receives a request for an application identified in an application catalog stored on the server. A push message is generated based on the request for the appli...

Automatic Speech Recognition Learing Using User Corrections

A computer-implemented speech recognition system comprising: a microphone to receive user speech; a speech recognition engine coupled to the microphone, and being adapted to recongnize the user speech adn provide a textual output on a user interface; and wherein the system is adapted to recognize a user changing t...

Infrequent Word Index For Document Indexes

A documents indexing system utilizes two indexes. An infrequent word index is maintained separately from a frequent word index to map the locations of words that occur infrequently in the indexed documents. The infrequent word index may be stored and partitioned differently than the frequent word index to promote ef...

Image Based Document Indexing And Retrieval

A system for document retrieval and/or indexing comprising: a component that recieves a captured image of at least a porton of a physical document; and a search component that locates a match to the document, the search is performed over word-level topological properties of generated images, the generated images b...

Adaptive Dispathch Of Recevied Messages To Code Ueing Interpositioned Message Modification

Mechanisms in which upon receiving a message, the message is passed through one or more receiving path components that are positioned in the receiving path of the message prior to being passed to a dispatching component. One more of the receiving path components may modify the message to include information that may...

System And Methods For Controlling A Visible Results Set

A computerized interface for data presentation, comprising: a sorting component to determine categories relating to one or more items for display; and a cluster component that groups the categories according to discretized states in order to control visible output to the display.

Projection System And Method

A method and system are provided for projection a three dimensional image. A projection system may include a holding tank for storing a reservoir containing a projection medium and a projector including a plurality of valves for projecting the medium from the holding tank. The projection system may also include an i...

Enhanced Approach Of M Array Decoding And Error Correction

A process and apparatus for determining the location of a captured array from a larger image is described. A non-repeating sequence may beb folded into a non-repeating array in which the array is unique for every neighboring window of a given size. A portion of the array of the neighboring window may be captured and...

"Method And System For Placing Restrictions On Sessions"

A method and system for initiating a communications session with a restriction is provided. A communications system allows a user to place a restriction on a session to be conducted with another user. If the other user does not agree to the restriction or if the other user's system does not support the restriction, ...

Methods And Systems For Mobile Device Messaging

Embodiments of the present invention relate to methods, systems, and computer-readable media for mobile device messaging. Mobile device messaging comprises collecting from an originating system information including content data to be sent to the mobile device. One or more short messages are generating for encapsula...

Smart Dial Content Search

The present invention provides a method and system for finding and accessing a contact quickly and easily by filtering and searching through all of the sontacts stored in the device based on user input. The filtered contacts may be readily accessed by various applications that use the contact information. When filte...

Method And System For Pinning Contacts And Items

The present invention provides a method and system of pinning adn displaying pinned items. Pinned items are displayed such that they are visually distinguishable and prioritized higher than related non-pinned items. For examle, pinned contacts are displyed at the top of the contact list and are visually distinguisha...

Segmental Tonal Modeling For Tonal Languages

A speech processing system adapted to receive an input related to one of speech and text and process the input to provide an output related to one of speech and text, the speech processing system accessing a module derived from a phone set having a plurality of phones for a tonal language, the phones being used to m...

Power Management For A Network

A method for power management of a network including a plurality of computing devices, comprising: identifying an order of flows between one or more computing devices within a prescribed time period; and reducing a number of wakeups for at least one computing device by increasing a number of adjacent flows that s...

"Discoverability Of Tasks Using Active Content Wizards And Help Files The What Can I Do Now? Feature"

A computer implemented method of suggesting tasks to a user based upon their graphical user interface (GUI) browsing behavior is provided. In the method, a GUI element is selected or identified based upon the user's browsing behavior, for example based upon the user hovering a pointer over the GUI element. Base...

Offline Global Address List

A method for populating a list of GAL contacts on a device, comprising: automatically selecting global address list (GAL) conacts for a user that are unique from the user"s personal conacts; preparing the GAL contacts; and providing the GAL contacts to a device.

"Method Adn System For Automatically Determining Differences In A User Interface Throughout A Development Cycle"

A computer-implemented method for user interface testing, comprising: taking a first snapshot recording pixels presenting a user interface on a target device during a first automation execution; taking a second snapshot recording pixels presenting the user interface on the target device during a second automation ...

"Application Object As Primitive Of Operating System"

Managing applications associated with an operating system. An application object is defined as a primitive of the operating system. An identity property of the application object identifies at least one application associated with the operating system and a metadata property of the application object declares...

System And Method For A Unified And Blended Search

A method for facilitating a search for content from disparate resources, the method comprising: displaying a unified search entry interface in response to a request to search for content; determining at least one relevant resource from a plurality of disparate resources in which to search for occurrences of a sear...

Systems And Methods That Optimize Row Level Database Security

A database security system, comprising: a component that employs a structure query language (SQL) to cluster one or more sets of data set rows with similar security characteristics and treat the clustered rows as a named expression.

Insertion Location Tracking For Controlling A User Interface

Techniques are disclosed for controlling the behavior of a data entry user interface, such as a data input panel, based upon the status of an insertion location. For example, both the position and content of a data input panel are provided based upon the detected characteristics of the insertion location. Further, a...

Method And System For Masking Dynamic Regions In A User Interface To Enable Testing Of User Interface Consistency

A system and method for masking dynamic regions of a user interface that assist in testing of the static user interface layout. The masking regions are used to eliminate the regions of the user interface layout that are expected to change during a verification process. The present invention allows a user to add mask...

Method And System For Automatically Determining Differences In A User Interface Throughout A Development Cycle

A method and system for automatically determining the differences in a mobile device user interface throughout a development cycle. A test automation is run to exercise a target device"s user interface. While the user interface is exercised, an extension is activated that takes snapshots of hte user interface output...

Deterministic Rule Based Dispatch Of Objects To Code

Determininstic rule-based dispatch of the data structure to a group of one or more methods. After accessing the data structure to be processed, a lis of rules is evaluated to identify multiple rules that apply to the dispatch of the data structure. Each of these multiple rules specifies a different group of one or m...

Systems And Methods For Generating Audio Thumbnails

A system for summarizing audio information, comprising: an analyzer to convert audio into frames a fingerprinting componentto convert the frames into fingerprints, each fingerprint based in part on a plurality of frames; a similarity detector to compute similarities between fingerprints; a heuristicmodule to ge...

Method Adn Apparatus For Visually Emphasizing Numerical Data Contained Within An Electronic Document

A method and apparatus are provided for visually emphasizing all of the numerical data contained in an electronic document. A determination is made as to whether a request to emphasize all of the numerical data in the electronic document has been received. If such a request is received, all of the numerical data wit...

"Channel Selection In Wireless Networks With Network Nodes Equipped With More Than One Radio Transceiver"

An invention is disclosed whereby a wireless network node, equipped with two or more radio transceivers statically tuned to non-interfering frequency channels, can make decisions regarding which channel to use when communicating with a neighboring wireless node. A multi-radio unification protocol implemented in a wi...

"Flexible Licensing Architecture For Licensing Digital Application"

An application includes a plurality of features. A transaction is engaged with a retailer to obtain a product license corresponding to the application. The product license defines at least one feature of the application that may be employed. A base copy of the application is obtained from a distributor and is actuat...

Voice Over Internet Protocol (Viop) Management

Techniques are described herein which are operable to manage Voice over Internet Protocol (VoIP) communication.

Security Language Translations With Logic Resolution

ABSTRACT SECURITY LANGUAGE TRANSLATIONS WITH LOGIC RESOLUTION Security language constructs may be translated into logic language constructs and vice versa. Logic resolution may be effected using, for example, the logic language constructs. In an example implementation, translation of a security language assertion...

Style Aware Use Of Writing Input

Techniques for processing handwriting input based upon a user's writing style. Some techniques employ the style in which the user writes a single character, while other techniques alternately or additionally employ a group of allographs that form a handwriting style. Some implementations of these techniques, such as...

Distributed Hardware State Management In Virtual Machines

ABSTRACT DISTRIBUTED HARDWARE STATE MANAGEMENT IN VIRTUAL MACHINES Mechanisms are disclosed herein that manage operations in virtual machine environments. A first partition can have a proxy driver object corresponding to a driver object in a second partition. The driver object can control a physical device, but bec...

"Entity Lookup System"

In an electronic document such as a map, an entity lookup system associates primitive data with entity data though parallel or corresponding grids of a primitive quadtree and an entity quad-tree. A key is assigned to grids in the primitive quad-tree in association to particular grids in the entity quad-tree. ...

Difference Analysis For Electronic Data Interchange (Edi) Data Dictonary

ABSTRACT DIFFERENCE ANALYSIS FOR ELECTRONIC DATA INTERCHANGE (EDI) DATA DICTIONARY A tree based EDI data dictionary difference analysis tool is provided that performs an analysis of tree structures of EDI building blocks that compose EDI schema to determine and display change histories for particular versions, or ...

Multimedia Color Management System

A color management system is described herein. Various embodiments of a method described herein can include receiving source color content that is associated with a source device, and transforming the source color content into destination color content for rendering on one or more destination devices. Various embodi...

Incorporation Of Speech Engine Training Into Interactive User Tutorial

The present invention combines speech recognition tutorial training with speech recognizer voice training. The system prompts the user for speech data and simulates, with predefined screenshots, what happens when speech commands are received. At each step in the tutorial process, when the user is prompted for an inp...

Training Convolutional Neural Networks On Graphics Processing Units

A convolutional neural network is implemented on a graphics processing unit The network is then trained through a series of forward and backward passes, with convolutional kernels and bias matrices modified on each backward pass according to a gradient of an error function. The implementation takes advantage of para...

Method For Generating Web Content

An architecture for presenting web content that modularizes the various components of that content. A "wire frame" defines spatial regions of a page of content. The regions are called "slots." A "view" defines a mapping or binding between the slots in a wire frame, and objects that generate content. A rendering engi...

"System And Method For Testing A Data Format Using Targeted Variant Input"

The value of one or more selected nodes in a data format definition may be substituted with a variant placeholder. At runtime, when an input token stream is generated from the data format definition, each variant placeholder will be replaced with a random value, thereby providing targeted variant input. ...

Auxilary Display Device Driver Interface (Ddi)

In a main computer system coupled to an auxiliary display device, described is an interface set for implementation by an auxiliary display device driver, to couple the driver to an auxiliary display platform. Commands received from the auxiliary display platform may be handled by code external to the driver...

Hierarchical Virtualization With A Multi Level Virtualization Mechanism

Hierarchical virtualization is disclosed, where such virtualization can be accomplished with a multi-level mechanism. The hierarchical virtualization includes using a hypervisor that maintains a first partition and using a virtualization stack within the first partition to create and control a second partition. Mult...

"Method And System For Forwarding Telephone Calls Based On Presence Information"

A call forwarding system forwards telephone calls based on presence information of a user as reported by computing devices associated with a telephone number. When a telephone system receives an incoming call directed to one of the telephone numbers of the user's computing devices, it sends an incoming call event to...

Tying A Digital License To A User And Tying To Multiple Computing Devices In A Digital Rights Management (Drm) System

A first trusted component on a first computing device performs cryptography, evaluation, and enforcement and is tied thereto, and a first user-machine certificate associated with the first computing device is tied to a user. Correspondingly, a second trusted computing device perform cryptography, evaluation, and enf...

"Using Existing Content To Generate Active Content Wizard Executables For Execution Of Tasks"

A computer implemented method of converting existing content files into an active content wizard executable file is provided, along with systems and tools for doing the same. In the method, an existing content file is converted into a corresponding file in an active content wizard schema. A database of user in...

"Kinetic Energy Utilizing Input Device"

1. A wireless user input device for communicating a user input to a computer, comprising: a) a user input detecting element that detects a user input; b) a kinetic energy converting device that converts kinetic energy supplied to the user input device by the user to electrical energy; c) a transmitter in communic...

"System And Method For Applying Flexible Attributes To Execute Asynchronous Network Requests"

Flexible attributes are attached to network requests that may be executed asynchronously. Any number of criteria may be attached to network requests. The requests are queued until the associated criteria are satisfied. Once the criteria are satisfied, the request is executed. Applications that make the reque...

"Contact Sidebar Tile"

In a system capable of real-time communication with one or more contacts at one or more other systems, a method of tracking real-time communication data, within a single contact tracking application that tracks real-time communication data for real-time communication using any of a plurality of diverse real-time com...

Integrating Design, Deployment, And Management Phases For Systems

Integrating design, deployment, and management phases for a system in accordance with certain aspects includes using a system definition model to design a system. The system definition model is subsequently used to deploy the system on one or more computing devices and, after deployment of the system, the system def...

"Method And System For Automatically Displaying Content Of A Window On A Display That Has Changed Orientation"

A method and system for automatically displaying content of a window on a display that has changed orientation is described. The content of a window, such as a dialog box, that has been authored for a particular size is repositioned and resized such that the window is viewable in its entirety when the display screen...

Connected Clock Radio

A clock radio receives receives over a network, instructions from a remote device that are configured to sound a local alarm on the clock radio. The clock radio may also receive audio alarm data to be used by the clock radio in sounding the alarm. A user can "snooze" the local alarm and have it sounded at a later ti...

"System For Delayed Dispatch In A Multi Threaded Pipeline"

Detecting a stall condition associated with processor instructions within one or more threads and generating a no-dispatch condition. The stall condition can be detected by hardware and/or software before and/or during processor instruction execution. The no-dispatch condition can be associated with a number of...

"Method And System For Locating Contact Information Collected From Contact Sources"

A method and system for aggregating contact information of contacts from multiple contact sources is provided. The aggregation system collects contact information for a user from various contact sources. The aggregation system stores the collected content information in a contact data store. The aggregation sys...

Method And System For Resolving Disputes Between Service Providers And Service Sonsumers.

A dispute resolution system for requesting a service provider to provide services so that the service provider can demonstrate to a service intermediary that a service consumer requested services. A service consumer that wants to start requesting services of the service provider registers with he service intermediar...

"Controlled Relay Of Media Streams Across Network Perimeters"

The invention provides an apparatus and method to establish media sessions for media streams crossing a network boundary. The system includes a media relay controlled by a media configurator control module. The media relay reserves media paths (that include ports in the network boundary), opens the media paths, clos...

Method And System For Troubleshooting A Misconfiguration Of A Computer System Based On Configurations Of Other Computer Systems

PROBLEM TO BE SOLVED: To provide a method and system for identifying a configuration parameter of a "sick" computer system that is at fault for causing an undesired behavior. SOLUTION: In one embodiment, a troubleshooting system collects "suspect" values for "suspect" configuration parameters used by a "sick" appl...

Update Distribution System Architecture And Method For Distributing Software

A hierarchical software update distribution system and method for distribiting software updates is presented. The update distribution system includes a root update service node and at least one update service node. In an update distribution system, each update service node, except the root update service node, has o...

Method And System For Filtering Communications To Prevent Exploitation Of A Software Vulnerability

A method and system for protecting an application that implements a communication protocol against exploitation of a communication-based vulnerability is provided. A protection system provides a protection policy that specifies how to recognize messages that expose a specific vulnerability and specifies actions to t...

Rapid Visual Sorting Of Digital Files And Data

ABSTRACT IS NOT FILED.

Managing Graphic Databases

A method for loading a graphic onto a computer comprising the steps of: entering a search term associated with the graphic into the computer directing communications between the computer and a selected one of a plurality of graphic libraries; identifying the graphic in the selected graphic library based on the sea...

"User Interface For Creating A Spreadsheet Data Summary Table"

A graphical user interface for creating a data summary table includes a field pane including a list of a plurality of fields, and a layout pane including a plurality of zones. The zones represent areas of the data summary table, and the layout pane allows a field of the plurality of fields from the field pane to be ...

Named Object View Of Electronic Data Report

A named object view of a report is generated from an electronic data file. Objects in the file to be published are identified in the file. A named object view of the report associated with the file is generated by publishing the identified objects. A viewer at a client is presented with the named object view of the ...

"A System For Manipulating A User Interface Element"

A system for manipulating a user interface element, the system comprising a computing device (100), a processing unit (102), a system memory (104) characterized by a screen reader automation utility (201) automatically determines whether the element supports a control pattern by programmatically requesting from the ...

"Query Spelling Correction Method And System"

A method and system for providing to a user a set of alternative query suggestions is disclosed. The method, system and computer readable medium product in accordance with embodiments of the invention includes generating an index of all words in a corpus of documents available to the application, generating a p...

2 D Editing Metaphor For 3 D Graphics

A system combines 2D and 3D modeling in rendering shapes: and includes: a 3D modeling factory to generate a 3D model of selected shape parameters or features; a front face factory to generate 2D text and text effects, and some 2D shape effects; a ground plane factory to generate effects that are rendered on a ground...

Annotating Documents In A Collaborative Application With Data In Disparate Information Systems

Systems and methods for annotating documents in provided in a collaborative application with data from disparate information systems are provided. The collaborative application enables the annotation of a document with data provided by another application. Particularly, the collaborative application enables a user t...

"Storage Api For A Common Data Platform"

An application program interface (API) for a data platform. The a generic data access component that exposes at least one of stores, sessions, transactions, and query services of the data platform, which data platform is associated with a data store. A data classes component of the API provides canonical, applicatio...

"Data Store For Software Application Documents"

A data store is provided for storing, relating and for allowing use of data associated with a computer-generated document. Data for structuring information associated with a document, such as document metadata, is maintained in the data store where relationships between different pieces of data are maintained i...
The present invention is a tree ordering component within a sentence realization system which receives an unordered syntax tree and generates a ranked list of alternative ordered syntax trees from the unordered syntax tree. The present invention also includes statistical models of constituent structure employed by t...

"Automatic Determination Of Invalid Call Sequences In Software Components"

Computerized testing of an object to identify one or more call sequences that give rise to exceptions. A set of potential operations (consisting of methods and associated parameter values) is automatically generated. A parameter generator may supply interesting parameter values that may more likely result in a thro...

"Work Item Rules For A Work Item Tracking System"

Work item rules for a work item tracking system are provided. Work item rules may be accessible, usable and subject to interpretation by multiple software entities. Further, work item rules may be configured to be subject to creation and change by users, for example, by exposure to users through a user interface. A ...

"System And Method For Providing Uniformity Between Disparate File Systems"

The subject invention provides a system and/or a method that facilitates-adapting at least two disparate file systems. A file system adapter can provide uniformity and/or seamless integration between a first file system and a second file system. The file system adapter can employ a file-backed item that is enri...

"Network Security Device And Method For Protecting A Computing Device In A Networked Environment"

A network security module for protecting a computing device from a security threat on a network, the network security module comprising: a computing device connection connecting the network security module to the computing device; a network connection connecting the network security module to the network; and a s...

"Discoverability And Enumeration Mechanisms In A Hierarchically Secure Storage System"

A system that generates a per user abstraction of a store from a connection point. Filtering a view set of a hierarchically secured containment hierarchy based on the access permissions of the principal is one of the novel features of the invention. The invention can offer a collection of primitives that can ...
A technique for providing one class of users of an application a view of what a typical user in another class of users of the same application is visually experiencing is provided. A client application that is interacting with the application provides a user an option of having a PIP view of what a typical user in o...

"Dynamic Service Generation For Legacy Components"

The present invention provides a mechanism that allows an administrative event to trigger or cause the generation of a dynamic web service during initialization of legacy application components. Similar to other types of static tooling approaches, the dynamic approach—as supported herein—uses available metadata desc...

"System And Method For Regulating An Extensibility Points Access To A Message"

Prior to sending a message to an extensibility point, the message is wrapped with a wrapper object associated with the extensibility point. The wrapper object can be validated by the extensibility point when the extensibility point is ready to commence its operation on the message. Validation of the wrapper o...

System And Method For Facilitating Communication Between A Computing Device And Multiple Categories Of Media Devices.

A method and system are provided for controlling multiple types of media devices. The method and system also facilitate communication between a computing device and one of a plurality of types of media devices. The system includes device retrieval modules controlled b the computing device for retrieving information ...

Process Language For Microprocessors With Finite Resources

A computer for processing information to produce desired results, comprising: a computer-readable medium for storing services, the services including expressions that represent names by literalizing processes and processes by deliteralizing names; and a microprocessor for executing services as processes, the process...

System And Method For Securing A Computer System Connected To A Network From Attacks.

A network security system for protecting computing devices connected to a communication network from an identified security threat, the system comprising: a network security module interposed between a computing device and the communication network; and a security service that publishes security information fo...

Hypertext Navigation For Shared Displays

A browsing system and method for browsing allows multiple users to access and view hypertext documents on a shared display. A browsing system includes a hypertext document converter configured to convert a component in a hypertext document to include alternate component activation tags. A hypertext display controlle...

Integration Architecture For Non Integrated Tools

Architecture that facilitates interfacing non-integrated applications. The disclosed architecture comprises a set of APIs and conventions used to enable integration between tools that were not previously architected to be integrated. This provides the basis for server-based partner integration and client integration...

Method And System For Using A Color Scheme To Communicate Information Related To The Integration Of Hardware And Software In A Computing Device

A method and system for using a color scheme to communicate information associated with an event and related to the integration of software and hardware of a computing device creates a seamless user experience. A hardware element of the computing device is illuminated based on a color scheme associated with a corres...

A System And Method For Improving The Precision Of Localization Estimates

Precision and reliability of localization estimates derived from conventional localization systems are improved through a system and method for post-processing of initial localization data, even in environments which may include noise, reflections, or other interference. Such localization systems include conventiona...

"Method And System To Increase Execution Environment Integration Between A Host And A Runtime"

Systems and methods for enhanced runtime hosting are described. In one aspect, the runtime identifies any abstraction interface(s) exposed by a host application. The abstraction interface(s) correspond to respective execution environment functionality implemented by the hosting application. During execution of runt...

"A Method For Automatically Managing Data Stored On A File System"

A system for automating data processing is presented. The system comprises an end-user programming module that is integrated with an underlying file system and that maps an event of a computing system to at least one automatic action that is defined by an end user. The system also includes an event handler that resp...

"Generating Visually Representative Video Thumbnails"

An algorithm identifies a salient video frame from a video sequence for use as a video thumbnail. The identification of a video thumbnail is based on a frame goodness measure. The algorithm calculates a color histogram of a frame, and then calculates the entropy and standard deviation of the color histogram. The fra...

"Fully Scalable Encryption For Scalable Multimedia"

Subject matter includes exemplary systems and related methods for fully scalable encryption of scalable multimedia. A scalable bitstream encrypted using the subject matter maintains full functionality of scalable features in the encrypted form. The exemplary scalable encryption allows transcoding, rate shaping, and ...

"Hardware Accelerted Blend Modes"

Blending colors of source and destination primitives by a graphics processing unit is disclosed. The graphics processing unit executes a blending program that blends the primitives. The graphics processing unit receives the blending program from a central processing unit or a graphics application program. For exampl...

"Product Locker For Multi Merchant Purchasing Environment For Downloadable Products"

A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are offered by multiple merchants. The multi-merchant purchasing system enables the user to purchase all of the downloadable products in a single transaction. Speci...

"Method And System For Encoding Metadata"

Generally described, embodiments of the present invention provide a system and method for protecting a computer from malicious attacks and buffer overrun (intentional or unintentional). In particular, embodiments of the present invention protect the contents of block headers of data blocks and enable the ability ...

"Code Morphing"

Code morphing includes rewriting at least one underlying control structure of known code without affecting an intended context of the code.

Systems And Methods For The Propagation Of Conflict Resolution To Enforce Item Convergence

Various embodiments of the present invention are directed to systems and method for detecting conflicts and applying conflict resolutions during manual and automatic conflict resolution operations. Several embodiments are directed to preventing both: (a) non-convergence of conflict resolutions, where partners can en...

Method And Apparatus For Enabling Application Program Compatibility With Display Devices Having Improved Pixel Density

A method and apparatus are provided for enabling application program compatibility with display devices having an increased pixel density. According to one method, a call including one or more parameters is directed toward an application programming interface for performing a screen input or output function is recei...

"Serialization Of File System Item(s) And Associated Entity(ies)"

A system and method for serialization and/or de-serialization of file system, item(s) and associated entity(ies)is provided. A file system "item" comprises a core class which can include property(ies). An item can be simple or compound (e.g., includes other item(s) embedded in it). Associated with an item can be ent...

Code Rewriting

Systems and methods provide for the rewriting and transformation of a code unit through an extensible, composable, set of code rewriters that can be implemented at various phases throughout the development, deployment, and execution of the code unit. The described systems and methods provide a powerful way for progr...

Query Optimizer Using Implied Predicates.

Improved query optimizer using implied predicates. The system facilitates allowing a query optimizing component to introduce into a query. Extra predicates that facilitate the following; render the same results as the original query; are used as dictated by rules passed to the optimizing component-these rules specif...

"Sstem And Method For Protecting Identity Information"

A method is provided for using an identity service for protecting identity information during an electronic transaction. The method includes registering an identity client, wherein the identity client possesses an associated multi-component identity. The method further includes regulating access to the multi-compo...

"Akshar A Unique Mechanism For Inputting Indic Scripts On Digital Devices"

A system and method for displaying a base character in response to user input and displaying characters related to the base character to allow the user to select one of the displayed characters for a message string.

"Systems And Methods For Interfacing Application Programs With An Item Based Storage Platform"

Various embodiments of the present invention are directed to a storage platform comprising: a data store in which data stored therein is defined in terms of items, elements, and relationships, wherein an item is a unit of data storable in the data store and comprises one or more elements, an element is an instance o...

"End User Data Activation"

NA

"Systems And Methods For Requesting And Receiving Database Change Notifications"

The present invention relates to systems and methods for providing a notification when subsequent query results from a registered database query change due to a database change. The systems and methods employ a service broker to facilitate storing database query registration information associated with a registered ...

Side By Side Drivers

A method and system for avoiding the overwriting of drivers by subsequent versions or other commonly named drivers includes generating a unique identity for every eligible driver package. Driver files from the driver package, or the entire driver package itself, are then installed in a subdirectory location in a com...

Metered Execution Of Code.

receiving a call requesting execution of a protected service within a runtime area; requesting permission for the execution; analyzing the request for permission; and basing status of the permission on the analysis.

Recall Device

A portable recall device configured to be carried by a wearer comprising: a camera; and at least one accelerometer operably connected to the camera, the accelerometer triggering capture of an image by the camera based on detection of a capture condition followed by detection of a stable condition by the at least o...

"Presenting Data Representations In A Screen Area Incet"

A method, application interface, and medium is provided for presenting a variety of data representations in a screen-area inset. The inset(s) can be one or more bounded portions of a graphical user interface. The inset offers a picture-in-picture type of functionality to present videos, data, pictures, audio, and ot...

Availability Data Service

Real time availability data (free/busy data) is provided for potential meeting attendees and/or assets. An availability service is queried for availability data for one or more attendees and/or meeting assets. The availability service determines the identity of an electronic mailbox server on which is stored current...

Filtering User Interface For A Data Summary Table

A graphical user interface for creating a data summary table includes a data summary table including a plurality of fields, and a filtering pane programmed to apply filters to items in the fields of the data summary table, the filtering pane including a field selector control, wherein the field selector control is p...

Method And Device For Navigating Messages Within A Thread

A user may easily read, browse, and jump through the messages contained within a thread. Different portions of the message may be highlighted such that they are easily identifiable. The user may easily navigate through the thread by selecting a user interface element, such as an arrow button, to move to the next or ...

"Data Model For Object Relational Data"

A common data model (CDM) that is a data model common to multiple application-specific data models. The CDM supports both PIM (Personal Information Manager end-user application data and line-of-business (LOB) data. Similarly, an SDM-type (system definition model) application can specify its model on top of the CDM. ...

"System And Method For Managing Output Path With Context Preservation"

A system and related techniques expose color printing resources to applications, utilities, operating system and other resources, to automatically detect output capabilities as well as to permit integrated print functions which preserve metadata and other context within the printing workflow. According to embodiment...

2 D/3 D Combined Rendering

A system combines 2D and 3D modeling in rendering shapes and includes: a 3D modeling factory to generate a 3D model of selected shape parameters or features; a front face factory to generate 2D text and text effects, and some 2D shape effects; a ground plane factory to generate effects that are rendered on a ground ...

"Architecture For Distributed Computing System And Automated Design, Deployment, And Management Of Distributed Applications"

An architecture and methodology for designing, deploying, and managing a distributed application onto a distributed computing system is described.

"Simple Styling"

A style model implementation that is applied to objects within a user interface to define any attributes of the objects. The model is divided into two parts: a "runtime" which uses a style definition to affect the look and feel of the user interface, and a "design-time" which is the experience presented by WYS...

High Level Graphics Stream

A system that provides graphics commands that represent graphics or an image, to a consuming process. The graphics commands are represented by a visual tree which includes objects and resources describing the objects. The objects and resources are communicated to a composition engine that creates an analogous compos...

"Rendering Independent Persistence Of Information"

A system and methods providing a rendering independent persistence of information is provided. In an illustrative implementation, data is provided having some predefined structure. In operation, the data is processed such that the data and it's associated sturcture are represented in a data format that is persistent...

"Command Line Data Type Discovery And Conversion"

Systems and/or methods are presented that may be used to enable operation of a command line having an upstream command and a downstream command where the upstream command may output data of a type that may be unacceptable as input to the downstream command.

"Grid Canvas"

A layout resizes intelligently without complexity. Objects or elements are attached to a virtual grid of row and cokimn gridlines, which are defined separately. The relationship between the objects and the grid is bi-directional so that moving one (gridline or object) will affect the other (object or gridline). In o...

"Print System"

A system data interface and related architectures are described, Various embodiments can provide one or more of the following capabilities: a generic data model, asynchronous client and server dispatch, cancellation, batching, transactional invocation, parallel invocation, interception or reflection. In one embodime...

"Computer Searching With Associations"

A search of an index database or another search method is conducted to identify as a preliminary results listing one or more selected computer objects having selected identifying information stored in an index database. In addition, one or more selected computer objects of the preliminary search results are correlat...

"Method And System For A Guest Physical Address Virtualization In A Virtual Machine Environment"

A method of sharing pages between virtual machines in a multiple virtual mac includes initially allocating a temporary guest physical address range of a first virtual machine for sharing pages with a second virtual machine. The temporary range is within a guest physical address space of the first virtual machine. An...

"Exposing A Report As A Schematized Queryable Data Source"

A system and methods that expose a report as a schematized queryable data source is provided. In an illustrative implementation, an exemplary computing application processes data according to at least one report definition. The exemplary computing application cooperates with at least one data store and/or data sourc...

"Program Authentication Based On Environment"

To authenticate a program on a computing device to a resource local to or remote from the computing device, a stored program security identifier (PSID) corresponding to the program is retrieved, where the stored PSID includes information taking into account the program itself, the execution setting of the progr...

"Systems And Methods For Multi Level Intercept Processing In A Virtual Machine Environment"

Various embodiments of the present invention are directed to a multi-level virtualizer that is designed to remove much of the intercept-related functionality from the base-level virtualizer (that exists outside of each partition) and, instead, incorporate much of this functionality directly into each partition. For ...

Calibration Of A Device Location Measurement System That Utilizes Wireless Signal Strengths

An architecture for minimizing calibration effort in an IEEE 802.11 device location measurement system. The calibration technique is based upon a regression function that produces adequately accurate location information as a function of signal strength regardless of gaps in the calibration data or minimally availab...

"Automatic User Interface Updating In Business Processes"

A method and apparatus for updating a user interface for a business process in response to a change in the business process instigated by a user. The change is detected by the application and the affected user interfaces are updated to reflect the changed process without the need to recompile the application. Change...

"Method And Apparatus For Formant Tracking Using A Residual Model."

A method of tracking formants defines a formant search space comprising sets of formants to be searched. Formants are identified for a first frame in the speech utterance by searching the entirety of the formant search space using the codebook, and for the remaining frames by searching the same space using both the ...

A Finite State Machine System For Providing Information And Safely Disclosing Identity Information Over The Internet

Exemplary embodiments disclosed herein may include a method and system for providing information to a user and safely disclosing identity information over the Internet comprising receiving information from a server, analyzing the information, presenting the analyzed information to a user for validation in a finite n...

"Advanced Bi Directional Predictive Coding Of Interlaced Video"

For interlaced B-fields or interlaced B-frames, forward motion vectors are predicted by an encoder/decoder using forward motion vectors from a forward motion vector buffer, and backward motion vectors are predicted using backward motion vectors from a backward motion vector buffer. The resulting motion vectors are ...

Method And System For Communication With Identification Tags

A method, identification tag reader and computer program product for communication with an identification tag are disclosed. To communicate with the tag, identification data may be retrieved from an identification tag. A guest identification, compliant with at least a portion of a standard network protocol address, ...

"Format Agnostic System And Method For Issuing Certificates"

An improved certificate issuing system may comprise a certificate translating incoming certificates and certificate requests from a first format into a second format. A certificate issuing engine may then operate on incoming requests in the common format. The issuing engine can issue certificates to clients accordin...

"System And Method For Word Analysis"

A computer implemented method of analyzing input text includes comparing trasitions in the input text and the transition in a rule engine. The method also includes determining whether the transition in the input text is found in the rule engine based on a character found in a morpheme in the rule engine and at leas...

High Quality Gradient Corrected Linear Interpolation For Demosaicing Of Clolor Images.

A gradient-corrected linear interpolation method and system for the demosaicing of color images. The method and system compute and interpolation using some a current technique (preferably a bilinear interpolation technique to reduce computational complexity), compute a correction term (such as a gradient of a desire...

Application Of Data Binding Mechanism To Perform Command Binding

A data-binding engine is used to perform command binding. A data binding engine binds user interface controls such as buttons, menus, list boxes, etc; to commands exposed on an application model. A data source and data binding path may be specified in a markup language that defines how the commands are bound to UI e...

Compression Of Logs Of Language Data

A method and apparatus for compressing query logs is provided. Multiple leves fo user-specifiable compression include character-based compression, token-based compression, and subsumption.An efficient method for performing subsumption is also provided. The compressed query logs are then used to train a statistical p...

Blended Object Attribute Keyframing Model.

Combined object level and property level key framing systems, methods, and user interfaces are provided in which a user can enter a mode where any change to a property is recorded as a key framing action (e.g., creation or edit) at the current time as indicated by a timeline. When a key frame is created in this mode...

"Method And System For Discovery Via Tribal Knowledge"

The invention provides one or more modules that may be used to automatically configure a computing device to communicate over a network. When a polling computer is connected to a network, it monitors network traffic to determine the protocols being used on the network. These protocols are then installed and loaded...

"System And Method For Providing Instant Messaging Capability In Conjunction With An Online Reference"

Methods for providing instant messaging capability in conjunction with an online reference is provided. In one embodiment, the method may include receiving an indication to initiate display of online content, selecting at least one reference in response to the indication, the at least one reference being associated ...

"Web Services Processing Using Mapi Compliant Mail Applications"

The present invention provides Web Services over a mail transport. In particular, the present invention sends Web Service messages using MAPI (Messaging Application Program Interface) mail applications in order to support offline communications and extended processing time of service requests without creating additi...

"Distributed Speech Recognition For Mobile Communication Devices"

A method of performing speech recognition, and a mobile computing device implementing the same, are disclosed. The method includes receiving audible speech at a microphone of the mobile computing device. The audible speech is converted into speech signals at the mobile computing device. Also at the mobile computi...

"Method And System For Selectively Enforcing Presentation Themes"

Disclosed is a theme property sheet system that supports presentation themes by coordinating values provided to elements used in a user interface. When an interface user expresses a preference for a particular presentation theme, that theme’s property sheet is given precedence over other mechanisms for setting prope...

"Chroma Motion Vector Derivation"

In one aspect, an encoder/decoder receives information for four field motion vectors for a macroblock in an interlaced frame-coded, forward-predicted picture and processes the macroblock using the four field motion vectors. In another aspect, a decoder decodes skipped macroblocks of an interlaced frame. Skipped mac...

System And Method For Moving Computer Displayable Content Into A Prefered User Interactive Focus Area

In a computer system having a display system displaying content and having a defined preferred interaction area on the display system in which the user interact with the computer system, a method comprising: detecting a reposition action indicating that the desktop content is to be repositioned wiht respect to the...

Assisted Form Filling

A system that facilitates assisted form filling, comprising: a control component that receives untagged textual input information; a parsing component that populates a subset of a form based, at least in part, upon the untagged textual information; and a display component that displays the untagged textual informati...

"Metode And System For Reducing The Number Of Ports Allocated By A Realy"

A method and system for reducing the number of ports allocated by a relay server is provided. A connection system uses a bidirectional technique to establish a connection via the relay server between two endpoints (e.g., client computers) that can be used bidirectionally to send a stream from a first endpoint to a s...

"System And Method For Identifying And Removing Potentially Unwanted Software"

A system and method for identifying and removing potentially unwanted software. A mechanism is provided that identifies suspect programs to a user and allows the user to prevent the suspect programs from running without actually deleting them. In one embodiment, scanner data identifying potentially unwanted software...

"Dynamic Pronunciation Support For Japanese And Chinese Speech Recognition Training"

A speech recognition traning system for kanji-based languages is provided. The system loads a pronunciation aid for each and every ideograph in the training speech, but does not in fact display an ideograph until the training system recognizes a pronunciation difficulty. Once a pronunciation difficulty is identified...

"Method And Computer Readable Medium For Fitting Text To Shapes Within A Graphic"

computer-readable medium are provided for fitting text to shapes ( within a graphic. According to the method, initial constraints are defined that comprise initial values describing how a shape and text within the shape should be laid out. Constraint rules are also defined for use in modifying the initial constrai...

"Systems And Methods For Data Modelling In An Item Based Storage Platform"

Various embodiments of the present invention are directed to a data store composing Items, Elements, and Relationships. An Item is a unit of data storable in a data store and further comprises said Element and said Relationship. An Element is an instance of a type comprising one or more fields. A Relationship is a l...

User Intent Discovery

A system 100 that facilitates determining a user's intent given a user search query comprises a search engine that is employed to search over a collection of objects within a data store to retrieve a user search result set. The objects within the result set are associated with queries that were previously utilized t...

"System And Method For Using A File Systemto Automatically Backup A File As A Generatinal File"

An improved system and method for using a file system to automatically backup a file in persistent storage is provided. A storage aggregator may organize nonvolatile memory for use in aggregate to store backup copies of a file. A file system filter driver may receive a request from an application for storing a file...

Efficient And Secure Authentication Of Computing System

In a client computing system, a method for receiving credentials that can be used to can authentic with a server computing system, the method comprising: An act of receiving a limited-use credential; An act of establishing a secure link between the client computing system and the server computing system; An ac...

"Automatic Resolution Of Segmentation Ambiguities In Grammar Authoring"

A rules-based grammar is generated. Segmentation ambiguities are identified in training data. Rewrite rules for the ambiguous segmentations are enumerated and probailities are generated for each. Ambiguities are resolved based on the probabilities. In one embodiment, this is done by applying the expectation maximiza...

Automatic Height Adjustment For Electronic Highlighter Pens And Mousing Devices

A method of automatically adjusting the electronic ink height of an electronic highlighter device, comprising: Selecting an electronic pen for functioning as an electronic heighlighter device: Engaging the electronic pen with a computer-displayed object; Determining the height of the computer-displayed object; ...

Efficient Algorithm And Protocol For Remote Differential Compression.

A method and system are related to updating objects over limited bandwidth networks. Objects are updated between two or more computing devices using remote differential compression (RDC) techniques such that required data transfers are minimized. In one aspect, efficient large object transfers are achieved by recurs...

Systems And Methods For The Implementation Of Unordered And Ordered Collections In A Data Store

Various embodiments of the present invention are directed to system and method for implementaion of multisets (to support embedded collection) in a database system.

Rendering Tables With Natural Language Commands

The present invention relates to a method of manipulating a software application and processing data stored in a data source. The method includes receiving a natural language input and analyze the natural language input to identify semantic information contained therein. Portions of the natural language input are as...

Asynchronous Channel For Displaying User Interface Elements.

A system for use in client/server computing comprising: a) a client that interfaces with an applications program; b) a server in communication with the client that responds to a request from the applications program communicated to the server by the client for services available through said server; and c) a user...

Wave Lens Systems And Methods For Search Results.

A computerized interface for data presentation, comprising: a lens component associated with a protion of a user interface display, the lens component defines an area to display information from at least one search result; and a layout component that displays a detailed subset of information within the lens compo...

Representation Of A Deleted Interpolation N Gram Language Model In Arpa Standard Format

A method and apparatus are provided for storing parameters of a deleted interpolation language model as parameters of a backoff language model. In particular, the parameters of the deleted interpolation language model are stored in the standard ARPA format. Under one embodiment, the deleted interpolation language ...

Credential Roaming

A method comprising ; Enumerating local credential and remote credentials in response to receiving an event notification; and Synchronizing the local credential and remote credential.

Statistical Language Model For Logical Forms

A method of decoding an input semantic structure to generate an output semantic structure, the method comprising: providing a set of transfer mappings: calculating a score for at least one transfer mapping in the set of transfer mappings using a statistical model; selecting at least one transfer mapping based ...

"Method And System For Selectively Enforcing Presentation Themes"

Disclosed is a theme property sheet system that supports presentation themes by coordinating values provided to elements used in a user interface. When an interface user expresses a preference for a particular presentation theme, that theme's property sheet is given precedence over other mechanisms for setting prope...

"System And Method For Highlighting A Domain In A Browser Display"

Described are a system and method for highlighting a domain in a browser display. Briefly stated, a browsing software is configured to parse an address to identify an important portion, such as a domain name associated with content being displayed. The important portion of the address is then displayed in a high...

Instant Messaging Embedded Games.

Instant messaging systems and methods are disclosed. The systems and methods allow users to play competitive and collaborative games using an instant messaging client application. The client application may create a user interface screen that includes an instant messaging region or window for exchanging instant mess...

Video Encoder And Decoder

A video encoder/decoder utilizes a bistream syntax that provides an independently decodable, partial picture unit, which may be in the form of a unit containing one or more contiguous rows of macroblocks (called a slice). This slice layer provides a flexible combination of error-resilience and compression efficiency...

"System And Method For An Extensive Content Build Pipeline"

Systems and methods are provided for an extensive content build pipeline. The exemplary content build pipeline is based on a code build process using a standard XIF file format containing reference to game content produced using various game content editors and tools. This standardized file format is capable of cont...

Method For Managing Network Filter Based Policies

A method and system are provided for adding, removing, and managing a plurality of network policy filters in a network device. Filters are installed in a framework and designated as active or disabled. Each filter has a priority. When a new filter is to be installed into the framework, it is compared to installed fi...

"Method Of Assisting An Application To Traverse A Firewall"

A method for firewall-aware application to communicate its expectations to a firewall without requiring the firewall to change its policy or compromise network security. An application API is provided for applications to inform a firewall or firewalls of the applications needs, and a firewall API is provided that in...

"System And Method Of Efficient Data Backup In A Networking Enviroment"

The present invention is directed to a system, methods, and a computer-readable medium for efficiently performing a backup of data in a networking environment. In embodiments of the present invention, a backup of a file from a local computing device to a remote computing device is performed. However, the file m...

Special Use Heaps

A system for managing at least two different classes of data comprising; Special purpose heaps are created to store different classes of data which different rules apply. A library of functions is provided which is designed to respect the different classes of rules that apply to the different heaps, by storing dat...

Automatic Data Perspective Generation For A Target Variable

A system that facilitates data perspective generation, comprising: a component that receives user-specified input data including a target variable from a database; and a generation component that provides automatic generation of at least one conditioning variable for a data perspective of the target variable, der...

Method, System And Apparatus For Managing Computer Identity

Embodiments of the present invention provide the ability to accurately match a particular computing device within a networked computing environment with an identity of that computing device. According to one aspect, a method for identifying a client computing device in a networked computing environment is provided. ...

Method And System For Displaying And Mnaging Security Information

A method in a computer system for displaying allowed-to-authenticate information, the method comprising: receiving a selection of a security object; retrieving allowed-to-authenticate information for the selected security object, the information identifying an entity, a resource, and an action wherein when the enti...

Method And Apparatus For Populating Electronic Forms From Scanned Documents

A computer-implemented method for populating an electronic form from an electronic image, the method comprising: (a) identifying a size, orientation and position of a first object having any arbitrary orientation within the electronic image; (b) identifying information elements from pixels within the electronic im...

Network Amplification Attack Mitigation

A method of mitigating an amplification attack by a controller node on an and system in a network, the method comprising: Detecting one or more candidate attack request packets received by an intermediary node in the network: and Limiting response traffic of response packets communicated from the intermediary node...

"Network Amplification Attack Mitigation"

1. A method of mitigating an amplification attack by a controller node on an end system in a network, the method comprising: detecting one or more candidate attack request packets received by an intermediary node in the network; and limiting response traffic of response packets communicated from the intermediary n...

System And Method For Schemaless Data Mapping With Nested Tables.

A system for mapping payload data to spreadsheet lists, the system comprising: a spreadsheet storage unit adapted to store spreadsheet data including at least one spreadsheet list; a payload data storage unit adapted to store payload data; and a mapping unit adapted to receive spreadsheet data from said spreadshe...

Method And System For Synchronizing The User Interface Language Between A Software Application And A Web Site.

A method and system is generally directed to synchronizing the language used for applications and the language used for information provided across a network. The client language that is associated with the language used for applications on a computing device is detected along with the services language. The service...

Detection Of A Dwell Gesture By Examining Parameters Associated With Pen Motion.

Systems, methods, and computer-readable media are used to determine whether specific electronic pen gestures with respect to pen-based computing systems should be processed as "Press-and-hold" gestures(e.g., to activate right mouse button click actions). Such methods may include: (a) measuring two diffrent parameter...

Reflection Based Processing Of Input Parameters For Commands

The present invention is directed at a reflection-based shell that provides reflection-based processing of input parameters for a command. The reflection-based processing includes parsing, data generation, data validation, object encoding, object processing, documentation, and the like. The reflection-based shell pr...

"Statistical Language Model For Logical Forms"

A method of decoding an input semantic structure to generate an output semantic structure, the method comprising: providing a set of transfer mappings; calculating a score for at least one transfer mapping in the set of transfer mappings using a statistical model; selecting at least one transfer mapping based on ...

"Wireless Transmission Interference Avoidance On A Device Capable Of Carrying Out Wireless Network Communications"

A wireless technology(e.g., Wi-Fi) coexistence architecture and method are disclosed for managing potential conflicts between wireless technology interference sources. A coexistence driver maintains a conflict map identifying potentially conflicting wireless technologies on a computing device. Such technologies, due...

"Self Learning Method And System For Detecting Abnormalities"

The present invention is directed to a method and system for use in a computing environment to monitor parameters and detect abnormalities. A monitoring system for monitoring a process may include a signature creation module for creating a signature representative of the process, a signature-updating module for cont...

"Word Of Character Boundary Based Scratch Out Gesture Recognition"

Described is a computer-implemented system and method that detects .md differentiates scratch-out gestures from other electronic ink, e.g., entered via a pen. The system and method compare boundary-based criteria to differentiate, which elLininaf.es tho need to have a specially-shaped scratch-out pattern, instead a...

Method And System For Auxiliary Processing Of Information For A Computing Device

A method and system for auxiliary processing of information for a computing device. By simplifying the user managed power states to on and standby, the computing device preserves its execution context by default when the machine is powered down. As a result, the computing device is made available for use even when i...

A System And Method Employing A Grid Index For Location And Precision Endcoding

A system and method for combinig the precision estimate of a database entry"s coordinate value such that the precision information is included as part of the one-dimensional index. This is done by constructing a hierarchincal index in which the size of the grid is related to the precision of the coordinate value. A ...

Multi Layered Firewall Architecture.

A method and system are provided for implementing a firewall architecture in a network device. The firewall architecture includes a plurality of network layers, a first firewall engine, and one or more callout modules. The layers send packets and packet information to the first firewall engine, maintain and pass pac...

A Method And System For Enforcing A Securty Policy Via Security Virtual Machine

A method in a computer system for enforcing a security policy, the method comprising; providing a security policy; compiling the security policy in to security program based on an instruction set of a security virtual machine; loading the security program into an instruction store of the security virtual mach...

Randomized Signal Transforms And Their Applications.

Techniques are disclosed to provide randomized signal transforms and/or their applications. More particularly, a signal (e.g., an audio signal, an image, or a video signal)is transformed by applying randomly-selected basis functions to the signal. The applications of the randomized signal transforms include, but are...

"Servicing A Component Base Software Product"

A service package (302)is coupled to computing device (201) via a coupling such as network (310), Service package (302) may include any of a variety of sources such as a magnetic disk, an optical disk, flash memory, and a solid-state disk. Additionally service package (302) may be local (e.g. a disk that is accessed...

"Using Subqueues To Enhance Local Message Processing"

The present invention extends to methods, systems, and computer program products for using subqueues to enhance local message processing. Messages include queue IDs comprised of a parent portion and a suffix portion. The parent portion identifies a parent queue and I he suffix portion identifies a subqueue of t...

Real Time File System Repairs

A method comprising: detecting a corruptio to data on a storage volume associated with a file system request; and repairing the corruption in real-time such that the storage volume remains online and active during the repairing.

Efficient Capitalization Through User Modeling

A method of training a capitalization model for automatically capitalizing text, the method comprising: collecting training documents that meet limitations that require the training documents to be associated with a particular user; and using the collected training documents to train the capitalization model. ...

"Association And Visualization Of Schematized Business Networks"

The present invention extends to associating and visualizing schematized business networks. Users can visualize and navigate a business network without having got understand or create associations between structures of different business layers. Users can configure the level of detail by zooming in and zooming out o...

"Creating Volume Images"

A first image of a first software which can be combined with other images of other software such that any one or more of the images can be restored from the volume image, and methods relating thereto (Fig. 1). The method of making the volume image comprises c reating a first image from a first software, creating a s...

Virtual Channels

A request is received to view a virtual television channel. A user associated with the request is identified along with user preferences associated with that user. Content, such as television programs, music, and games, is identified that satisfies the identified user preferences. The identified content is ranked ba...

Peer Name Resolution Protocol Simple Application Program Interface

An application program interface (API) for sending and receiving endpoint registration data and peer-to-peer network cloud data has a registration call for adding endpoint data to a peer-to-peer network. The API may receive explicit data regarding address information or may be instructed to select and maintain suita...

Data Alignment Between Native And Non Native Shared Data Structures"

Described herein is a technology facilitating the operation of non-native program modules within a native computing platform. This technology provides a mechanism for aligning-as necessary-parameters of data structures so that program modules or operating systems of different paradigms may use them. The data of para...

"Efficient Data Transfer To/From Storage Medium Of Computing Device"

1.    A method for an application on a computing device to write data from a source to a storage medium associated with the computing device, the method comprising: the application issuing an application command to a file system of the computing device, the application command including an identification of the sou...

System And Method For Intelligent Recommendation With Experts For User Trust Decisions

A user interface for facilitating recommending to a computer user a decision for downloading content, the user interface comprising: a first trust option for allowing the user to cause the content to be downloaded; a second trust option for allowing the user to prevent the content from being downloaded; and a recom...

"Selectable State Machine User Interface System"

A system that concurrently provides multiple user interface (UI) mechanisms that facilitate control of an application state machine (e.g., unified message system). More particularly, the invention can create two relatively distinct user experiences, one via dual tone multi-frequency (DTMF) navigation and another thr...

Method And Apparatus For Handling Metadata

A method comprising recording a video program;recording metadata associated with the video program; receiving updated metadata associated with the video program; and replacing the previously recorded metadata with the updated metadata.

"Rules Based Grammar For Slots And Statistical Model For Preterminals In Natural Language Understanding System"

A NLU system includes a rules-based grammar for slots in a schema and a statistical model for preterminals. A training system is also provided.

"Systems And Methods For Interfacing With Computer Devices"

The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands; combining the functionality a...

"Dynamic Substitution Of Usb Data For On The Fly Encryption/Decryption"

A security module and method implements data requests from a USB or other similar device, in which a secure component can communicate securely with a device without modifying the underlying USB bus protocol, or the device, even where the software controlling the bus is untrusted. A security module (physically separa...

"Methods, Systems, And Computer Readable Media For Generating An Ordered List Of One Or More Media Items"

A system for generating an ordered list of one or more media items selected from a library of media items. The system comprises a user-associated selection filter for generating a subgroup of media items from the library. The system further comprises a user-associated ordering filter for ordering at least a portion ...

"System And Method For User Modeling To Enhance Named Entity Recognition"

The present invention employs user modeling to model a user"s behavior patterns. The user"s behavior patterns are then used to influence named enity (NE) recognition.

"Apparatus, Systems And Methods Relating To An Improved Media Player"

Apparatus, systems and methods for enabling an improved portable media player are provided. The apparatus provides improved media recording, synchronization, rendering and user interface experiences for a user, In various embodiments, portable media players are provided with a closed position for substantially prote...

"Method And Apparatus For Distributed Information Management"

The information management system such as might be used for a source code management system. The information management system is distributed throughout an enterprise and is operated to allow secure communications with remote sites connected to a central site over an unsecured network. A secure channel is created th...

"System And Method For Identifying And Storing Changes Made To A Table"

A base table is scanned with a delete marker and an insert marker. The delete marker identifies a last change committed to the base table as part of a transaction prior to execution of a statement, and the insert marker identifies a last change committed to base table as part of the transaction during execution of t...

Intelligent Autofill

An autofill system comprising: a trained machine learning component that uses one or more sets of inputs to facilitate autofilling of web-based forms; and an autofill component that selectively enters appropriate data into one or more form fields based at least in part upon information generated by the machine lear...

Method And System For Detecting Potential Races In Multihreaded Programs

A system for dynamically detecting potential race conditions in a program having a plurality of threads adn one or more shared memory locations, the system comprising: with respect to each shared memory location, (i) a mechanism for maintaining a set of cncurrent thread segments that access the location, and (ii) a...

Cryptographic Puzzle Cancellation Service For Deterring Bulk Electronic Mail Messages

A cancellation server for canceling cryptographic puzzles, the puzzles associated with identifiers, for use in a digital delivery system comprising an intended recipient of a digital object including a cryptographic puzzle, the cancellation server in connection with at least one database, and executing the steps of:...

"Using Directional Antennas To Mitigate The Effects Of Interference In Wireless Networks"

The principles of the present invention provides for using directional antenns to mitigate the effects of interference in a wireless network. An antenna device includes an omni-directional antenna and at least one directional antenna. Each directional antenna(e.g., an electronically steered phased array antenna) can...

Method, Medium And System For Recovering Data Using A Timeline Based Computing Enviornment

A method of recovering an application using a timeline-based computing enviornment, the method comprising the steps of: periodically saving data items of the application for recovery, wherein the saved data items allow the recovery of the application at a point in time when the items were saved; searching a time-b...
A distributed authentication model that operates within a protocol-based sphere of trust. Rather than being able to communicate with any one of the computing systems internal to the sphere of trust, the amount of authentication is reduced by having the external computing systems intitially communicate with a specifi...

"Intelligent Default Selection In An On Screen Keyboard"

Systems and methods are described for intelligent default selection of characters to be entered via and on-screen keyboard. Based on one to several criteria, a character most likely to be selected for entry via the on-screen keyboard during a search request is determined and a selector is positioned at that particul...

"Shadow Paging"

Shadow paging is a technique used to achieve atomic and durable transactions, and provides the ability to manipulate pages in a database. During a transaction, the pages affected by the transaction are copied from the database file into a workspace such as volatile memory, and modified in that workspace. When a tran...

Business Application Entity Subscriptions Synch Operation Management

A method of managing a synch operation during which business solutions entities are loaded into a mobile data store of a mobile computing device from a central data storage system, the method comprising: a) defining subscriptions identifying entities to be loaded into the mobile data store during a synch operation;...

"System And Method For Resizing A Database"

Shrinking a database file is performed by manipulating pages within the file such that all empty pages reside at the end of the file. Non–empty pages from the end of the file are written to empty pages at the start of the file. Repeating this process, the correct number of times, results in all of the empty pages re...

"Secure Communication With A Keyboard Or Related Device"

Secure communication between a keyboard and a component, such as a piece of software running on a computer. A first initial value is known to both the keyboard and the component. The keyboard and the component exchange nonces. The keyboard and the component each compute a second initial value and a third initial val...

Client Based Pseudonyms

Obtaining tokens with alternate personally identifying information. A method may be practiced, for example, in a networked computing environment including a client and a token issuer. The token issuer provides security tokens to the client that the client can use for accessing functionality of services in the networ...

Character Position Based Password Recovery

A password recovery technique includes generating words by sequentially selecting a character for each character position of the word from a character string. The order of the characters in the character string is individually selected for each position of the word. Each sequentially generated word may be entered un...

Hierarchical Federation Metadata

Shared Federation Metadata. A data structures may be implemented in a networked computing environment including federation. A federation includes two or more organizations coupled in a fashion such that authentication and authorization statements span the organizations in accordance with a pre-defined policy. A comp...

"Systems And Methods For Interfacing With Computer Devices"

The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands; combining the functionality a...

Navigation Of Structured Data

A system and a method for facilitating navigation of stored information. A user interface configured to receive a search input is provided. In response to receipt of a search input, a data store is assessed. The data store may contain various information elements, and each of these elements may be tagged with one or...

"Fast Start Up For Digital Video Streams"

Described herein is a technology facilitating the presentation of digital video streams. An implementation, described herein, reduces the effective start-up delay in the presentation of the first frames of the video content that occurs when a system tunes into a video stream. This abstract itself is not intended to...

Account Creation Via A Mobile Device"

Creating an account via a mobile device. A request to create an account is received from a user via a mobile device. The request is received from the mobile device according to a wireless communications protocol. In response to the received request, a confirmation message is delivered to the mobile device for render...

Extraction, Transformation And Loading Designer Module Of A Computerized Financial System

An extraction, transformation and loading (ETL) designer module of a computerized financial system that is used to configure an ETL package for loading data elements from a financial table of a financial database into a reporter table in accordance with a predefined format. The ETL designer module includes a transfo...

Configurable Pci Express Switch

A configurable switch that enables multiple CPUs to be connected to multiple I/O devices through a single switch. The switches can be cascaded to enable more CPUs and/or more I/O devices in the tree. The configuration is transparent to the enumeration of the bus and endpoint devices. A simple management input such a...

Ranking Functions Using Document Usage Statistics

. I Methods of providing a document relevance score to a document on a network are disclosed. Computer readable medium having stored thereon computer-executable instructions for performing a method of providing a document relevance score to a document on a network are also disclosed. Further, computing systems ...

"Implementation Of Memory Access Control Using Optimizations"

Mechanisms are disclosed that may allow certain memory access control algorithms to be implemented efficiently. When memory access control is based on controlling changes to an address translaion map (or set of maps), it may be nessessary to determine whether a particular map change would allow memory to be accessed...

"Method And Method For Performing Streaming Checks On Data Format For Udts"

The subject invention relates to systems and methods that perform consistency checks of user defined type (UDT) fragments utilizing a stream of data without wholesale copying of the data. Streaming consistency checks facilitate discovering invalid fragments as soon as possible such that the entire UDT fragment does ...

"Systems And Methods For Interfacing With Computer Devices"

The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands, combining the functionality a...

"Data Mining Techniques For Improving Search Engine Relevance"

The subject invention relates to systems and methods that automatically learn data relevance from past search activities and apply such learning to facilitate future search activities. In one aspect., ail automated information retrieval system is provided. The system includes a learning component that analyzes ...

"Systems And Methods For Interfacing With Computer Devices"

The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands; combining the functionality a...

"Post Cache Substitution"

Systems and methods for post-cache substitution. To include dynamic content in a response to a client request, a substitution block is inserted in the cached content. When the cached content is written as the response to the client, a delegate associated with the substitution block is invoked to generate the dynamic...

Systems And Methods For Creating Live Summaries Of Selected Content

The subject invention provides a unique system and method that facilitates creating a summary page of content associated with disparate sources of data. For example, a user can select one or more regions of one or more disparate web pages for which he/she desires updated information over a length of time. The s...

Providing Contention Free Quality Of Serviece To Time Constrained Data

The principles of the present invention provide for providing contention free quality of service to wireless stations. A station indicator to an access point that higher priority data (e.g., time constrained data) is to be sent to the access point. The access point receives the indication and selects a slot time for...

"Supplicant And Authenticator Intercommunication Mechanism Independent Of Underlying Data Link And Physical Layer Protocols"

A supplicant on a first computing system authenticating the first computing system to an authenticator on a second computing system in a manner that is independent of the underlying data link and physical layer protocols. The first computing system establishes a data link layer connection with the second computing s...

"Method And Apparatus For Executing Unit Tests In Application Host Environment"

A development environment in which unit tests are prepared. The unit tests run in a host environment for more complete and accurate testing of program units. The development environment uses a test execution shim to access an adapter running in the host environment. The host adapter may invoke other program...

"Discriminative Training Of Language Models For Text And Speech Classification"

Methods are disclosed for estimating language models such that the conditional likelihood of a class given a word string, which is very well correlated with classification accuracy, is maximized. The methods comprise tuning statistical language model parameters jointly for all classes such that a classifier discrimi...

Time Aware Best Effort Hole Filling Retry Method For Network Communications

This invention generally relates to a network communication technology. An implementation, described herein, performs a time-aware, best-effort, hole-filling communications retry function over a communications network. It does so in a manner that assumes successful reception of data unless the receiver indicates dif...

"Positional Access Using A B Tree"

A b- tree having information stored therein is utilized to facilitate positional access of elements stored in the leaves of the b-tree. The b-tree is structured such that for each non-leaf level value, a count is located to its immediate left and a value is located to its immediate right. These left and right counts...

Configurable Pci Express Switch

A configurable switch that enables multiple CPUs to be connected to multiple I/O devices through a single switch. The switches can be cascaded to enable more CPUs and/or more I/O devices in the tree. The configuration is transparent to the enumeration of the bus and endpoint devices. A simple management input such a...

"System And Method For Eyes Free Interaction With A Computing Device Through Environmental Awareness"

A system and method for eyes-free interaction with a computing device through environmental awareness. A smart computing device includes non-environmental impact settings that indicate what type of user impact will be recognized as an input. The smart computing device monitors environmental conditions to distingui...

"Stereo Coupled Face Shape Registration"

A face model having outer and inner facial features is matched to that of first and second models. Each facial feature of the first and second models is represented by plurality of points that are adjusted for each matching outer and inner for the inner facial features of the first and second models using 1) the cor...

"Prevention Of Outgoing Spam"

The subject invention provides for a system and method that facilitates detecting and preventing spam in a variety of networked communication environments. In particular. The invention provides several techniques for monitoring outgoing communications to identify potential spammers. Identification of potential spamm...

Specialized Media Presentation Via An Electronic Program Guide (Epg).

A device that is capable of producing an electronic program guide (EPG) having at least one entry that enables access to one or more images; wherein selection of hte at least one entry by user input causes the device to retrieve the one or more images and to present the one or more images on an associated display sc...

Social Network Email Filtering

A method comprising: identifying a first email address that is, in terms of a social network, zero-degrees removed from a user; associating a first trust level with the first email address; identifying a second email address that is, in terms of a social network, one-degree removed from the user; and associatin...

"Obfuscation Of Spam Filter"

The subject invention provides systems and methods that facilitate obfuscating a spam filtering system to hinder reverse engineering of the spam filters and/or to mitigate spammers from finding a message that consistently gets through the spam filters almost every time. The system includes a randomization component ...

"Interactive Content Without Embedded Triggers"

Systems and methods are described for broadcasting interactive content without using triggers embedded in the broadcast content. When a viewer sees an item of interest while viewing a program, the viewer can initiate a request for information (RFI) about that item with a single button actuation. When the RFI is ente...

"An Efficient Mechanism For Tracking Data Changes In A Database System"

The subject invention provides a system and/or a method that facilitates tracking a data change to an entity within a data storage system at an entity level and at a sub-entity level. The data storage system can be a database-based file system, wherein an interface can receive at least one data change to an ent...

"System And Methods For Determining The Location Dynamics Of A Portable Computing Device"

A location system for locating and determining the motion and velocity of a wireless device. The methods include direct inferences about whether a device is in motion versus static based on a statistical analysis of the variation of radio signal strengths over time. The system is trained according to a sparse set of...

Systems And Methods For Novel Real Time Audio Visual Communication And Data Collaboration.

A system that facilitates real-time information exchange between users in a conference environment, comprising: at least two Data Clients that receive conference-related informationa nd present it to respective users, each Data Client comprising a user interface with a Presentation Chute icon therein; and a Room S...

"Systems And Methods For Employing Tagged Types In A Dynamic Runtime Environment"

The present invention relates to systems and methods that facilitate dynamic programming language execution in a managed code environment. A class component is provided that declares an inheritance hierarchy for one or more tagged values associated with a dynamic programming language. During execution of the tagged ...

"Resource Authoring With Re Usability Score And Suggested Re Usable Data"

The present invention provides a system for processinq data.

"A Method For Checking The Compatibility Of A First Port Type Of A First Web Service And System Thereof"

The joining of Web services is accomplished via a virtual contact through the use of safeties (802). The joining of Web services heightens the safe interoperability of Web services to create greater functionality than each Web service alone can provide (804), Web services are joined for interoperability (806) when t...

"Automatic Task Generator Method And System"

An automatic task generation mechanism provides generation of tasks such as maintenance task for a computer system. A set of tasks is set up along with rules for performing the tasks. The rules may be associated with metadata that allow the tasks to be mapped to the tasks. Events may be detected that are related to ...

"Scorllable And Re Sizeable Formula Bar"

The present invention relates to new and improved embodiments of systems and methods for displaying content within a spreadsheet graphical user interface. In one embodiment, a computer system has a graphical user interface that performs a method for displaying data within a spreadsheet application. The method compri...

"Power Profiling"

Systems and methods are described for profiling the power consumption of software instructions executing on a processor. A power measurement circuit records power consumption levels of a processor executing various software instructions. A profiling tool tracks and identifies the instruction being executed on the pr...

Adaptive Compression Of Multi Level Images.

The invention facilitates adpative compression of multi-level images, such as captured digital images of a whiteboard, etc., encoding a bitstream comprising a color image component and a black-and-white image component. Either or both of a color and a black-and-white image can be output to a user based on user desir...

"Method And System For Creating, Storing Managing And Consuming Culture Specific Data"

The present invention provides a system for processing data.

"Authoring Implementing Application Localization Rules"

The present invention provides a system for processing data.

Content Progress Indicator For An Epg.

A content-progress indicator for an EPG is described. In an implementation, a user interface (UI) for output by a client and for display by a display device includes a plurality of representation of content items and at least one pictorial representation. Each representation of a content item is selectable by a user...

Method And System For Renaming Consecutive Keys In A B Tree.

An efficient method for renaming consecutive keys in a B-tree representing a hierarchical namespace, such as a file system, has an estimated time efficiency of O(logN), where N is the number of nodes in the B-tree. All the consecutive keys to be renamed are first excised from the original B-tree to form a trimmed B-...

"Advanced Spam Detection Techniques"

The subject invention provides for an advanced and robust system and method that facilitates detecting spam. The system and method include components as well as other operations which enhance or promote finding characteristics that are difficult of the spammer to avoid and finding characteristics in non-spam that ar...

"Relationship Modeling"

The subject disclosure pertains to relationships between items. Relationships between items can be defined external to the items themselves thereby providing a modular, flexible and extensible system. For instance, relationships between items can be defined in a class that includes methods for returning particular e...

"Compressing And Decompressing Epg Data"

A method is described which may be used to compress EPG data. EPG data may include a plurality of television programs. Each television program may have one or more values that respectively describe one or more television program characteristics. In one implementation, The EPG data is compressed by comparing the one ...

"System And Method For Managing Cached Objects Using Notification Bonds"

The invention provides a system and method for managing cached objects using notification bonds. A server is configured to manage original object. A client creates cached objects from the original objects and establishes notification bonds with the server. Each notification bond enables the client to obtain a notif...

"Origination/ Destination Features And Lists For Spam Prevention"

The present invention involves a system and method that facilitate extracting data from messages for spam filtering. The extracted data can be in the form of features. Which can be employed in connection with machine learning systems to build improved filters. Data associated with origination information as well as ...

Class Of Symmetric Lattices For Quantization And Data Embedding

Methods and systems for quantization and data embedding are described. In at least some embodiments, a transform is applied on an image that is to be watermarked and statistics associated with the image are computed. The computed statics are quantized using a symmetric lattice, and a watermark is computed using the ...

"Communication Protocol For Synchronizing Animation Systems"

A communications protocol is described that governs asynchronous exchange of data between a high level animation system and a low level animation system. The high level animation system has a variable, medium-frequency frame rate and is optimized for in teractivity. The low level animation system has a constant, hig...

Method And System For Graph Analysis And Synchronization

A cyclic graph may be partitioned. The partitions of the cyclic graph may include an acyclic component of the cyclic graph and a set of partitioned links. The partitions of the cyclic graph may have a particular order. The elements of the cyclic graph may be serialized with a particular serialization order. The seri...

Query To Task Mapping

Candidate mapping are generated between two sets of short strings. A set of files related to the two sets of strings is chosen. Each string from the two sets of strings is searched for in the set of files. Any two strings that match the same file are presumed to be related, and are mapped together. These candidate m...

Metering Accessing Of Content And The Like In A Content Protection System Or The Like

Metered data is accumulated and is indexed within a metering databse of a client according to a metering ID (MID)and a content-associated ID(KID. The client selects a particular MID and metered data in the metering database having the selected MID, and costructs a challenge based on the selected metered data and sen...

Predictive Lossless Coding Of Images And Video

Predictive losslesss coding provides effective lossess image compression of both photographic and graphics content in image and video media. Predictive lossless coding can operate on a macroblock basis for compatibility with existing image and video codes. Predictive lossless coding chooses and applies one of multip...

"Architecture For Connecting A Remote Client To A Local Client Desktop"

Architecture for generating and maintaining terminal services connection from an external client to an internal internet client behind a firewall and/or router, the external user is first authenticated after which the external client is passed to a remote user portal. A listing of available internal computers is pr...

"System And Method For Automatic Configuration"

A system and method for automatic configuration upon installation of a network printer are disclosed. The techniques of the invention avoid the burden of manual configuration by users and system administrators. The network printer is associated with printer description files, a driver, a spooler, and a port monitor....

Virtualization For Diversified Tamper Resistance

ABSTRACT VIRTUAIJZATION FOR DIVERSIFIED TAMPKR RESISTANCE A conipuler-implemcntable method includes providing an instruction sel architecture that comprises Icatures to generate diverse copies of a program, using the instruction set architecture to generate diverse copies ol'a program and providing a virtual machin...

Digital Media Universal Elementary Stream

In a digital media system, a method of mapping digital media data in a first format onto a transport format, the method comprising: obtaining digital media data encoded in the first format; arranging the obtained digital media data in a frame arrangement, the frame arrangement of digital media data having a size an...

High Fidelity Transcoding

High-fidelity transcoding techniques are described. For example, a video transcoder obtains re-coding data set elements for source format compressed video and uses the elements for coding decisions and/or equivalents parameters when compressing the video in a target format. This allows syntax elements and coding de...

Delivering Digital Content Over A Broadcast Network

ABSTRACT DELIVERING INDIVIDUALIZED CONTENT OVER A BROADCAST NETWORK In various embodiments, a unidirectional broadcast network is utilized to provide digital content to users in a manner that allows users' computing devices to maintain synchrony with personal, relevant information. In at least some embodiments, t...

Dynamic Modification Of Video Properties

ABSTRACT DYNAMIC MODIFICATION OF VIDEO PROPERTIES Aspects of the present invention are directed at improving the quaUty of a video stream that is transmitted between networked computers. In accordance with one embodiment, a method is provided that dynamically modifies the properties of a video stream based on netwo...

"Menus Whose Geometry Is Bounded By Two Radii And An Arc"

Sector menus track a pointer’s position as a pointing device is moved. Each sector menu is a geometric figure bounded by two radii and an included arc of a circle. Menu items are housed in segments formed from multiple radii cutting the sector menu. Users select menu items housed in segments by making a direction ch...

Upnp Authentication And Authorization

ABSTRACT UPNP AUTHENTICATION AND AUTHORIZATION A secure handshake service is implemented among a plurality of UPnP (Universal Plug and Play) portable media devices and endpoints in an open network hosting one or more UPnP services. A first portable media device receives a first request for a hosted service from a s...

"Modular Object Serialization Architecture"

Methods, systems, and computer program products to serialize user interface objects having custom object types and serialization formats. A serialization manager may coordinate standard serialization providers to identify standard serializers for standard object types or serialization formats, and as needed, may be ...

"Aggregating The Knowledge Base Of Computer Systems To Proactively Protect A Computer From Malware"

In accordance vvilh the present invention, a system, method, and computer-readable medium for aggregating the knowledge base of a plurality of security services or other event collection systems to protect a computer from malware is provided. One aspect of the pivseui invention is a method thai proactively protects ...

"General Dependency Model For Invalidating Cache Entries"

Systems, methods, and computer products for deriving custom cache dependencies are explained. A framework that includes an extensible cache dependency base class that can be used to derive custom cache dependency classes for invalidating cache entries on some custom condition is disclosed. In some embodiments, a Web...

Ranged Lookups

ABSTRACT OF THE DISCLOSURE RANGED LOOKUPS A requester may request a ranged lookup operation with respect to an encrypted column of a database. An indexing structure may be used to perform the ranged lookup operation. The indexing structure may include multiple entries. Each of the entries of the indexing structure ...

Identification And Visualization Of Trusted User Interface Objects

ABSTRACT IDENTIFICATION AND VISUALIZATION OF TRUSTED USER INTERFACE OBJECTS A unique system and method that faciHtates visually identifying authentic UI objects, bundles, or windows is provided. A detection component can detect when user-based input has activated a verification mode with respect to one or more tru...

Multi Form Design With Harmonic Composition For Dynamically Aggregated Documents

An architecture employed to create a high quality document, which is a document that looks good given the type(s) of content to be displayed in the document and the size/dimensions of the displayed document. The architecture can utilize high level templates that broadly define layout constraints to adapt the cont...

Rendering Digital Content In A Content Protection System According To A Plurality Of Chained Digital Licenses

A request to render encrypted content is received and a chain of licenses corresponding to the content is located. The chain includes a leaf license linked to the content at one end of the chain, a root license at the other end of the chain, and any intermediate license. The leaf license and any intermediate license...

Content Propagation For Enhanced Document Retrieval.

Systems and methods providing computer-implemented content propagation for enhanced document retrieval are described. In one aspect, reference information is directed to one or more documents is identified. The reference information is identified from one or more sources of data that are independent of a data source...

Rendering Protected Digital Content With In A Network Of Computing Devices Or The Like

Transmitter and receiver computing device are interconnected by a network. The transmitter transmits protected digital content to the receiver in a manner so that the receiver can access the content even though the content is directly licensed to the transmitter and not the receiver.

Stateless Bi Directional Proxy

A system and a method for redirecting data packets, the system comprising a stateless bi-directional proxy for redirecting data packets, said data packets including a header and a body, said header including a source address that identifies the source of the data packet and a destination address that identifies the ...

"Integrated Messaging User Interface With Message Based Logging"

Mechanisms for organizing messages across different message types. This may be accomplished by using a single integrated user interface (201) in which messages across a variety of different message types (211, 212, 213) are represented in a common way. For example, the user experience of placing a telephone call is ...

"Interactively Solving Constraints In A Font Hinting Language"

In a computing system that has access to a set of control points, the set of control points for generating an outline of a graphical object, the outline being utilized to determine how the graphical object is rendered, the position of some portions of the outline potentially being constrained to pre-determined locat...

Providing Direct Access To Hardware From A Virtual Environment

Extensions or other software applications can have direct access to hardware from within a virtual machine environment. The physical addresses of hardware can be mapped into process space of the virtual machine environment. Similarly, I/O ports can be allowed to pass through into the virtual environment. The virtual...

"Modular Document Format"

A method comprising:creating a package that defines a document, wherein the document includes a plurality of parts that make up the document, wherein each of the plurality of parts has an associated name and an associated content type; and providing a plurality of drivers associated with the package, wherein the plu...

Verifying Relevance Between Keywords And Web Site Contents

System and method for verifying relevance between terms and Web site contents are described. In one aspect, site contents from a bid URL are retrieved. Expanded term (s) semantically and/or contextually related to bid term (s) are calculated. Content similarity and expanded similarity measurements are calculated fro...

"Database Object Script Generation Method And System"

An automatic scripting of objects of various complexities in a relational database includes creating a hierarchical object tree from a single or multiple reference passed into the system. Duplicate object references are eliminated in the formation of the hierarchical tree. A dependency list is generated from the hie...

"System And Method For A User Interface Directed To Discovering And Publishing Presence Information On A Network"

A computer-implemented method for a user interface directed to discovering and publishing presence information on a network, comprising: determining whether a local user is present on the network; determining whether a nearby user is present on the network; instantiating a portion of the user interface for periph...

Efficient Patching

A facility for applying a software patch is described. Using an automatic patching agent, the facility receives the software patch. In response to receiving the software patch, without user intervention, the facility performs the following acts; First, the facility identifies an instance of an executable module that...

Related Term Suggestion For Multi Sense Query

System and method for related term suggestion are described. In one aspect, term clusters are as a function of calculated similarity of term vectors. Each term vector having been generated from search results associated with a set of high frequency of occurrence (FOO) historical queries previously submitted to a sea...

Vex Virtual Extension Framework

Extensions to operating systems or software application can be hosted in virtual environments to fault isolate the extension. A generic proxy extension invoked by a host process can coordinate the invocation of an appropriate extension in a virtual process that can provide the same support API as the host process. F...

"System And Method For Online Analytical Processing Using Dimension Attributes And Multiple Hierarchies Per Dimension"

A data model for accessing data in a relational database in an OLAP system utilizes a multiple-hierarchy dimension. The dimension includes a set of attributes. Each attribute is bound to a column in the relational database. A logical structure is defined, indicating the relationships between the attributes. Hierarch...

"Model 3 D Construction Application Program Interface"

A computer data structure applied to computer program objects in a tree hierarchy for rendering three-dimensional (3D) models, the data structure comprising: an object tree hierarchy for rendering a 3D scene;a root object in the tree hierarchy collecting the objects for the 3D scene;one or more group objects in the...

Efficient Patching

A facility for augmenting software in a target computer system is described. The facility receives and augmentation specification in the target computer system. The augmentations specification specifies; (a) a function to be augmented, (b) a parameter of the function to be tested, (c) a test to apply to the specifie...

Mining Service Requests For Product Support.

Systems and methods for mining service requests for product support are described. In one aspect, unstructured service requests are converted to one or more structured answer objects, Each structured answer object includes hierarchically structured historic problem diagnosis data. In view of a product problem descri...

Efficient Patching

A facility for automatically processing software patches is described. The facility receives in a computing system a distinguished patch package for modifying the behavior of a programmatic entity. The facility automatically extracts from the distinguished patch package (1) patch application information that identif...

"Query Opti Mizer System And Method"

An optimizer/normalizer is used to generate optimized intermediate language representation of an input query, such as an XML input query. A method of optimization of an input query in intermediate language form includes receiving the input query, examining the nodes in a left-depth first manner to identify code patt...

Method System, And Apparatus For Enabling Near Real Time Collaboration On An Electronic Document Through A Plurality Of Computer Systems

A method system, and apparatus are provided for collaborating on an electronic document. According to the method, a data structure may be maintained at each of the computer system participating in the collaborative session that represents the contents of a shared document. When user input is received at one of the c...

Checking The Security Of Web Services Configurations

Systems and method for checking security goals of a distributed system are described. In one aspect, detailed security policies are converted into a model. The detailed security policies are enforced during exchange of messages between one or more endpoints. The one or endpoints host respective principals networked ...

"System For Efficient Remote Projection Of Rich Interactive User Interfaces"

An exemplary method of communicating between a host device and a rendering device for controlling a user interface of the rendering device includes generating messages, encoding the messages in a buffer as blobs of data and communicating the blobs of data to the rendering device. Various other exemplary methods, dev...

"A System And Process For Generating High Dynamic Range Images From Multiple Exposures Of A Moving Scene"

A system and process for generating a high dynamic range (HDR) image from a bracketed image sequence, even in the presence of scene or camera motion, is presented. This is accomplished by first selecting one of the images as a reference image. Then, each non-reference image is registered with another one of the ima...

"System And Method For Expressing And Calculating A Relationship Between Measures"

A measure expression may include a relationship between measures defined by an arithmetic operation. A query may request a calculation of the measure expression over a selected range of attributes. The request may be processed by retrieving all rows comprising data within the selected range of attributes for each me...

"Accessing Different Types Of Electronic Messages Through A Common Messaging Interface"

The present invention relates to electronic messaging and, more particularly, to accessing different types of electronic messages through a common messaging interface.

"Maintaining Time Date Information For Syncing Low Fidelity Devices"

For low fidelity devices without time-date fields, the present invention provides for formatting, identifying and storing time-date information (350) corresponding to remote property values in a standard format (305) on the remote device. The time-date information is parsable by several devices and used in resolving...

A Method For Managing Communication Of Data.

An exemplary method involves creating a master session over a first connection through a server; and creating a virtual channel over the connection, the virtual channel operable to communicate a feature session. The method may involve establishing a direct connection that bypasses the server, and switching communica...

"Digital Ink Annotation Process And System For Recognizing, Anchoring And Reflowing Digital Ink Annotations"

A digital ink annotation process and system for processing digital documents and digital ink annotations therein. The process and system maintain an annotation’s position within a document such that the original intent and meaning of the annotation is preserved. This is true even if the document is edited, resized, ...

"Contact Management"

In a computing system that is in communication with one or more applications that are configured to utilize contact information, a method for providing a contact management system for managing contacts and their corresponding contact information for use by the one or more applications, the method comprising: creati...

"Dependency Based Package Deployment"

The deployment of packages and their dependents is provided. In an illustrative implementation, an interface operates to expose the components of a package and to determine the dependencies of the components. In operation, a scan is performed on the package components to identify those elements on which the componen...

"Query Intermediate Language Method And System"

A computer system and method generate a semantic representation of one or more XML language inquiries across relational and non-relational data sources. A semantic intermediate language representation explicitly describes the meaning of the one or more XML language inquiries. The semantic intermediate language may b...

"Markup Language And Object Model For Vector Graphics"

1. In a computing environment, a method comprising, receiving a function call via an interface, the function call comprising markup language data; and interpreting the markup language data to cause data in a scene graph to be modified.

"Debugging Breakpoints On Plugable Components"

The debugging of breakpoints on pluggable components is provided. In a computing environment having extensible, pluggable components, systems and methods are provided to allow for the setting of breakpoints in the run-time of the components such that errors may be observed, tracked, and resolved. In an illustrative...

"System And Method For Message Based Scalable Data Transport"

The invention deploys a message-based data transport platform, in which a communication engine controls the delivery of server or other backup data or other large quantity data to remote site based on message objects as fundamental units. Data sessions from one or more servers or other data sources may be buffered o...

Semantic Programming Language And Linguistic Object Model

A software development tool for programming natural language software applications is provided. The software development tool includes a programming language and a compiler. The programming language has a set of programming. The compiler is adapted to take a software programming constructs and to generate a software...

"Selecting A Wireless Networking Technology On A Device Capable Of Carrying Out Wireless Network Communications Via Multiple Wireless Technologies"

A method for selecting a wireless technology among multiple available wireless technologies on a computing device for establishing a network connection comprising the steps of maintaining a wireless technology selection framwork comprising a set of factors, wherein one or more of the factors are incorporated into ...

"Methods And Systems For Start Code Emulation Prevention And Data Stuffing"

Methods and systems provide approaches to start code emulation prevention at a granularity higher than the bit level. By operating at a level other than the bit level, processing capability requirements on both the encoder and decoder side can be reduced. In accordance with one or more embodiments, a start code emul...

"Systems, Methods, And Computer Readable Media For Invoking An Electronic Ink Or Handwriting Interface"

User interfaces, methods, systems, and computer-readable media for activating and/or displaying text input systems on display devices may include: (a) displaying a text input system activation target at a user changeable location on a display device; (b) receiving user input directed to the activation target; and (c...

"Software Development Infrastructure"

A software development architecture is provided for constructing a wide rang of software development tools. A software development tool can be created by integrating a specification specifying functionality specific to set of software development scenarios into a software development scenario-independent framework. ...

Language Localization Using Tables.

A system and process for providing translations of applications that may or may not have associated translation tables is described. Core translation tables may or may not be used in conjunction with application translation tables and community translation tables.

System And Method For Acquiring A Target With Intelligent Pointer Movement

The present invention is generally directed to assisting users to position a pointer on a target. Embodiments of the present invention provide a system, method, and computer-readable medium that guide a pointer toward a target. After the pointer is located on a target, pointer movement continues to be adjusted so th...

System And Method For Aligning Objects Using Non Linear Pointer Movement

The present invention provided a system, method, and computer-readable medium that adjusts pointer movement when an input device causes the pointer to intersect one or more alignment areas. Pointer movement is adjusted in the alignment areas to allow user to easily align GUI objects. The adjusted pointer movement is...

Task Oriented Processing As An Auxiliary To Primary Computing Environments"

A computing system that incorporates an auxiliary processor to the main system processor. The auxiliary system utilizes a separate application runtime for processes and is capable of operating even when the primary system is in an off state. Methods for load-balancing are provided based on computing needs respective...

"Generic Usb Drivers"

Techniques are disclosed to provide generic USB drivers. More particularly, a generic USB device driver architecture is described which enables development through a user-mode USB library that accesses a generic kernel-mode driver. In a described implementation, a method includes loading a kernel-mode generic device...

"Granular Control Over The Authority Of Replicated Information Via Fencing And Unfencing"

A method and system for controlling which content gets precedence and is replicated. A replica set is comprised of a set of resources. Each resource is associated with resource data and resource meta-data. For files-based systems, resource data includes file contents and attributes, while resource meta-data includes...

"Method And Apparatus For Generating Forms Using Form Types"

A method, computer readable medium and system are provided which generate model driven form user interfaces to represent data models. Using the method, to generate a form user interface to represent a data model, such as a business model, a selection is made to identify which of a plurality of different logical form...

"Fast Video Codec Transform Implementations"

A fast implementation of the 8-point WMV9/VC-9 transform is realized using a sequence of butterfly operations and matrix multiplies. A fast implementation of the inverse transform is realized by applying inverses of the butterfly operations with the matrix multiplies in reverse flow. These fast implementations permi...

"Automatic Detection And Patching Of Vulnerable Files"

Systems and methods are described that enable patching of security vulnerabilities in binary files. The detection and patching of vulnerable binary files is automatic, reliable, regression free, and comprehensive across networks on an unlimited scale. These advantages can be realized in various ways including, for e...

"State Migration In Multiple Nic Rdma Enabled Devices"

A method is provided for transferring control between a first network interface and at least a second network interface in a same multiple network interface device after the first network interface transmits an identifier generated by the first network interface. The method includes receiving a message from the seco...

"Processing Information Received At An Auxiliary Computing Device"

Described is a mechanism for receiving new data at an auxiliary device associated with a main computer system, and processing that new data within the auxiliary device firmware to take some action. The receipt and processing of the data is independent of whether the main computer system is in a powered-up state (onl...

Device Behavior Based On Surrounding Device

A method for modifying the operation of a device responsive to the detection of a remote device is provided. In the method, the remote device is detected, and communication with the remote device are established responsive to the detection of the remote device. A determination is made as to whether a feature of the ...

"Method And System For Mapping Content Between A Starting Template And A Target Template"

Methods and systems are provided for mapping content from a first or staring template to a second or target template. An analysis is performed of any content objects and content placeholders contained in the starting and target templates. One or more potential content mappings are generated for potentially mapping c...

"Metadata Editing Control"

A metadata management architecture. The architecture includes a property component that lists one or more properties related to a file, and a viewing component that present files having one or more of the related properties. A synchronization component provides immediate synchronization between property editing fi...

"Mechanism For Controlling A Decentralized Multi Party Conference"

The techniques and mechanisms described herein are directed to controlling communication paths between conference members in a decentralized multi-party conference that supports a full mesh architecture. Several check points are tested in order to handle concurrency issues and to ensure quality of service. First, a ...

"Method For Configuring A Video Presenting Network And System Thereof"

Resources of a video presenting network having plural outputs can be configured. A provisional configuration can be supported. Configuration of inputs can be performed separately from configuration of outputs. Interdependencies between network resources can be considered to restrict provided options to those co-fimc...

"Method And System For Ranking Documents Of A Search Result To Improve Diversity And Information Richness"

A method and system for ranking documents of search results based on information richness and diversity of topics. A ranking system determines the information richness of each document within a search result. The ranking system groups -documents of a search result based on their relatedness, meaning that they are di...

"Description Language For An Extensible Compiler And Tools Infrastructure"

Methods and systems are described herein for extending configuration dependent extensible software programs. Classes of a core extensible software program may be extended by adding a configuration dependent extension. The extensions may be added statically prior to compiling the core version of a software program or...

"System And Methods For Providing Network Quarantine"

A system and method for ensuring that having invalid or corrupt states are restricted from accessing network resources are provided. A quarantine coordination client (QCC) located on a client machine acquires statements of health from a plurality of quarantine policy client. The QCC packages the statements and provi...

"Systems And Methods For An Improved User Interface Shell For Small Computer Devices"

Various embodiments of the present invention are directed to systems and methods for to an improved user interface shell for small computer devices (SCD)s that execute typical operating systems and application programs. Several embodiments of the present invention are directed to a shell task user interface (STUI) t...

Discovery, Qualification, And Activation Of Software Add In Components

The present invention extends to methods, systems, and computer program products for discovering, qualifying, and activating software add-in components. An add-in components manager discovers one or more add-in components at the computer system are of a specified type of add-in component requested by an applicatio...

Systems And Method For Automating System Related Administrative Tasks

In an administrative tool environment, user input is supplied to an administrative tool framework for processing. The administrative tool framework maps user input to cmdlet objects. The cmdlet objects describe a grammar for parsing the user input and input objects to obtain expected input parameters. The input obje...

"A Web Service For Remote Application Discovery"

Systems and methods of a Web service for remote terminal service application discovery are described. In one aspect, a Web service in an Intranet is provided. The Web service is coupled to a public network. The Web service facilitates remote client computer discovery over the public network of information correspond...

"Method And Apparatus For Maintaining Relationships Between Parts In A Package"

Modular content framework and document format methods and systems are described  The described framework and format define a set of building blocks for composing, packaging, distributing, and rendering document-centered content, These building blocks define a platform-independent framework for document formats t...

"Interactive Computing System"

A method and system for adapting a computing device in response to changes in an environment surrounding the computing device, or in response to the user"s stated preferences. The computing device includes one or more sensors that sense the environment. A changed characteristic of the environment is detected. A dete...

"System And Method For Name Resolution"

In accordance with various aspects, the present invention relates to accessing and publishing documents between two computer systems or nodes that are connected together in a network environment. The system and method for name resolution stores an identity information document containing a user-friendly handle signi...

"System And Method For A User Interface That Provides Contact Based Sharing Of Resources"

A centralized user interface provides for sharing resources between a user and a contact that the user interface is centered around. When the user opens the view of the contact record, the user is provided with a section corresponding to resources shared by the user with the contact and another section for resources...

"Information Picker"

A user is able to informatively control how contact information is provided to one or more applications through the use of a persona interface object (210), corresponding personas (220) and contact information, and an information picker interface (300). The persona interface (210) identifies available personas (220)...

"System And Method For Media Enabled Messaging Having Publish And Send Feature"

A system and related techniques manage the adding of digital images or other media to email messages using a comparatively straightforward insert-and-send scheme. A user may choose to insert or embed comparatively low-resolution v ersions o f i mages o r other media automatically published to a media server into an ...

"System And Method For The Presentation Of Items Stored On A Computer

A system and method for presenting a plurality of items of multiple types to a user. A universal data store is provided which contains a plurality of items. A portion of the items contain metadata stored in accordance with an item decoration schema. A shell presents items with corresponding metadata with an item dec...

"Tiered Object Related Trust Decisions"

Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A pr...

"System And Method For Providing Rea Model Based Security"

A method (900) of providing Resource-Event-Agent (REA) model based security includes identifying (905) an association (515) between a first object (505) and a second object (510), where the first object is the Agent type and the second object is any REA object. Then, an association Class (520) is created (910) for t...

"A Multiple Mode Window Presentation System And Process"

A system and process for managing the presentation of windows on the display screen of a computing device is presented. This is a multiple-mode window presentation system and process that displays one or more of the peripheral GUI elements typically displayed on the display screen in addition to a window (402), such...

"Mechanism For Analyzing Partially Unresolved Input"

The present mechanism provides various capabilities for resolving strings within a command string. The present mechanism operates within an interactive operating environment by receiving a plurality of strings. For any string this is partially resolved, the mechanism initiates analysis for completely resolving the s...

"System And Method For Programming An Isolated Computing Environment"

A computer is provided with an isolated computing environment. The isolated computing environment is adapted to allow initial programming for use in manufacturing, distribution and sales. The isolated computing environment further allows an authenticated source or authenticated code to update the isolated computing ...

"Proximity Detection Using Wireless Signal Strengths"

Described is a system and method in a wireless (Wi-Fi) network comprising a server, clients and various mechanisms that compute lists of other clients and resources that are physically nearby. Clients report Wi-Fi access points" signal strengths to a server, which uses that data to compute the proximity of resources...

"Model Based Management Of Computer Systems And Distributed Applications"

Model-based application management arehitecture. A developer can describe an Application or service in terms of its constituent components. Desired states can be described in terms of functionality, configuration, security, and performance. The description is employed at application installation to configure managem...

"System And Method, And Api For Progressive Installing A Software Application"

Described is a mechanism for enabling an application operating as a web application to transition to a client-side application without impacting a user"s interaction with the application. The progressive installation transitions through three states: a start-up state, a demand state, and an install state. During ...

"Mechanism For Providing Data Driven Commven Command Line Output"

The present mechanism provides a data driven command line output within an environment that supports a pipeline of object-based commands. Each object-based command inputs a parseable object for processing and outputs another parseable object for subsequent command processing. The mechanism is operative to direct for...

Simultaneously Pawning Multiple Searches Across Multiple Providers

Various embodiments provide the ability to simultaneously spawn a search across multiple different data providers. In at least some embodiments, the simultaneous spawning of the searches takes place in the context of a tabbed browsing environment. There, individual tabs of a browser are each associated with a differ...

"Connecting Entities With General Functionality In Aspect Patterns"

A task oriented user interface (208) increases ease of use of the system because the user is guided through the system. The tasks resemble how the user thinks he/she should do the job. This aids and assists the user in doing the job.

"Localization Of Xml Via Transformations"

Described are techniques and mechanisms directed at enabling a markup transformation that is localizable generally stated, a transform receives as input two things (1) an input document containing markup, and (2) transformation instructions including an identifier of a particular element that has different values ba...

"Secure Federation Of Data Communications Networks"

Techniques for secure federation of data communication networks are provided. The techniques employ an edge proxy server to route messages depending on a federation mode. In Direct federation mode, an edge proxy server of a network is configured to exchange messages with a specified set of entities, such as other ne...

"Method And System For Embedding Context Information In A Document"

A generic smart Tag module has a generic recognizer and a generic action handler. The generic module is provided for a platform with access to a repository having Smart Tag configuration information and recognizers and action handlers for each host application residing in the platform. The repository may be a shared...

"Multi Channel Echo Cancellation With Round Robin Regularization"

A method and system of multi-channel echo cancellation using round robin regularization. The multi-channel round robin regularization echo cancellation method includes applying a plurality of adaptive filters, each having an inverse correlation matrix, to the multi-channel playback signal. Each of the plurality of a...

"System And Method For Communicating Product Information"

A system and method for empowering consumers in a retail environment. Among many oter features, the present invention provides a number of menu and item list features to enhance a shopper's experience in a retail environment. In addition, the invention provides an item-level location mapping feature. By the use of t...

"Sharing Data Within An Instant Messaging Session "

Sharing data within an instant messaging session is described. A user participating in an instant messaging session request a data access key. The key, which provides access to data associated with the user, may then be transmitted via the instant messaging session to one or more other participants in the instant me...

"Integrating Best Practices Into Database Design"

Best practice guidelines are integrated into the design of database applications so that it is less likely that inappropriate values are set. A proposed value for a database objct may be compared to an archive of best practice guidelines. If the proposed value does not comply with best practice guidelines, a best pr...

"Mechanism For Providing Exgtended Functionality To Command Line Instructions."

The present mechanism allows commands entered on a command line in a command line operating environment the ability to execute in a first execution mode or an alternate execution mode. The command is executed in the alternate execution mode if the command includes an instruction to execute in the alternate execution...

"Verifying Human Interaction To A Computer Entity By Way Of A Trusted Component On A Computing Device Or The Like"

A method describes user interaction in combination with sending a send item from an application of a computing device to a recipient. The computing device has an attestation unit thereon for attesting to trustworthiness. The application facilitates a user in constructing the send item, and pre-determined indicia are...

"Api For Programmtic Retrieval And Replay Of Database Trace"

Trace and replay objects can be designed to automatically perform operations concerning database trace data upon invocation by custom computer processes. Trace data can be saved to any of variety of locations. It can be manipulated for the purpose of storage or replay. Trace data can be played back against any datab...

"Method And System For Ranking Objects Based On Intra Type And Inter Type Relationships"

A method and system for ranking objects based on relationships with objects of a different object type is provided. The ranking system defines an equation for each attribute of each type of object. The equations define the attribute values and are based on relationships between the attribute and the attributes assoc...

"Orthogonal Pulse Polarity Modulation"

Orthogonal pulse polarity modulation involves wireless communication in which the polarity of modulating pulses are set responsive to positive and negative character values of a corresponding code sequence. In a described implementation, data is converted to chip waveforms, spectrum lines are removed, and pulses are...

"Method And Apparatus For Dynamically Activating/Deactivating An Operating System"

A dynamic software activation system allows activation and deactivation of an operating system based upon a desired business process. The dynamic software activation system allows a user to request usage of the operating system for a specific period of time, for a specific amount of usage, or in any other desired ma...

"System And Method For Distribution Of Provisioning Packets"

A software provisioning method and apparatus use a provisioning packet delivery mechanism having a database, a distribution service, and a confirmation service to receive, queue, and confirm delivery of provisioning packet to a computer. When the number of unconfirmed delivery requests exceeds a limit the distributi...

Terrain Rendering Using Nested Regular Grids

Plural levels of detail of a terrain are stored in memory in regular grids. In one such example, a terrain is cached in a set of nested regular grids obtained from the plural levels as a function of distance from a viewpoint. In one such example, the plural levels of detail of terrain comprise terrain elevation and ...

"Delicate Metering Of Computer Usage"

. A pay-per-use or metered-use computer uses a balance manager to monitor usage and update a value balance according to a first usage schedule when the computer is in active use. When the activity level of the computer is reduced below a threshold, the balance manager may update the value balance according to ...

"Concurrent Transactions And Page Synchronization"

Systems and methodologies are provided for efficiently performing concurrent transactions by multiple users, and tracking data at a logical level beneath a physical level of the object being modified. Each transaction can copy a committed version of the data segment to be modified to its reswpective space, and can u...

"Isolated Computing Environment Anchored Into Cpu And Motherboard"

A computer is adapted for pay-for-use operation by adding an isolated computing environment to a standard computer. The isolated computing environment may include a trusted non-volatile memory, a digital signature verification capability, a clock or timer and a logic circuit for triggering execution of a validation ...

"Special Pc Mode Entered Upon Detection Of Undesired State"

A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing environment boots prior to any boot device associated with an operating system, runs concurrently with the operating system and monitors and measures the co...

"Method And System For Indexing And Searching Databases"

A search system generate an index for database by generatively sampling the databases and uses that index to identify and formulate queries for searching the databases. The generated index is referred to as a domain-attribute index and contains a domain-level index and site-level indexes. A site-level index for a da...

"Pnp Functionality For Unsupported Devices"

The present invention provides Plug and Play (PnP) functionality for devices that are not supported by an operating system. In response to the installation of an unsupported device, the operating system sends the event to a device manager application residing in user mode code. Upon receiving the event, the device m...

"Low Resolution Ocr For Camera Acquired Documents""

A global optimization framework for optical character recognition (OCR) of low resolution photographed document that combines a binarization-type process, segmentation, and recognition into a single process. The framework includes a machine learning approach trained on a large amount of data. A convolutional neural ...

"System And Method For Delayed Fetching Of Designated Members Of A User Defined Type"

A number of members of a user defined type may be designated as delayable members. During an initial fetch of the type, the type may be returned from the database without the delayable members, thereby preserving valuable bandwidth and reducing the amount of time required to perform the initial fetch. Upon request, ...

"System And Method For Automated Correction Of Digital Images"

A system and method are provided for correcting an image captured by a digital image capturig device. The method includes calculating a log of a desired correction value based on sample point and a target value for that point and calculating an approximation to the log of illumination based on an input pixel intensi...

"Method And Apparatus For Single Reactivation Of Software Product Licenses"

A method for reactivation of software products includes activating a first software product associated with a reactivation policy group. A hardware identifier derived from the computer hardware configuration is bound with the first software product activation. A second software product is activated having an associa...

"Method And System For Determining Similarity Of Objects Based On Heterogeneous Relationships"

A method and system for measuring the similarity of objects based on relationships with objects of the same type and different types and similarities of those objects to other objects is provided. In one embodiment, the similarity system defines intra-type and similarity functions for each type of object. The simila...

"Impact Analysis In An Object Model"

Impact analysis provides the ability to determine the objects that a particular object depends on or uses, as well as determine the objects that are dependent on or use particular object. The term object may refer to tasks and/or object types, for example. Impact analysis is desirable for improving user productivity...

"Search Engine Spam Detection Using External Data"

Evaluating an electronic document in connection with search. An external source provides data for use in evaluating an electronic document retrieved by a search engine. A first confidence level of the electronic document is determined based on the externally provided data. The first confidence level indicates a like...

Logical Virtual Bridged Local Area Networks

A method for segregating traffic among a plurality of end stations associated with a single network access point comprising: a first end station from among said end stations receiving frames transmitted from said single network access point, some of said frames belonging to a first subset of said end stations to ...

"Interfaces For A Productivity Suite Application And A Hosted User Interface"

User interfaces arc defined by metadata for use with productivity suite applications in a wrapped window, a task pain, or some other suitable representation. Data can be bound to a data source in a one-way format such that changes from the data source propagate to property fields in the UI form. Data can also be bou...

"Efficient One To One Many Content Distribution In A Peer To Peer Computer Network"

na

"Method System And Apparatus For Discovering And Connecting To Data Sources"

A method, system, and apparatus for discovering and connecting to data sources are provided. A system is provided that includes a server computer operative to maintain a centrally managed repository of data connection definitions. A client computer is also provided including an application program capable of consumi...

System And Method For Generating Embedded Resource Updates For Output Device

A system and related techniques generate an update to control programming, such as firmware, to embed in an electronic document and transmit to a printer, facsimile or other output device. Compatible printer or other output devices according to embodiments of the invention may contain an intermediate language interp...

"Appropriately Rendering A Graphical Object When A Corresponding Outline Lacks Control Points"

The principles of the present invention relates to appropriately rendering a graphical object when a corresponding outline lacks necessary control points. A computer system calculates the target width for a feature of the graphical object. The computer system calculates the position of a center line corresponding to...

"Method, System, And Apparatus For Exposing Workbook Ranges As Data Sources"

A method, system and apparatus are provided for exposing and utilizing workbook ranges as server data sources. The system includes a client computer capable of executing a spreadsheet application program for creating a workbook including a range that includes data objects. The workbook may be published to a server c...

"Managing Spyware And Unwanted Software Through Auto Start Extensibility Points"

A monitoring service is provided that detects spyware or other unwanted software at the time it is installed and/or allows for the spyware"s removal. The service monitors "Auto-Start Extensibility Points" ("ASEPs") to detect spyware installations. ASEPs refer to the configuration points that can be "hocked" to allow...

10 Term Database Extension For Label System

A method stores, uses and suggests terms in a business solution software program having multiple languages (710). Instead of only searching for a general use of a term based on its text (741) and general use (734, 735), one can search for a term based on a specific use in a module. Each term is assigned its own uniq...

"System And Method For Storing And Retrieving A Field Of A User Defined Type Outside Of A Database Store In Which The Type Is Defined"

A type of an object that can be persisted in a database store is defined by a user (Figure 7). The type definition comprises fields and behaviors, each field having a respective data type. One or more fields of the type definition may be designated as containing data of a type that is to be stored as a file outside ...

"Combining Multidimensional Expressions And Data Mining Extensions To Mine Olap Cubes"

A language schema that integrates multidimensional extensions (e.g., MDX) and data mining extensions (e.g., DMX) for performing data mining operations on data residing in OLAP cubes. The schema provides that the can not only be a relational query, rather a multidimensional query formed using MDX, for example, for e...

"Smart Ui Recording And Playback Framework"

Techniques and tools are described for recording and reliably replicating graphical user interface (“GUI”) activity for various applications, including application that have dynamic user interfaces. The techniques and tools may be used in combination or separately. For example, a recording tool receives internal mac...

"Creation And Management Of Content Related Objects"

A web content management server allows for the automatic creation, management and publication of variant objects from a parent. The variant object is created as a copy of the corresponding parent object and may then be modified. Each object includes a pages list that identifies all associated objects and the content...

"Method, System, And Apparatus For Identifying Unresponsive Portions Of A Computer Program"

A method, system, and apparatus are provided for identifying unresponsive portions of a computer program. According to the method, program code that can potentially result in unresponsive behavior is wrapped in timers. A timer is started on a background thread at the beginning of the execution of a section of progra...

"System And Method For Extending Application Preferences Classes"

The present systems and methods disclose a system for personalizing computer functionality. End-users are provided with tools to easily write rich and complex preferences, for example, by using a plurality simple IF-THEN propositional logic. The preferences are then transformed into queries and executed efficiently ...

"External Metadata Processing"

The operation of a data flow is improved by providing for validation of the consistency of the data flow with the external data files it works with, even in the face of changes in those external data files. Metadata is stored regarding the external data files. Because external data files may change, this metadata is...

"System And Mehtod For Preference Application Installation And Execution"

The present systems and methods disclose a system for personalizing computer functionality. End-users are provided with tools to easily write rich and complex preferences, for example, by using a plurality simple IF-THEN propositional logic. The preferences are then transformed into queries and executed efficiently ...

"Method System , And Apparatus For Providing Access To Workbook Models Through Remote Function Calls"

A method, system and apparatus are provided for exposing and calling workbook models via remote function calls according to the system, a client computer executes a spreadsheer program for creating a workbook model. The workbook model may be published to a server computer along with data defining a function name and...

"Proactive Computer Malware Protection Through Dynamic Translation"

The present invention includes a system and method for transiting potential malware devices into sale program code. The potential malware is translated from any one of a number of different types of source languages, including, but not limited to, native CPU program code, platform independent .NET byte code, scripti...

"User Control For Dynamically Adjusting The Scope Of A Data Set"

A user control for dynamically ajdusting the scope of a set of content, information, adn/or data and a user interface (UI) for representing the same are provided. A scope control toll represented, e.g. by a selectable icon, may be accessible from all screens in the UI and may be applied to both traditional list-ty...

"A System For Customer And Automatic Color Management Using Policy Controls"

Methods and apparatuses for supporting a color management system that processes an image in accordance to a hierarchically-structured policy are provided. The policy may be modeled with a schema in which the policy is organized with a plurality of policy levels. Policy settings at a lower policy level may override p...

"Cross Platfrom Runtime Code Generaton For Bit Block Transfer Functions"

An exemplary method for performing a bit block transfer (bitblt) includes receiving one or more graphics parameters specifying the bitblt and generating a specialized bitblt function to perform the bitblt. The specialized bitblt function includes a one or more code blocks selected from a superset of code blocks base...

"Hierarchical Projects In A Computer Enabled Project Management Method And System"

Methods and systems are provided for establishing a hierarchical relationship between a parent or master project schedule and sub-project schedules including tasks and phases required for completion of the parent or master project. When changes are made to data contained in a given parent or master project schedule ...

"System And Method For Auditing A Network"

A network is audited by running task programs and evaluating the results of the task programs. Task programs are tools that are configured to retrieve information about a particular network device. A service is arranged to coordinate the scheduling, execution, and data collection and aggregation of each task program...

"System And Method For Ranking Search Results Using Click Distance"

Search results of a search query on a network are ranked according to an additional click distance property associated with each of the document on the network. The click distance is measurement of the number clicks or user navigations from a pages or pages on the network designated as highest authority or root page...

"Spreadsheet Functions For Tables Of Data"

The present invention provides several database formulas that can manipulate large sets of data. Each database formula is customizable and repeatable without user intervention. This, users may enter numerous options that can cover the user’s desire for data output in certain forms of formats, select a set of input d...

"Contextual Action Publishing"

A computing system for the publication of actions associated with the current context of an entity, such as a business object is provided. The computing system has a component that stores entities, a component that stores the actions associated with the entities, and a software component that provides information ab...

"Transport Agnostic Pull Mode Messaging Service"

Transport agnostic pull mode messaging service enables clients of diverse types to send and receive messages to one another while guaranteeing delivery of messages. Client specific adapters connect to a server and pull messages waiting for them in a queue. Clients may specify themselves as the recipients of the pull...

"Method, System And Apparatus For Processing Information Based On The Discovery Of Semantically Labeled Strings"

A method, system, and apparatus for providing information related to a location or geographic region. When a string is entered into an application program, the string is analyzed to determine whether the string relates to one or more locations or geographic regions. If the string relates to a location or geographic ...

"Easy To Use Data Context Filtering"

A method system for the graphical formulation of filter queries is disclosed which enable data queries to be easily via selection form a menu. A signal is received to filter, or query, a data table. Next, the context of the signaled key field is analyzed, and a menu of filters based on that context is formulated and...

"Sustaining Session Connections"

In an embodiment, techniques for sustaining session connections are provided. The techniques send heartbeat messages when not sending a message may cause the session connection to close because of a timeout condition. Heartbeat messages are valid transport layer messages that will be ignored by protocols at higher l...

"Stretch Driven Mesh Parameterization Using Spectral Analysis"

A method of performing stretch-driven mesh parameterization. A method of performing stretch-driven mesh parameterization comprising, computing a spectral analysis to parameterize a mesh, and iterating a stretch optimization calculation to further optimize the initial parameterization

"Common Charting Using Shapes"

A method for rendering a chart associated with a document includes translating a chart object into a shape-based chart definition, wherein the chart object defines the chart with chart elements, and the shape-based shape definition defines the chart with shapes, and maintaining the chart object in the document to en...

"Method, System, And Apparatus For Providing A Document Preview"

A method and apparatus are provided for generating a document preview. According to the method, a preview handler provides an interface to one or more previewers. The previewers are software components capable of generating a visual preview for one or more document types. In response to a request from a host applica...

"System And Method For Scoping Searches Using Index Keys"

A set of index keys is included in an index search system that are associated with the scope of the search rather than the content of the documents that are the target of the search. These scope related index keys, or scope keys allows the scope of the search to be selected, reducing the number of documents that a s...

"Systems And Methods For Modifying Complex Structured Type Columns In A Database"

A technique for updating collection-valued and other complex structured columns in a nested table using a nested extension of an UPDATE statement that uses syntax and semantics to modify collection-valued columns in a way that is analogous to the syntax and semantics of the UPDATE statement that is used to modify sc...

"Method And Apparatus For Constructing Representations Of Objects And Entities"

A method of constructing a representation of an object (410) having at least one property includes identifying (905) at least one property group (460) associated with the object which has been chosen to represent the object. At least one property of the object belongs to each property group identified as being assoc...

"System And Method For Incorporating Anchor Text Into Ranking Search Results"

Search results of a search query on a network are ranked according to a scoring function that incorporates anchor text as a term. The scoring function is adjusted so that a target document of anchor text reflect the use of terms in the anchor text in the target document"s ranking. Initially, the properties associate...

"A Color Management System That Supports Legacy And Advanced Color Management Applications"

The present invention provides method and apparatus for supporting a legacy application programming interface (API) set between a component and a color management system. The legacy API set supports both the new capabilities as well as the legacy capabilities. The color management system determines the format type f...
Several embodiments of the present invention comprise a storage platform that provides a synchronization service that (i) allows multiple instances of the storage platform (each with its own data store) to synchronize parts of their content according to a flexible set of rules, and (ii) provides an infrastructure fo...

"System And Method For Opimizing Network Communication In Response To Network Conditions"

A system and method for facilitating communication between a mobile device and a network application are provided. A mobile device transmits a request for data change information that includes a time out interval. The network application receives the request and measures a time elapsed since the receipt of the data ...

Load Balancing

Efforts to avoid time-outs during execution of an application in a managed execution environment may be implemented by monitoring memory allocation.

Rebootless Display Driver Upgrades

Systems and methods for reboot less updating of a 1HV display driver are disclosed. According to such a method, first, the operating system stops the driver from running. Second, the system switches over to an interim or temporary display driver, which be a default driver provided with the operating system. Third, t...

Obtaining Server Usage Information

Methods server usage information and organization information related to the market/organizational context in which the server is operated. Server information is collected from servers and is sent over a network. Server usage information may be obtained by receiving server information over a network and processing...

"System And Method For Versioning Based Triggers"

A system and/or methodology to track and organize database application data in response to a delete, insert or update procedure. More specifically, a system and/or methodology that employs a version-based retention and linkage approach with respect to triggering implementations is provided.

"Method For Updating Data In Accordance With Rights Management Policy"

a method for dynamically applying a rights management policy to a message by allowing an administrator to associate certain rights management policies with certain senders and recipients of messages, with groups of users possessing certain common criteria which define the users and groups of users, with certain attr...

"Interactive Viewpoint Video System And Process"

A system and process for generating, and then rendering and displaying, an interactive viewpoint video in which a user can watch a dynamic scene while manipulating (freezing, slowing down, or reversing) time and changing the viewpoint at will. In general, the interactive viewpoint video is generated using a small nu...

"Pre Licensing Of Rights Management Protected Content"

The present invention allows for a pre-licensing process for content that is subject to rights management in order to allow a principal (335) access to the content when the principal (335) does not have access to the rights management server (315). Rather than requiring the principal (335) to submit a rights account...

"Adapter Framework For Line Of Business Application Integration"

The present invention provides a framework to facilitate interoperability and interactions with a plurality of line-of-business (LOB) applications. In particular, maps are populated with application or system design information such as semantic and technical data. The maps are subsequently employed by the framework ...

"Systems And Methods For Implementation Of A Synchronization Schemas For Units Of Information Manageable By A Hardware/Software Interface System"

Several embodiments of the present invention comprise a storage platform that provides a synchronization service that (i) allows multiple instances of the storage platform (each with its own data store) to synchronize parts of their content according to a flexible set of rules, and (ii) provides an infrastructure fo...

"Automated Taxonomy Generation"

In a hierarchical taxonomy of document, the categories of information may be structured as a binary tree with the nodes of the binary tree containing information relevant to the search. The binary tree may be "trained" or formed by examining a training set of documents and separating those documents into two child n...

"Verifying Dynamically Generated Operations On A Data Store"

Verifying dynamically generated operations on a data store includes carrying out setup actions for access to the data store, the setup actions being based at least in part on a request for which the dynamically generated operations will be generated. The carrying out of setup actions includes permissions being set f...

"Systems For Unifying Heterogeneous Multimedia Tuners"

A system for unifying heterogeneous multimedia tuners is described. The system is capable of producing a unified channel lineup and coordinating multiple diverse tuners to perform multimedia tasks associated with the unified lineup. In one implementation, tuner allocation policy allows behind-the-scenes tuner assign...

"System And Method For Integrating Instant Messaging In A Multimedia Environment"

A system and method are provided for combining an instant messaging experience with a primary media experience in a multimedia system. The method includes providing an instant messaging user interface component and displaying the instant messaging user interface component as an overlay on a screen displaying the pri...

"End User Application Customization Using Rules"

Rules architecture that facilitates data management of an application such that the application can be personalized by the end-user for the end-user. Included is a customization component that facilitates the exposing of an application generated event to an end-user. A rules component allows the end-user to create o...

"System And Method For Link Quality Routing Using A Weighted Cumulative Expected Transmission Time Metric"

A system and method for link quality routing uses a weighted cumulative expected transmission time path metric. A system for routing in a multi-hop ad hoc network, and a method for measuring the link quality of a route in the network, include assignment of a weight to a link in accordance with an expected transmissi...

"Efficient Changing Of Replica Sets In Distributed Fault Tolerant Computing System"

A distributed computing system can be operated in a fault tolerant manner using a set of computing devices. A set of computing devices can tolerate a number of failures by implementing identical replicas of a state machine and selecting proposals. The set of computing devices participating in the distributed computi...

"System And Method For A Consistency Check Of A Database Backup"

A method for performing a consistency check on a database backup of a database is performed without requiring a full recovery of the original database from the database backup. Instead, a database view may be used as a smaller storage requirement tool for providing a transaction-consistent view of portions of an exi...

"Systems And Method For A Snapshot Query During Database Recovery"

A method of performing a snapshot query in a database undergoing recovery allows access to the database during rollback or undo operations (Figure 2). The method includes allowing the query to detect whether a redo lock is present on a data item and if so, waiting until subsequent rollback operations release the loc...

"Rights Management Inter Entity Message Policies And Enforcement"

The present invention provides the ability to compare and enforce policies between trusted entities within a rights management system. For example, policies (355) between the two entities (325,330) may be received by either entity. They may then be compared to determine the compatibility of the two policies. If comp...

"Workflow Schedule Authoring Tool"

A workflow schedule authoring tool enables a user to author a workflow by arranging building blocks in a particular order. Building blocks may correspond to events, conditions or actions. Each building block is associated with source code that defines an action to be taken when the building block is processed. The o...

"Structured Indexes On Results Of Function Applications Over Data"

Indexed views or materialized views are used as a secondary index on a base table with multi-valued attributes. This provides for using the index to search in the nested data. Moreover, indexing is provided on the result of an unnest operation. Indexing a view on the result of an unnesting operation provides the abi...

Cheap Paxos"

A distributed computing system can be operated in a fault tolerant manner using a collection of auxiliary computing devices and more main computing devices than the number of faults the system can tolerate. A quorum of all of the main computing devices can be used. In the event of a failure, an alternative quorum fr...

"System For Recognizing Handwritten Information On Input Screen”

A method and apparatus for receiving strokes of electronic ink in more than one language is provided. An input device is used to enter at least one stroke of electronic ink into a processing device. The processing device stores a language indication associated with the electronic ink, such that the language indicati...

"Framework For A Security System"

A framework for a security system is described. The framework may be used to track which security engines are available to enforce security policies. A security engine is a software resource that enforces security policies designed to help ensure that a vulnerability of an application or operating system cannot be e...

"Editing The Text Of An Arbitrary Graphic Via A Hierarchical List"

The present invention includes a graphics software program that automatically creates graphical content when a user creates or modifies a hierarchical list of content data and chooses from one of a plurality of graphical definition choices for the graphical elements. In addition, the present invention includes a use...

"Workflow In A Coollaborative Application"

A method for developing and managing workflow is disclosed. The method enables the development of workflows from workflow templates and/or preprogrammed components; associating a workflow with a schedule; modeling a workflow as a plurality of tasks and a plurality of human-to-human or human-to-computer interaction p...

"Type Path Indexing"

Efficient hierarchical searching is based on object type (500, 510, 520, 530). By pre-computing additional information and storing it in a fast-lookup structure, it is possible to quickly identify objects (900) that satisfy an object (900) retrieval request. Furthermore, it is also possible to use this technique to ...

"Method And System For Multithread Processing Of Spreadsheet Chain Calculations"

Embodiments of the invention involve a method of concurrent processing of chain calculations using multiple processors each having a separate recalculation engine in a spreadsheet program. The operations basically include first determining a number of available processors, then allocating a recalculation engine to e...

"Routing Of Resource Information In A Network"

A method for disseminating resource information over a network, comprising: receiving, at a source entity, a consumer"s request for resource information; processing the request at the source entity to determine whether there are any resources designated as shareable over the network that meet the request and which...

"Cooperation Of Concurrent, Distributed Networks Of Resources"

A program (324, 320) that includes expressions written in a process-based language for representing protocol-based applications as processes is disclosed. A process kernel (320C, 306C, 304C, 308C) executes the expressions in the program. The expressions specify the interactions of processes by allowing a named organ...

"Systems And Methods That Schematize Audio/Video Data"

The present invention provides a novel file (120) management approach. The schema-based file management (110) technique that can be integrated within an operating system to provide application developers an efficient and powerful develop utility to build applications. The applications employ uniformly across dispara...

"Systems And Metthods For Fine Grained Access Control Of Data Stored In Relational Databases"

A system and process for ensuring the smooth flow of electronic ink (1203) is described. Dynamic rendering (1201) is give priority over other event handlers. Priority may be the use of one or more queues (1205, 1206) to order when events occur and may be performing dynamic rendering (1201) prior to other steps. ...

"Database Data Recovery System And Method"

The present invention relates to a system and method of data restoration, for instance, after the occurrence of a user error. In particular, snapshot database can be maintained that stores a copy of database data. The snapshot database does not have to store a complete copy of all data on a source database, but rath...

"Color Segmentation Based Stereo 3 D Reconstruction System And Process"

A system and process for computing a 3D reconstruction of a scene from multiple images thereof, which is based on a color segmentation-based approach, is presented. First, each image is independently segmented. Second, an initial disparity space distribution (DSD) is computed for each segment, using the assumption t...

"Protected Media Path And Refusal Response Enabler"

In a protected media path for delivering content from a source to a sink, a source authority (SOTA) on behalf of the source decides with regard to a policy corresponding to the content that a particular type of action with the content is to be refused, and provides a particular enabler to an application. The provide...

"Method For Dynamic Application Of Rights Management Policy"

Disclosed is a method for dynamically applying a rights management policy to a message by allowing an administrator to associate certain rights managements policies with certain senders (100) and recipients (208) of messages, with groups of users possessing certain common criteria which define the users and groups o...

"System And Method For Efficient Evaluation Of A Query That Invokes A Table Valued Function"

The present invention describes an efficient and fast framework for implementing table-valued fonctions (TVFs) in a relational database server (Figure 2). The framework provides desirable extensibility properties and has the ability to minimize performance degradations by integrating tightly with the optimization in...

"User Interface For Providing Task Management And Calendar Information"

An electronic "To-Do" bar is provided in which displayed upcoming tasks, meetings, appointments and the like. The electronic To-Do bar is displayed in a lightweight menu of tasks, meetings and appointments and is displayed persistently in addition to other software functionality or user interfaces displayed on a use...

"System And Method For Personalization Of Handwriting Recognition"

An improved system and method for personalizing recognition of an input method is provided. A trainable handwriting recognizer may be personalized by using ink written by the user and text authored by the user. The system includes a personalization service engine and a framework with interfaces for collecting, stori...

"One Click Conditional Formatting Method And System For Software Programs"

A method of conditionally formatting a display of data is disclosed that involves providing a preliminary display automatically showing the intended consequences of the condition applied to the data prior to making the condition actually apply to the data. This is especially useful in analysis of spreadsheet data by...

"Call Signs"

A method of generating a call sign. A method of generating a call sign comprising determining a distinguished qualifier, finding a distinguished salt, and hashing the distinguished salt with the distinguished qualifier.

"Method And Computer Readable Medium For Previewing And Performing Actions On Attachments To Electronic Mail Messages"

A method and computer-readable medium are provided for previewing and performing actions on attachments to electronic mail messages. A first window pane is displayed that includes a list of e-mail messages and information identifying any attachments to the e-mail messages. When an attachment is selected, a preview i...

"Method And System For Detecting When An Outgoing Communication Contains Certain Content"

A method and system for detecting whether an outgoing communication contains confidential information or other target information is provided. The detection system is provided with a collection of documents that contain confidential information, referred to as "confidential documents." When the detection system is p...

Remote Read Write Access To Disparate Data Stores

Providing a rich user experience on a network client in which personal information management (PIM) data from a plurality of data sources is aggregated and displayed to the user. An aggregation system connects to data sources and maps attributes of PIM data in the data sources to a common object model. An object of ...

"Method And System For Providing Cross Project Commitments"

Methods and systems are provided for managing dependencies between projects in a project management application. The methods and systems utilize one or more project webs which are shared web-based collaborative workspaces for managing dependencies between projects.

User State Migration From Source Computing Device To Destination Computing Device

Migration of a user state from a source computing device to a destination computing device using a state migration point (SMP) is disclosed. The destination computing device maybe the same as the source computing device but with a different operating system. The user state is securely stored by the SMP until the use...

Modeling User Input And Interaction In Workflow Based Applications

Systems and methods that implement interactivity as part of a workflow itself. Data is passed in and out of the workflow to form an interactive workflow, via employing an interactive activity component. Such interactive activity component models suspension points within a workflow dcfmition, wherein user input and a...

Feedback And Frame Synchronization Between Media Encoders And Decoders

Feedback and frame synchronization between media encoders and decoders is described. More particularly, the encoder can encode frames that are based on source content to be sent to the decoder. The encoder can determine whether the frame should be cached by the encoder and the decoder. If the frame is to be cached, ...

Delay Start Up Of Applications

A delay of starting up of certain applications may result in improving the overall performance of a system. The applications to be delayed may be placed in a container object or box such that they can be tracked and that other applications dependent on the delayed applications can be appropriately handled. ...

Data Effective Quantity On Hand And Adjusted Unit Cost Calculation

An accounting method can insert changes that affect average cost calculations after the initial average cost calculations. The method can go back in time and add in transactions that affect average cost and re-calculate average cost based on the added entry to all entries after the added entry. ...

Encapsulating Address Components

[0092] A transmitting node may utilize a shared secret to secure at least an encapsulated address component of an outbound message, and a receiving gateway may utilize the shared secret to authenticate and validate the secured addressed component of the received message.

"Anti Virus For An Item Store"

Systems and methodologies for integration of an anti virus AV Plug In(s) as part of an Item Store. The semantics for operation of the AV Plug In(s) are provided by the relational Item Store, via employing a metadata component and a scanning component associated with the Item Store. The metadata component can supply ...

Resource Freshness And Replication

Aspects of the subject matter described herein relate to resource replication systems. In aspects, a mechanism is described that detects when local resources are stale. Local resources may be stale when the time between a last successful synchronization activity and a current time exceeds a staleness value. If th...

"Method Of Determining Uncertainty Associated With Noise Reduction"

A method and apparatus are provided for determining uncertainty in noise reduction based on a parametric model of speech distortion. The method is first used to reduce noise in a noisy signal. In particular, noise is reduced (304) from a representation of a portion of a noisy signal to produce a representation of a ...

"Frame Accurate Editing Methods And Systems"

Methods and systems enable content authors to achieve frame-accurate editing and, in at least some embodiments, reduce the amount of content that needs to be decompressed in order to operate on the frames. Some embodiments ensure that bit rate integrity is preserved so that bit rate conditions associated with stream...

"Online Service Switching And Customizations"

A leaching chamber (20) has sidewall perforations (30) which slope downwardly from the interior to the exterior of the chamber, and which flare inwardly, so that the smallest perforation dimension is on the exterior surface of the sidewall (40). Mold cores (200) having inwardly retracting slides are used to form the...

"System And Method For Automatic Label Placement On Charts"

An algorithm is provided for optimizing the layout of labels associated with a visual data object such as a chart. The labels are first placed into a chart definition file that defines the labels as a shape. An initial layout of the labels is created and scored. The shapes are then manipulated iteratively until an o...

"Session Description Message Extensions"

Session description message extensions include information describing a multimedia presentation or a single media presentation. The session description message is typically sent from one device to another device to which the multimedia or single media presentation will be streamed. Several extensions are described t...

"Data Broadcasting Receiver Power Management"

Systems and methods for data broadcasting and power management techniques for data broadcast receiving devices are disclosed. A data broadcast receiving device receives a broadcast schedule from a data broadcast server and correlates the broadcast schedule with profile information in the data broadcast receiving dev...

"Object Model For Managing Firewall Services"

An object model is provided as a general framework for managing network services, such as firewall services. A user or an administrator of a computer may utilize the object model to manage and configure the firewall services. The object model isolates a user and/or an administrator from having to deal with the many ...

System And Methods For Automated Equation Buildup

Systems and methods for automatically building up an equation entered into a computer system can include an input module that accepts input of the equation in a linear string format, and an interpret module that interprets the input and automatically determines when a buildup point is reached. Systems can further in...

Shared Space For Communicating Information

ABSTRACT SHARED SPACE FOR COMMUNICATING INFORMATION Embodiments provide a shared space for communicating information. In an embodiment a number of users associated with a computing environment can use a shared space to communicate information with one another. Each computing device of the computing environment can ...

Message Forwarding Backup Manager In A Distributed Server System

ABSTRACT MESSAGE FORWARDING BACKUP MANAGER IN A DISTRIBUTED SERVER SYSTEM [0067] A distributed server system may include a primary manager, one or more backup managers communicatively coupled to the primary manager, and one or more workers communicatively coupled to the one or more backup managers. The one ore m...

"Method For Entering Text"

In a method of entering text into a device a first character input is provided that is indicative of a first character of a text entry. Next, a vocalization of the text entry is captured. A probable word candidate is then identified for a first word of the vocalization based upon the first character input and an ana...

Locating Repeating Media Objects In A Media Stream

An "object extractor" (260) automatically identifies and segments repeating media objects in a media stream (210). "Objects" are any section of non-negligible duration, i.e., a song, video, advertisement, jingle, etc., which would be considered to be a logical unit by a human listener or viewer. Identification and s...

"Foveated Panoramic Camera System"

A foveated panoramic camera system includes multiple cameras oriented so that individual images captured by the cameras can be combined to form a panoramic image. Each of the cameras includes a lens having a focal length that corresponds to a field of view for the camera. A field of view for a camera overlaps with t...

"A System And Method For Providing User Control Over Repeating Objects Embedded In A Stream"

Many media streams (210) con lain "objects" that repeat Repeating objects in a media stream are defined as any section of non negligible duration, i.e , a song, video, advertisement, jingle, etc , which would be considered to be a logical unit by a human listener or viewer An "object controller" (300) identifies suc...

"Low Cost, Steerable, Phased Array Antenna"

A low-cost, steerable, phased array antenna suitable for use in wireless fidelity (WiFi) and other wireless telecommunication networks, in particular multi-hop ad hoc networks, is disclosed. Various embodiments of an antenna assembly that includes a plurality of linear phased array antennas fed by corporate feeds ar...

Delivery Of Personalized Keyword Based Information Using Client Side Re Ranking

Search and information systems are provided that facilitate ranking of promotional material such as advertisements in view of personal information related to users who search for information from public databases. In one aspect, a search and information system is provided. The system includes a search component to l...

"System And Methods For Supporting Custom Graphical Representations In Reporting Software"

Systems and methods for supporting custom report layouts allow features that may be available to supported report layouts to also be made available to custom layouts. A custom layout definition may first meet a set of report definition criteria so that it is recognizable to report processing software. A design tool ...

Smart Soft Keyboard

Methods of using a soft keyboard are disclosed. A soft keyboard having one or more soft keys with a symbol displayed on the one or more soft keys is provided. A modifier may be applied to one of the symbols displayed on one of the soft keys by selecting the soft key and then providing a directional input. In an embo...

"An Improved User Interface For Displaying A Gallery Of Formating Options Applicable To A Selected Object"

An improved user interface is provided for displaying a gallery of images showing different formatting options combinations that may be applied to a selected object. When a particular image is selected an associated formatting options combination is automatically applied to the selected object. ...

"An Image Editing System"

A blended result image is computed using guided interpolation to alter image data within a destination domain. The destination domain may be altered based on a guided interpolator that is either dependent or not dependent upon a source image. When blending a source region into a destination region of an image, guide...

"Method And System For Prioritizing Communications Based On Interpersonal Relationships"

A method and system for calculating the importance of persons based on interpersonal relationships and prioritizing communications based on importance of participants in the communications is provided. A prioritization system identifies relationships between persons and identifies the importance of a person to other...

"Systems And Methods For Performing Quantum Computations"

Apparatus and methods for performing quantum computations are disclosed. Such apparatus and methods may include identifying a first quantum state of a lattice a system of quasi-particles disposed thereon, moving the quasi-particles within the lattice according to at least one predefined rule. Identifying a second qu...

"System And Method For Seamlessly Comparing Object"

The present comparison technique operates on objects having the same type, similar types, or different types. Multiple comparison objects may be compared against one or more reference objects. The comparison objects may be obtained from a prior cmdlet in a pipeline of cmdlets operating in an object-based environment...

"System And Method For Enforcing Location Privacy Using Right Management"

A system and method for securely delivering the location information of a mobile device to a location consumer is presented. In operation, the mobile device user issues a license to a location consumer. The license identifies the location consumer and any conditions the mobile device user places on the license. The ...

"Digital Goods Representation Based Upon Matrix Invariances"

Described herein is an implementation that produces a new representation of a digital good (such as an image) in a new defined representation domain. In particular, the representations in this new domain are based upon matrix invariances. In some implementaions, the matrix invariances may, for example, heavily use s...

Distributed Semantic Schema

The present invention relates to a computer readable medium having instructions that, when implemented on a computer cause the computer to process information. The instructions include a declarative logic module adapted to define a semantic object having at least one semantic slot and a procedural logic module adapt...

"Border Matting By Dynamic Programming"

Techniques are disclosed to provide more efficient and improved border matting for extracted foreground images, e.g., without requiring excessive user interaction. Border matting techniques described herein generate relatively continuous transparency (or alpha values) along the boundary of the extracted object (e.g....

"Spatial Scalablity In 3 D Sub Band Decoding Of Sdmctf Encoded Video"

Techniques and tools are described for scalable video coding and decoding. For example, a 3D sub-band decoder receives video encoded using spatial-domain motion-compensated temporal filtering at a first spatial resolution. The decoder decodes at least part of the video for output at a second spatial resolution lower...

Automatic Validation And Calibration Of Transaction Based Performance Models

The described systems, methods, and data structures are directed at automatic configuration of transaction-based performance models Models of an infrastructure are created and automatically configured used data provided by existing management tools that are designed to monitor the infrastructure These automatically ...

"Efficient Multimodal Method To Provide Input To A Computer Device"

A method and system for providing input into a computer includes receiving input speech from a user and providing data corresponding to the input speech. The data is used to search a collection of phrases and identify one or more phrases from the collection having a relation to the data. The one or more phrases are ...

"Machine Learned Approach To Determining Document Relevance For Search Over Large Electronic Collections Of Documents"

The present invention relates to a system and methodology that applies automated learning procedures for determining document relevance and assisting information retrieval activites. A system is provided that facilitates a machine-learned approach to determine document relevance. The system includes a storage compon...

"System And Method For Implicit Configurable Message Queue Based User Interface Automation Synchronization"

A system and method for implicit synchronization of user interface automation code with code of a computer program. A synchronization API is called that hooks into the message-qucuc of windows corresponding to the user interface. The synchronization API relurns when the relevant thrcads corresponding to the windows ...

"Embedded Base Layer Codec For 3 D Sub Band Coding"

Techniques and tools are described for scalable video coding and decoding. For example, a 3D sub-band video encoder includes an embedded base layer code as well as temporal sub-band transforms and spatial sub-band transforms. The placement of the base layer code among the sub-band transforms and the role of the base...

"Feedback Loop For Spam Prevention"

The subject invention provides for a feedback loop system and method that facilitate classifying items in connection with spam prevention in server and/or client-based architectures. The invention makes uses of a machine-learning approach as applied to spam filters, and in particular, randomly samples incoming email...

"A System And Method For Distributed Streaming Of Scalable Media"

A "PeerStreamer" provides receiver-driven peer-to-peer (P2P) media streaming for loosely coupled P2P networks. Peers in the network perform only simple operations, may cache all or part of the streaming media, do not collaborate with other peers, may be unreliable, and may drop offline or come online during any give...

"Broadcast Metadata Format Independent Of Transmission Standard"

A multi-standard receiving device processes broadcast transmission signals that use multiple differing transmission standards. Processing entails conversion of the transmission standard"s protocol standard into a normalized transport agnostic representation in order to allow consistent manipulation of a broadcast tr...

"Media Transrating Over A Bandwidth Limited Network"

[0068] A transrate manager on a host computer determines if there is a limitation in network bandwidth and controls the bit-rate of streaming media content accordingly. The bit-rate is controlled by excluding types of video frames from the streaming media content and then reintroducing excluded types of video frame...

"Declarative Representation For An Extensible Workflow Model"

Representing a componentized workflow model via a declarative markup language. Each step of the workflow is modeled as an activity that has metadata to describe design time aspects, compile time aspects, and runtime aspects of the workflow step. A user selects and arranges the activities to create the workflow via u...

"A System And Method For Erasure Coding Of Streaming Media"

A "PeerStreamer" provides receiver-driven peer-to-peer (P2P) media streaming for loosely coupled P2P networks. Peers in the network perform only simple operations, may cache all or part of the streaming media, do not collaborate with other peers, may be unreliable, and may drop offline or come online during any give...

"Securing Ingerman, Bruce Cordell Jones And Thomas"

The present invention extends to methods, systems, and computer program products for securing audio-based access to application data. A client sends and a server receives a request for audio-based access to application data. The server sends a first audio challenge for a user credential in response to the request. T...

"Active Content Wizard Execution With Improved Conspicuity"

Active Content Wizards (ACWs) related to helping computer users perform tasks are executed using an ACW interpreter. In one aspect of the present invention, the interpreter provides multiple levels of user interaction for a given ACW script. In order to help focus the user"s attention, various methods are used to in...

"Systems, Methods, And Interfaces For Providing Personalized Search And Information Access"

The present invention relates to systems and methods that employ user models to personalize generalized queries and/or search results according to information that is relevant to respective user characteristics. A system is provided that facilitates generating personalized searches of information. The system include...

Management Of User Access To Objects

Implementations of various technologies, including methods, systems and apparatus, for managing a request from a user to access an object. In one implementation, a determination is made as to whether the user is denied or granted access to the object based on a policy (step a). If the user is neither denied nor gran...

"Optimizing Communication Using Scaleable Peer Groups"

Implementations of the present invention relate in part to optimizations to peer-to-peer communication systems. For example, one implementation relates to use of a smart transceiver that creates, caches, and manages communication channels dynamically between peers. Another implementation relates to use of a central ...

Automatic Detection Of Online Commercial Intention

Features extracted from network browser pages and/or network search queries are leveraged to facilitate in detecting a user's browsing and/or searching intent. Machine learning classifiers constructed from these features automatically detect a user's online commercial intention (OCI). A user's intention can be comme...

Improving Performance And Efficiency Of Wireless Devices

A wireless input device may negotiate a predefined transmit receive schedule with a receiving device (i.e., PC, PDA, cellular device). To conserve power, the wireless components of the input device are powered down during periods of non-transmission. The wireless input device detects intermediate user input and corr...

Method And System For Registering A Distributed Service Site

A method may be practiced, for example, in a network computing environment including a client at a local site and a number of distributed services at a number of remote sites. The method includes pinging one or more distributed services at one or more remote sites. A message is received from a distributed service fr...

Data Independent Relevance Evaluation Utilizing Cognitive Concept Relationship

A measurable means to evaluate a given relevancy verification process to a human decision process is provided. For example, a cognitive concept relationship (CCR) system can be utilized to provide a relevancy verification evaluation that is independent of the relevancy quality of the test data employed to train the ...

Build Time Enforcement Of Architectural Paritionining

A computer software construct has a plurality of components and Is built based on an architecture designed for the construct. The architecture includes a number of partitions and dependency rules, where each partition is for having at least one component associated therewith. Each dependency rule specifies whether a...

Peer Distribution Point Feature For System Management Server

A client in a plurality of clients with a same network address or similar common identifier is designated a Peer Distribution Point (PDP) agent for distributing a software application divided into several packages to the plurality of clients. The plurality of clients are part of a client-server hierarchical system c...

Sorting Speakers In A Network Enabled Conference

SORTING SPEAKERS IN A NETWORK-ENABLED CONFERENCE Systems, methods, and/or techniques ("tools") are described that sort speakers in a network-enabled conference. In some cases, this sorted list of speakers indicates which speaker is dominant. With this sorted list, a participant's communication device may provide co...

Evaluating A Plurality Of Conditional Formatting Rules Applied To A User Interface

Generally described, embodiments of the present invention relate to applying and evaluating an unlimited number of conditional formatting rules to a given range of cells. Additionally, multiple conditional formatting rules may be evaluated to TRUE for the same cell contained in a user interface and multiple formats ...

"Method System And Computer Readable Medium For Merging Data From Multiple Data Sources For Use In An Electronic Document"

A method, apparatus, and computer-readable medium are provided for merging data from multiple data sources for use m an electromc document The method mcludes receiving field names and field data from an initial data source, mapping field names from a subsequently added data source to the initial data source, buildin...

"Method System, And Apparatus For Creating A Knowledge Interchange Profile"

This invention relates to a process for the storage of culture, such as mycorrhizae, comprising in the steps of : (i) selecting the fungus, namely Laccaria Laccata; (ii) introducing the fungus into a medium selected from potato dextrose agar or MMN and having a pH of 7.0 to 7.5; (ii) allowing the fungus of age; (iv)...

"Method And System For Synthetic Backup And Restore"

A method and system for backing up and restoring data. First, a full backup is performed to create a full dataset. Thereafter, incremental or differential datasets may be created by incremental or differential backups, respectively. When a new full dataset is needed, instead of performing a full backup, a previous f...

"Reliable Message Using Clocks With Synchronized Rates"

The present invention extends to methods, systems, and computer program products for reliable messaging using clocks with synchronized rates. Embodiments of the present invention insure at-most-once delivery of messages. A source and a destination utilize clocks with synchronized rates. Messages are assigned Time-To...

"Managing Terminal Services Accounts And Sessions For Online Utilization Of A Hosted Application"

Systems, computer-program-products, and methods for managing terminal services (TS) accounts and sessions for online utilization of hosted applications are provided A system is operative to monitor a supply of available TS accounts and create TS accounts in response to detecting that the supply of available TS accou...

"Last Line Of Defense Ensuring And Enforcing Sufficiently Valid/Current Code"

A computer is adapted for self-validation using a dedicated validation circuit or process. The validation circuit may include a timing circuit for activating the validation process, a verification circuit for verifying the computer is in compliance with a pre-determined set of conditions and an enforcement circuit f...

"System And Method For Selecting Test Case Execution Behaviors For Reproducible Test Automation"

A system and method for separating execution behaviors from test cases and consolidating execution behaviors in an execution behavior manager comprising or in communication with an execution behavior library. The method includes selecting an execution behavior for executing a step or action in a test case and sendin...

"Automated Test Case Verification That Is Loosely Coupled With Respect To Automated Test Case Execution"

A system and method for verifying the systemic results of an action applied to an application and for providing the expected state of the application at any time or on demand, in which a verification manager determines an expected application state and a current application state of the application, a test case in c...

"Partition Bus"

A method and system are provided for integrating partitions in a virtual machine environment. Specifically, a partition bus is provided, where the partition bus operatively connects partitions in such a way that it functions as a data transport mechanism allowing for data transfer and device sharing between partitio...

"Task Based Interface With Underlying Extensible Framework"

A computer-implemented method is disclosed. The method is for rendering a display associated with a task-oriented user interface. The method includes receiving a request to display a category view that includes an indication of a plurality of task categories. A system database is referenced to gain access to a colle...

"Methods For Generation And Validation Of Isogeny Based Signatures"

Techniques are described for generating and validating signatures. In an implementation, a method includes generating a signature by utilizing a plurality of isogenies included on a private key and incorporating the signature and a public key on a product, in which the public key is configured to validate the signat...

"Searchable Task Based Interface To Control Panel Functionality"

A computer-implemented method is disclosed. The method is for enabling a user to efficiently navigate to a portion of a user interface configured to support performance of a particular task. The method includes receiving from the user an input that includes a description of the particular task. A result set is retur...

"Mapping Of Schema Data Into Data Structures"

Translation architecture that facilitates translation between schema data and relational structures. The architecture includes a translation component that consumes schema data (e.g., an XML schema) that includes a schema structure, validates the schema structure, and persists in memory a representation of the schem...

Replacing System Hardware

ABSTRACT REPLACING SYSTEM HARDWARE -24- A method and apparatus for managing spare partition units in a partitionable computing device is disclosed. The method comprises detecting if a spare partition unit is required for addition or replacement in a local operating system and if a spare partition unit is requi...

Text Detection On Mobile Communications Devices

A mobile communications device with an integrated camera is directed towards text. A video stream is analyzed in real time to detect one or more words in a specified region of the video frames and to indicate the detected words on a display. Users can select a word in a video stream and subsequently move or extend t...

Lock Free State Merging In Parallelized Constraint Satisfaction Problem Solvers

Solver state merging in parallel constraint satisfaction problem (CSP) solvers. Solver state during processing of a computational thread of parallel CSP solvers is represented as a set of support graphs. The support graphs are merged in a pairwise fashion, yielding a new conflict-free graph. The merge process is fre...

"System And Method For Automatic Generation Of Search Results Based On Local Intention"

A system and related techniques automatically analyze Web search and other activity, to generate locality-selected results based on not just the user"s location, but also the business or other content provider"s location and the degree of local intent in the user"s query. The locality or region to the user may be id...

"Protected Media Path And Refusal Response Enabler"

A computing device has instantiated thereon a protected media path for delivering content from a source to a sink. In the protected media path, a media base provides a protected environment in the computing device and includes a common infrastructure of core components effectuating processing of content from any par...

"Increasing Data Locality Of Recently Assessed Resources"

Applications written in modern garbage collected languages like C# tend to have large dynamic working sets and poor data locality and are therefore likely to spend excess time on managing data movements between memory hierarchies. Instead, a low overhead dynamic technology improves data locality of applications. The...

"Creating Frequent Application Consistent Backups Efficiently"

Data can be protected at a production server in a virtually continuous fashion, without necessarily imposing severe constraints on the source application(s). For example, a production server can create an application-consistent backup of one or more volumes, the backups corresponding to a first instance in time. A v...

"Retaining Shadow Copy Data During Replication"

Implementations of the present invention provide systems, methods, and components configured to preserve valid shadow copies during replication cycles, before those valid shadow copies have expired. In particulr, one or more components can identify the size and rate of changes in production server data that will be ...

"Memory Dump Generation With Quick Reboot"

A method and system for writing a data image in the main memory of a computer to a secondary storage device minimizes delay in performing a required reboot. Prior to the reboot, a portion of the physical memory is copied either to a reserved memory space or to secondary storage, or one portion of memory may be copie...

"Driving Data Backups With Data Source Tagging"

Implementations of the present invention allow clients e.g., end-users, administrators, etc.) to associate data with one or more protection intents at the data/data source level. A backup server can then associate the data with a specific protection mechanism regardless of where the data/data source(s) are lo...

"Automatic View Selection"

A data system user interface that can employ different data collection Tenderers (e.g., views) based on an attribute of the content of a view-set (e.g., list, folder, directory) is provided. In accordance with aspects of the subject invention, views that are suitable to present certain types of content can be automa...

"Integrated Access Authorization"

A facility for performing an access control check as an integral component of an operating system and utilizing a centralized policy store is provided. The facility executes as an integral part of an operating system executing on a computer and receives an authorization query to determine whether a principal has aut...

"Access Authorization Api"

A facility for setting and revoking policies is provided. The facility receives a request from a controlling process a request to set a policy on a controlled process, and determines whether the controlling process has privilege to set the policy on the controlled process. If the facility determines that the control...

"Efficient Algorithm For Finding Candidate Objects For Remote Differential Compression"

The present invention finds candidate objects for remote differential compression. Objects are updated between two or more computing devices using remote differential compression (RDC) techniques such that required data transfers are minimized. An algorithm provides enhanced efficiencies for allowing the receiver to...

"Componentized And Extensible Workflow Model"

Building a componentized workflow model. Each step of the workflow is modeled as an activity that has metadata to describe design time aspects, compile time aspects, and runtime aspects of the workflow step. A user selects and arranges the activities to create the workflow via user interfaces or application programm...

"Client Add In Architecture"

A Smart Client solution for an enterprise application (e.g., a Customer Relationship Management system) includes a base application (e.g., Microsoft Outlook), and add-in software that interacts with the base application. The add-in software allows the base application to be used to access data and functions of the e...

"Centralized Method And System For Clarifying Voice Commands"

A computer-implemented method of facilitating centralized interaction with a user, the method comprising providing a recognized voice command to a plurality of application modules, receiving a plurality of interpretations of the voice  command,  the  plurality  of interpretations generated by at least one of the p...

A System For Controlling A Delivery Of Notifications

A system (200) for controlling the delivery of notifications. The system brokers and serializes the delivery of notifications (206) from multiple sources. In addition, a shared notion of user context is provided, for determining the appropriate handling for each of the notifications. In one embodiment, a user contex...

"Method And System For Presentation Of Media Obtained From A Media Stream"

implementation, as described herein, facilitates fast start-up of a new media stream while mitigating and in some implementations, avoiding temporal interruption (i.e., "stutter") of the presentation of that new media stream. At least one implementation, described herein, measures a rate at which a multimedia stream...

"Rele Based Filtering And Alerting"

The claimed subject matter provides a system and/or a method that facilitates utilizing rule-based technology with radio frequency identification (RFID) network. An interface can receive real-time RFID data from a process comprising at least one device collection in the RFID network, wherein a rules engine (RE) comp...

"Conversion Between Application Objects And Smart Client Objects"

A Smart Client solution for an enterprise application (e.g., a Customer Relationship Management system) includes a base application (e.g., Microsoft Outlook), and add-in software that interacts with the base application. The add-in software allows the base application to be used to access data and functions of the e...

A Method For Improved Vertical Handoff

A system and method for improved vertical handoff between different types of wireless network. Network allocation vector occupation and packet collision probability are used as quality of service measures, enabling vertical handoffs to be delayed until actually beneficial to quality of service. Improved wireless n...

"A Method For Providing Differentiated Quality Of Service (Qo S) Differentiation In A Time Slotted Wireless Network And A Wireless Device Therefor"

A method provides differentiated quality of service (QoS) by providing adaptive updates to media access control (MAC) layer parameters on a distributed basis. The method includes calculating a failure probability for a transmission over the network, determining a target value for determining a contention window acco...

"Method And Computer Readable Medium For Navigating Between Attachments To Electronic Mail Messages"

A method and computer-readable medium are provided for navigation between attachments to electronic mail messages. According to the method, a list of e-mail messages is displayed that includes header information associated with each of the messages. When one of the messages in the list is selected, a determination i...

"Lossless Adaptive Golomb/Rice Encoding And Decoding Of Integer Data Using Backward Adaptive Rules"

A method and system of lossless adaptive Golomb/Rice (G/R) encoding of integer data using a novel backward-adaptive technique having novel adaptation rules. The adaptive G/R encoder and decoder (codec) and method uses adaptation rules that adjust the G/R parameter after each codeword is generated. These adaptation r...

"Display Of Wireless Data"

A mobile electronic device for receiving and displaying information from a wireless signal transmission is provided. The device utilizes one or more mechanical and/or digital indicators for displaying the information. One embodiment of the invention provides a smart personal object, such as a watch device, for recei...

"Failover Scopes For Nodes Of A Computer Cluster"

A failover scope comprises a node collection in a computer cluster. A resource group (e.g., application program) is associated with one or more failover scopes. If a node fails, its hosted resource groups only failover to nodes identified in each resource group"s associated failover scope (s), beginning with a first...

"Network Node Enumeration"

Enumeration requests are sent from a node in a network. Each node that receives an enumeration request sends an enumeration response at a time determined by the node receiving the enumeration request.

"System And Method For Converting Text To Speech"

Text is converted to speech based at least in part on the context of the text A body of text may be parsed before being converted to speech Each portion may be analyzed to determine whether it has one or more particular attributes, which may be indicative of context The conversion of each text portion to speech may ...

Purchasing Of Individual Features Of A Software Product

In various embodiments, a user may, via a processing device, indicate a desire to purchase a feature of an installed software product. A purchase request may be sent to an e-commerce server, or other server. The purchase request may be validated and information concerning the software product, the feature of the sof...

"Distributed Speech Service"

The present invention relates to establishing a media channel and a signaling channel between a client and a server. The media channel uses a chosen codec and protocol for communication. Through the media channel and signaling channel, an application on the client can utilize speech services on the server. ...

Automatic Face Extraction For Use In Recorded Meetings Timelines"

Faces of speakers in a meeting or conference are automatically detected and facial images corresponding to each speaker are stored in a faces database. A timeline is created to graphically identify when each speaker is speaking during playback of a recording of the meeting. Instead of generically identifying each sp...

"Object Cloning For Demand Events"

A system and method for cloning objects by configuring a cloned object with properties of a shared object or of a properties collection for a demand event, and for unconfigunng the cloned object for a design event initiated on the cloned object During a design event, the cloned object may point to or be associated w...

"Creation Of Image Based Video Using Step Images"

A system that facilitates storing video, comprising: a component that receives a motion parameter and a computer environment parameter; and a step image component that determines a maximum step image size and a step image number, based upon the motion parameter and the computer environment parameter, and creates c...

Incrementally Updating And Formatting Hd Dvd Markup

Systems, methods, and/or techniques ("tools") for incrementally updating and formatting high-definition digital versatile disk (HD-DVD) markup are described herein. The tools may receive first markup representing a first scene description to be read from a HD-DVD, and may map the first markup into a first area compo...

"System Analysis And Management"

Systems and methods for implementing system management which are based on reviewing of the interactions between one or more programs and the persistent state they tend to represent. The system provides for the detection of modifications that occur within a system, verifying whether the modifications are approved or ...

Task Oriented Start Menu

A task-oriented start menu model. At least some of the items in the start menu represent a task category describing a task to be accomplished, rather than listing the application that accomplishes that task. For example, a user might select "Create new Letter" from the start menu, rather than selecting a shortcut ...

"Verb Error Recovery In Speech Recognition"

A computer implemented method and system for speech recognition are provided. The method and system generally maintain a set of verbs for speech recognition commands. Upon recognizing utterance of a verb of the set in combination with an invalid object or objects for the verb, the method and system generate an indic...

"Method And System For Document Assembly"

The assembly of documents assembled by a team is simplified. Document sections are assigned to a team member from within a word-processing document. Once a document template is opened by a user, the different sections within the document may be assigned to team members. Once a section is assigned, a notification is ...

"A Polymerzation Process Using Hydrofluourcarbon Diluents"

A system analyzes data from a search engine A User Search Bundler analyzes User Searches groups similar User Searches into User Search Bundles, and an Intent Processor produces Intents based on the User Search Bundles A Factor Generator considers User Searches and related information to produce Factors, where each F...

"Message Based Netowrk Configuration Of Domain Name Purchase"

Systems and methodologies that facilitate purchase and/or transfer of a domain name and access of users to the internet, by using a well defined protocol to interact with a plurality of domain name registrars, via employing; a purchasing component, and a mapping component. Once a user has identified a domain name, t...

"Method For Hardware Accelerated Anti Aliasing In 3 D"

A method and system for anti-aliased rasterization of objects From a particular viewpoint of an object represented by shapes, a shape is selected having an edge on a silhouette of the object An edge geometry is created at the edge of the shape that is on the silhouette of the object The edge geometry is rendered Eit...

"System And Method For Making User Interface Elements Visible"

Various new and non-obvious apparatus and methods for ensuring a user interface element is visible within an automated user interface test environment are disclosed. One of the disclosed embodiments is a method for locating a parent element of the user interface element and then making the user interface object visi...

"Method And System For Limiting Resource Usage Of A Version Store"

A method and system for limiting resource usage of a version store. A limit indicates a total amount of resources that may be consumed by in-progress transactions. A running total of the amount of remaining resources is maintained. Before a new transaction is started, a determination is made as to whether there are ...

"Extracting Treelet Translation Pairs"

In one embodiment of the present invention, a decoder receives a dependency tree as a source language input and accesses a set of statistical models that produce outputs combined in a log linear framework. The decoder also accesses a table of treelet translation pairs and returns a target dependency tree based on th...

"Optical Disk And Method Of Integrating A High Gain Rfid Antenna"

An optical disk comprises a disk substrate having a hub and an annular optical metallicized data region extending radially outward from the hub. The optical disk-further comprises a radio frequency identification (RFID) transponder affixed to the disk substrate, e.g., within the non-data containing hub region. The o...

"Computer Implemented System And Method For Providing Authoriative Answers To A General Information Search"

A computer-implemented system and method provides authoritative answers, developed within a community-based question answering service to users of a general network information search. This community-based question answering service receives a question from a first user, and receives answers from community members r...

"Support For Batching Of Events, And Shredding Of Batched Events In The Rfid Infrastructure Platform "

The claimed subject matter provides a system and/or a method that facilitates receiving data from at least one device. A radio frequency identification (RFID) network can include at least one device that receives data from a tag. A batcher comporient can collect the data based on a start boundary and an end boundary...

"Support For Reliable End To End Messaging Of Tags In An Rfid Infrastructure"

The claimed subject matter provides a system and/or a method that facilitates ensuring reliable data within a radio frequency identification (RFID) infrastructure. A radio frequency identification (RFID) network can include at least one device that receives data from a tag. A distribute component can initiate a reli...

“Techniques For Encoding And Decoding Mosaiced Image Data"

A new color space that maps image pixel values in a mosaiced sampling pattern (such as that generated by a Bayer color filter array) into four color channels that correspond to rectangular sampling patterns. Because these new channels correspond to a rectangular sampling grid, they are much more amenable to processi...

"System And Method For Moving Computer Displayable Content Into A Preferred User Interactive Focus Area"

"System And Method For Speeding Up Database Lookups For Multiple Synchronized Data Streams"

A "Media Identifier" operates on concurrent media streams to provide large numbers of clients with real-time server-side identification of media objects embedded in streaming media, such as radio, television, or Internet broadcasts. Such media objects may include songs, commercials, jingles, station identifiers, etc...

Start Menu Display Model

A start menu model in which a first start menu is first displayed that includes an initial list of application items (such as programs or tasks) as well as a more list expander icon. If the user selects the more list expander icon, the first start menu is replaced with a second start menu that includes a second...

Hardware Control Intiated Task Switching

Allowing a user to view a list of running tasks by simply selecting a hardware control on the computing system. In one embodiment, the list or running tasks may be displayed in a drop down menu. A task to be switched to may then be selected by using navigation buttons to select one of the running tasks. This signifi...

"Device Simulator Framework For An Rfid Infrastructure"

The claimed subject matter provides a system and/or a method that facilitates simulating one or more devices respective to disparate vendors, wherein the devices can be associated with an RFID infrastructure. A physical device can wirelessly receive data from a tag. A device simulator can employ a virtual replicatio...

"Synchronous Command Execution Model For Rfid Enabling Application"

The claimed subject matter provides a system and/or a method that facilitates providing communication channels within a radio frequency identification (RFID) infrastructure. A radio frequency identification (RFID) network can include at least one device that can receive data from a tag. A mixed mode component can em...

Reliability Of Execution For Device Provider Implementations

The claimed subject matter provides a system and/or a method that facilitates providing reliability associated with radio frequency identification (RFID) technology. An RFID network can include at least one device that wirelessly receives data from a tag. A provider component can have a dedicated execution space i...

Radio Frequency Control Of Computing System

The use of a cordless receiver to control a computing system. The simple alphanumeric controls of, for example, a telephone device may be used to control the computing system. For instance, upon the user selecting one of the alphanumeric controls on the telephonic device, a command may be sent to the computing syste...

Single Hardware Control Fast Initiated Switching Between Application And Utilities

Allowing a user to interface with one or more utilities while interfacing with an application. While displayintg a user interface for the application, the user may select a single hardware control to access the utilities. This might be accomplished by, for example, deactivating the process that runs the application ...

"Application Programming Interface For Text Mining And Search"

Systems and methods are described that allow programmatic access to search engine results and query logs in a structured form. The search results can be retrieved from the search engine in an intermediary form that contains the information that is in the HTML pages provided to web browsers (potentially with addition...

Cognitive Multi User Ofdma

A computing device operating according to a frequency division multiplexed protocol in which communication occurs over a signal formed from a plurality of sub-channels selected from anywhere in a frequency spectrum. A computing device may select sub-channels cognitively by using information about sub-channels previo...

"Controlled Manipulation Of Characters"

A method and system for manipulating characters displayed on a display screen is provided wherein the method includes identifying a selected word, wherein the selected word includes at least one character to be modified. The method further includes correlating each of the at least one character with a unique numeric...

"Content Evaluation"

Evaluating content is described, including generating a data set using an attribute associated with the content, evaluating the data set using a statistical distribution to identify a class of statistical outliers, and analyzing a web page to determine whether it is part of the class of statistical outliers. A syste...

Patient Monitoring Via Image Capture

ABSTRACT PATIENT MONITORING VIA IMAGE CAPTURE A system that can enable clinical trial compliance determination by viewing sequences of images captured during an event is disclosed. For example, the innovation can employ captured event sequences to enable a subject or third party to assess a subject's actions relate...

"Detection And Management Of Rogue Wireless Network Connections"

A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To gu...

"Efficient And Layered Synchronization Protocol For Database Systems"

An efficient and layered synchronization protocol for database systems is disclosed. A mechanism is provided for efficient synchronization of data between storage systems such as relational databases, object stores, etc. Synchronization capabilities may be defined and grouped into several levels that support specifi...

System Capability Discovery For Software Defined Radio

Capability checking to examine a computing device"s capabilities to determine if the device supports software defined radio to communicate according to a specific wireless protocol. Applicants have appreciated that as the reliance on software defined radio increases, numerous potential options may be available to a ...

"Supporting The Accurate Chrolological Organization Of Rfid Tag Data From Distributed Sources"

A computer-implemented method is disclosed for encouraging an accurate chronological organization of radio frequency identification (RFID) tag data gathered from distributed servers. The method includes limiting the processing of RFID tag 10 data based at least in part on the operational status of a plurality of s...

Operating Touch Screen Interfaces

Techniques and technologies are provided which can allow for touch input with a touch screen device. In response to an attempt to select a target displayed on a screen, a callout can be rendered in a non-occluded area of the screen. The callout includes a representation of the area of the screen that is occluded by ...

"Counterexample Driven Refinement For Abstract Interpretation"

A refinement system automatically identifies whether a detected error in a target system during abstract interpretation is a false error or a true error and adjusts the interpretation to prevent the false error. The target system is represented as a transition system with an initial state and state transitions and a...

"Initiating Contact Using Protected Contact Data In An Electronic Directory"

A client application allows a user of a telecommunication device to retrieve contact data of a particular individual from a server to initiate contact with the particular individual without viewing content designated as private by the particular individual. The retrieved contact data includes encrypted content and n...

Semi Transparent Highlighting Of Selected Objects In Electronic Documents

Highlighting selected objects in an electronic document is provided in a manner such that a highlighted object maintains coloring and formatting properties to allow for a maintenance of visual fidelity with a pre highlighted view of the highlighted object and that allows for a semi transparent background underneath ...

"Multi User Multi Input Desktop Workspaces And Application"

Multi-user multi-input desktop workspaces and applications are described. In one aspect, a single computing device presents multiple workspaces on a desktop area. The desktop area is designed for multiple users to provide in parallel inputs. Each workspace is configured for use by a particular set of users. Responsi...

Automatic Localization Of Devices

ABSTRACT AUTOMATIC LOCALIZATION OF DEVICES A device is described which changes its operation dependent upon the location of the device. The device accesses parameters which are specific to its location and uses these to determine how the operation of the device should be changed.

Dynamically Managing Execution Of A Setof Rules For A Code Analysis

Embodiments provided a formalized set of intermediate analysis contexts tiled are relevant for analysis checks of target code. Such intermediate analysis context may include, but are not limited to, the development phase of targeted code, the type or state of the targeted code, a source manipulating the targeted cod...

Bayesian Demosaicing Using A Two Color Image

ABSTRACT BAYESIAN DEMOSAIONG USING A TWO-COLOR IMAGE A Bayesian two-color image demosaicer and method for processing a digital color image to demosaic the image in such a way as to reduce image artifacts. The method and system are an improvement on and an enhancement to previous demosaicing techniques. A prelimina...

"Window Grouping"

A framework is provided for obtaining window information. The window information can be applied to different assignment models to assign windows to different groups. A group may correspond to a task being performed by a user. The window information can be semantic or temporal information captured as window even...

"Using External Memory Device To Improve System Performance"

The invention is directed towards a system and method that utilizes external memory devices to cache sectors from a rotating storage device (e.g., a hard drive) to improve system performance. When an external memory device (EMD) is plugged into the computing device or onto a network in which the computing device is ...

"System And Methods For Providing Network Quarantine Using Ipsec"

A system and method for ensuring lhat machines having invalid or corrupt states are restricted from accessing host resources are provided. A quarantine agent (QA) located on a client machine acquires statements of health from a plurality of quarantine policy clients. The QA packages the statements and provides the p...

"Direct Hinge For Optimizing Conversion"

An electronic device that has a body portion having an internal track, a display portion having a follower member that runs along the internal track and a support arm pivotally coupled to the body portion and to the display portion and enabling the display portion to move between multiple distinct positions relative...

"Coordinating Animations And Media In Computer Display Output"

Described is a method and system in which storyboard objects coordinate the animation of multiple elements and/or media displayed on a computer graphics display. Storyboards relate properties of elements in an element tree to a timeline, such that the properties associated with a storyboard are animated / play toget...

"Validating Inbound Messages"

A system and method for verifying messages. The method may include the steps of receiving an inbound message and characterizing the inbound message by analyzing a latent cryptographic identifier in the inbound message. The identifier is generated by a recognized message system, which may be the receiving system itse...

"Really Simple Syndication For Data"

Really Simple Syndication (RSS) is extended to syndicate structured data as well as general content via Really Simple Syndication for data (RSSd). RSSd provides a mechanism by which tables of data can easily be made available to users and across applications. RSSd provides the ability to syndicate data directly into...

"Portable Computing Environment"

The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. Th...

"Multiplexing And De Multiplexing Graphics Streams"

Described is the multiplexing and de-multiplexing of graphics streams, including by generating first higher-level graphics instructions from a first application program upon connecting to a client computer. A first identifier representing the first application program is associated with the first higher-level graphi...

"Managing Lists And Other Items In An Electronic File System"

An electronic file system organizational structure is provided mat allows for items to be organized in a directed acyclic graph (DAG). While items may be organized hierarchically as in a tree structure, items may also have multiple direct parents. The electronic file system may further have access to multiple differ...

"Method And System For Controlling Access To Presence Informationn On A Peer To Peer Basis"

A presence information system allows access to presence information of a publisher to be controlled and enforced by the publisher on a peer-to-peer basis, rather than by a presence server. A subscriber sends to the publisher on a peer-to-peer basis a request to subscribe to the presence information of the publisher....

"Location Aware Mobile Device Software Development"

A development environment makes it easier to develop and use location aware software applications. Combining the currently separate and complex tasks of location information gathering, analysis, and display and making them integrated such that non-experts can build location services into their applications increases...

"Privacy Markup On Entity Models"

A method of identifying an entry in an entity model as being at least one of potentially private and potentially sensitive is disclosed. The method may include creating an indication related to a specific entry that indicates whether the specific entry is one of potentially personally identifiable and potentially se...

"Computer File System"

A file system that does not conflate item lifetime with the item"s inclusion in an organizational structure of the file system is described herein. In addition, the file system"s organizational structure is not limited to directory trees, but instead may use any directed acyclic graph (DAG). Items, once stored into ...

"System And Method For A Distributed Server For Peet To Peer Networks"

A logical distributed server is generated for managing (Internet Protocol (IP) address allocation for an ad-hoc, self-forming peer-to-peer (P2P) network. The logical distributed server is generated according to messaging scheme where nodes on the P2P network allocate addresses for themselves and for clients connecte...

Device And Method For Controlling Adisplay Device

An apparatus and method is provided for controlling a display device for displaying a user interface associated with an application. A processor for controlling peripheral devices and/or the display may be selected based on characteristics of a requested function to be performed. For example, a processor may be sele...

Secure Serial Number

ABSTRACT SECURE SERIAL NUMBER A serial number for a software product is secured with an authenticator value. The authenticator value and the serial number are evaluated entirely by a remote authentication server such that no cryptographic authentication occurs on a local computer on which the software product is be...

Techniques For Customization Of Phonetic Schemes

ABSTRACT TECHNIQUES FOR CUSTOMIZATION OF PHONETIC SCHEMES Various technologies and techniques are disclosed for creating and using phonetic schemes. A phonetic scheme creation feature is provided to allow a user to create a phonetic scheme that has one or more available phonetic character combinations in a source ...

Protecting Operating System Resources

This document describes tools capable of enabling a protection agent to determine, from memory inaccessible from an operating-system privilege mode, whether one or more resources of an operating system have been modified. In some instances, these tools may enable the protection agent to reside within a virtual machi...

Virtual Location Markers For Mobile Mapping

ABSTRACT VIRTUAL LOCATION MARKERS FOR MOBILE MAPPING Described is a technology by which a virtual location marker (e.g., virtual pushpin or similar placeholder) is determined from the results of a query, in which the virtual location marker corresponds to a first coordinate set (e.g., a latitude, longitude and/or a...

Virtual Tuner Management

Embodiments of virtual tuner management are described. A viewing system, for instance, may include a plurality of client devices that are configured to render content, such as television programs. The viewing system may pool the resources available from the client devices such that each client device is not limited ...

"Operating System Performance"

Techniques for improving operating system performance are provided. A subsystem of an operating system operates as a kernel mode component, such as a kernel mode driver, instead of operating as a user mode component.

"Efficient Access To Variable Length Data On A Sequential Access Storage Medium"

The invention relates generally to sequential access storage media, and more particularly to accessing variable-length data segments on a sequential access storage medium.

Computer Based Gaming Groups

Groups are formed, in a computer-based (e.g., on-line) gaming environment, based on social relationships between players. The group is assigned an identity. The identity of the group is maintained within a single game title, across multiple sessions of a game title, and across multiple game titles. The group can int...

Tiered Achievement System

A game console has the capability to execute programming to unlock an achievement. After the achievements are unlocked, a data store accessible by the game console over a network stores the information in the profile of the user. The achievements associated with the user profiles can be retrieved from the store alon...

A System That Facilitates Displaying Objects

The present invention provides a unique method and user interface that facilitates accessing and browsing objects in which a user begins with a center object (e.g., one or a few focal objects) displayed on a screen and related objects are populated on the screen as well. The related objects can be further organized ...

"Enabling Inter Subsystem Resource Sharing"

Techniques for enabling inter-subsystem resource sharing are provided. A subsystem executing an application ("app subsystem") receives resources from another subsystem providing a resource ("resource subsystem"), such as a DLL. Then, when an application of the app subsystem is executed, the application may request a...

Improving Text Rendering Contrast

Various technologies and techniques are disclosed that improve text rendering contrast. The shape of one or more characters is converted from an original format, such as a vector format received from a font, to an overscaled bitmap format. The width of the shape of the character is adjusted based on a text contrast ...

"Method And System For Maintaining Namespace Consistency With A File System"

A computer-readable medium having computer-executable instructions, comprising receiving a request to access an object of a file system, determining that the object is within a namespace associated with a filter, and updating the namespace associated with the filter based on a change to the object ...

"Waking A Main Computer System To Pre Fetch Data For An Auxiliary Computing Device"

An auxiliary computing device wakes an associated main computer system to obtain data as needed, on-demand and/or in anticipation of demand. The wakeup operation is ordinarily temporary to fetch data, whereby only a small amount of power is consumed by the main computer system. In one implementation, a control chann...

"Reliable One Way Messaging Over Request Response Transport Protocols"

Example embodiments provide for a binding mechanism between RM protocols and request-response transport protocols (e.g., HTTP) in a one-way message exchange pattern. The present invention leverages existing network characteristics of request-response transport protocols without reconfiguration or deployment of new i...

"Endpoint Identification And Security"

A data structure with endpoint address and security information. The data structure includes an address field that includes one or more endpoint addresses for an entity. The data structure further includes a security field that includes one or more keys for facilitating secure communications with the entity. The dat...

"Providing Tokens To Access Federated Resources"

A system for authenticating computer users comprising, a single active directory disposed in a federated partner, a web server disposed in a DMZ associated with the intranet; and a client disposed in the federated partner coupled to the web server through an internet connection that is capable of signing on to the ...

"Verifying And Maintaining Connection Liveliness In A Reliable Messaging For Web Services Environment"

The present invention monitors the receipt of messages between two endpoints on established sequence session in accordance with a Reliable Messaging protocol for Web Services (RM-WS protocol). The messages received may be application or infrastructure messages (e.g., acknowledgement messages in accordance with the R...

Mixed Messaging Mode For Multiple Points Of Presence

A facility for providing an IM mixed mode operation by utilizing both page mode IM and session based IM jointly in the same IM conversation is provided. The facility initiates an IM conversation between an originating user registered at an originating device and a remote user registered at a plurality of devices ini...

"Information Management System With Time Zone Information Including Event Scheduling Processes"

Information management systems with time zone information, including event scheduling processes are disclosed. One aspect of the invention is directed toward a computer-implemented scheduling method that can include identifying a difference between a participant time zone and a user time zone, reviewing availability...

"Reversible Transform For Lossy And Lossless 2 D Data Compression"

A 2D transform and its inverse have an implementation as a sequence of lifting steps arranged for reduced computational complexity (i.e., reducing a number of non-trivial operations). This transform pair has energy compaction properties similar to the discrete cosine transform (DCT), and is also lossless and scale-f...

Systems And Methods For Co Axial Navigation Of A User Interface

Improved systems and methods for navigating media via a user interface, such as a user interface provided on a handheld or protable computing device, are provided. The methods for navigating media of the invention extend the navigation experience by allowing bi-axial context shifts, e.g. with respect to substantiall...

"Semantic Canvas"

A system for synchronizing a natural language input element and a graphical user interface has a synchronization engine. The synchronization engine is adapted to monitor user interactions with the natural language input element and the graphical user interface and to synchronize the natural language input element an...

"Restricting User Access To A Network Based Spreadsheet Document"

A system and method for restricting a client"s access to sensitive material in a network document. The system includes a document storage component for storing documents having an associated level of access. The system also includes a server component for receiving a document request from a user, associating the doc...

"Efficient Transfer Of Messages Using Reliable Messaging Protocols For Web Services"

The present invention provides for flow and congestion control mechanisms in accordance with a Reliable Message protocol for Web Services (RM-WS). For flow control, one endpoint informs another endpoint of its available buffer size by including buffer size information in response messages. The response messages, typ...

An Apparatus For Constructing Concept Netwoks And A Methof Therof

A concept network that can be generated in response to a user query. In one embodiment, the concept network is being used with a search tool. The search tool searches a plurality of data storage locations. Each data storage location is arranged with a node. Certain ones of the nodes are connected by at least one lin...

"Computer File System Allowing Ambiguous Names"

A file system that does not require unique item names, or any item name at all, is described herein. If an item has an ambiguous name, the file system performs a disambiguating procedure to provide the client (user or application) a conceptually unique name, including a fully qualified path. The file system provides...

"Flexibly Transferring Typed Application Data"

The present invention extends to using Simple Object Access Protocol ("SOAP") to exchange typed objects, such as, for example, parameters for invoking methods. A computer system accesses typed object parameters corresponding to a typed object. The typed object is annotated with one or one more message contract attri...

"Actionable Email Documents"

A received reply email document enables some action to be effectuated using data included in the email document responsive to field identifiers associated with the data and corresponding to fields of metadata The associated field identifiers that correspond to known fields of the metadata provide some expectation as...

"Integrated Client Help Viewer For Internet Based And Local Help Content"

An integrated help content viewer (user interface) is provided that gives a consistent user interface across multiple applications and that smoothly transitions between offline and online help content sources. A single client-side help content viewer is provided that is displayed over or adjacent to a given applicat...

"Computing Device For Publishing Collaboration Information To A Network"

A computer-implemented process takes content created collaborative from a workgroup environment and converts it into a scheduled web page that is publishable on the Internet. The computer-implemented process loosely relates the generated collaboration content and the published web page such that each may be independ...

"File Formats, Methods, And Computer Program Products For Representing Presentations"

File formats, methods, and computer program products arc provided for representing a presentation in a modular content framework. The modular content framework may include a file formal container associated with modular parts. A file format includes logically separate modular parts that are associated with each othe...

"Method And System For Linking Data Ranges Of A Computer Generated Document With Associated Extensible Markup Language Elements"

Methods and systems are provided for separating the data of a structured document from markup structure applied to the document and for linking the separately maintained data with associated markup structure applied to the document. The data stream in an Extensible Markup Language (XML) represented document is moved...

"Method And Computer Readable Medium For Loading The Contents Of A Data File"

A method and computer-readable medium are provided for loading the contents of an electronic data file. According to the method, corrupted portions of a data file are identified and an attempt is made to repair these portions. If the corrupted portions carmot be repaired, the loading of these portions is skipped. Th...

"File Formats, Methods, And Computer Program Products For Representing Workbooks"

File formats, methods, and computer program products are provided for representing a workbook in a modular content framework. The modular content framework may include a file format container associated with modular parts. A file format includes logically separate modular parts that are associated with each other by...

"System And Method For Automatically Completing Spreadsheet Formulas"

A system and method for automatically completing a formula of a spreadsheet application, calculator application, accounting application, business application or banking application. One aspect of the present invention is a computer-implemented method for automatically completing formulaic cell data. The computer-imp...

"Method And System For Tracking Changes In A Document"

A change list tracking mechanism supports features that require a record of values that have been modified in a document of a project management software application. Examples of the features supported include multiple undo, report generation, and audit logging. The change list tracking mechanism includes object con...

"Systems And Methods For Converting A Formatted Document To A Web Page"

Systems and methods for transforming a document to a web page can include a mapping module programmed to map document styles of a document to styles of a web page The system can also include a conversion module programmed to convert contents of the document into hypertext markup language based on the map of the mapp...

"Portable Applications"

A portable storage device includes an interface and one or more flash memories The one or more flash memories store one or more executable files that can be executed by a host computer to which the device is coupled without altenng any environment settings on the host computer even though the one or more executable ...

"Reversible Overlap Operator For Efficient Lossless Data Compression"

An efficient lapped transform is realized using pre- and post-filters (or reversible overlap operators) that are structured of unit determinant component matrices. The pre-and post-filters are realized as a succession of planar rotational transforms and unit determinant planar scaling transforms. The planar scaling ...

"System And Method For Processing Raw Image Files"

A system and related techniques provide a uniform abstraction layer for accessing and manipulating Raw image files, with the necessity for proprietary application tools. According to embodiments in one regard, an operating system or other platform may expose a set of application programming interfaces (APIs) to gene...

"Protection Agents And Privilege Modes"

[0089] This document describes tools capable of making a portion of operating-system memory associated with a protection agent unalterable or inaccessible from an operating-system privilege mode. In some embodiments, these tools are capable of creating a protection-agent privilege mode by requesting that a virtual m...

"Real Time Data Form Server"

Data is obtained from one or more data sources. The data sources may be real time data sources and non-real time data sources. Calculations may be performed on the data before delivering the data to one or more applications. A direct connection may be established between a first computing device and a second computi...

"Method And System For Exposing Nested Data In A Computer Generated Document In A Transparent Manner"

Methods and systems are provided for exposing nested data in computer-generated documents in a transparent manner. A mechanism is provided for a client application to query a server application for a list of available file formats after an object is requested from a server application document for embedding into a c...

"Method And System For Controlling Software To Facilitate Cross Version Collaboration Of Files"

Methods and systems are provided for controlling elements of computing systems including operating systems, software applications and different versions of software applications to better facilitate cross-application and cross-version collaboration of files. Elements within a computing system, for example, operating...

"A Method And Apparatus For Marketing Using Templates, Lists And Activities"

The method may include creating a marketing campaign, selecting a list to receive the marketing campaign, allowing the user to modify the list selected, allowing the user to add a work item to the marketing campaign and executing the marketing campaign.

"Software Tool With Modeling Of Asynchronous Program Flow"

A compiler that forms an intermediate representation of a program using a flow graph with less than all possible edges used to model asynchronous transfers within the program. The flow graph is formed in multiple phases. In one phase, the flow graph is formed without modeling asynchronous transfers. In later phases,...

"Method And System For Providing Notification When A User Becomes Available For Communicating"

A method and system for providing notifications of changes in the presence state of contacts is provided. A notification system allows a user to specify those contacts of interest for whom the user wants to be notified when the contact enters a certain presence state. When presence information is received about a co...

"Method For Pay As You Go Computer And Dynamic Differential Pricing"

A system for supplying computers with little or no upfront payment has a service provider, a computer, and an optional funding account. The computer is adapted to render itself substantially useless unless provisioned by the service provider. The service provider has a capability to collect funds from the user and t...

"Method And Computer Readable Medium For Generating A Multiple Column Layout"

A computer-implemented method and computer-readable medium are provided for generating a multiple column layout. According to the method, a layout is defined that includes two or more columns and one or more spans that extend across two or more of the columns. Each span is defined as being either content denned or h...

Laying Out A Paragraph Of Text

A method and computer-readable medium are provided for optimized paragraph layout. According to the method, a line-by-line paragraph layout is generated determine a maximum penalty for a paragraph. One or more layout nodes may be generated that include data representing a possible layout of the paragraph to a point ...

"Filter And Sort By Color"

The present invention comprises methods and user interfaces for organizing data displayed within a data application. Specifically, the present invention provides methods and systems for arranging the display of the data by a format applied to one or more portions of the data. The formats comprise different visual ch...

"Data Driven Media Guide"

An electronic program guide system receives data that identifies various types of available media content. A data-driven media guide is then generated to display visual representations of the available media content. The media guide is dynamically generated based on attributes associated with the various types of av...

"Context Free Document Portions With Alternate Formats"

Self-describing portions of text or data are provided for associating with or inserting in a computer-generated document. Portions of a document, such as individual paragraphs or groups of paragraphs or fragments of text, are provided self-describing properties, such as file format type associated with the portion, ...

"Computer Security Management, Such As In A Virtual Machine Or Hardened Operating System"

A security scheme provides security to one or more self-contained operating environment instances executing on a computer. The security scheme may include implementing a set of security applications that may be controlled by a supervisory process, or the like. Both the set of security applications and the supervisor...

"Supporting Multiple Operating Systems In Media Devices"

Techniques and tools for supporting multiple operating systems in consumer electronic devices. For example, techniques and tools are described that allow quickly switching between operating systems in video disc players that support different media types while reducing wait time and mitigating possible negative impa...

"Method Of Processing A Word Processor Document"

A word processor application is provided for creating word processor documents wherein the data and presentation can be separated. Data can be stored in a separate location from the presentation surface of the word processor document. Users of the word processor application can establish links (or bindings) between ...

"A System For Controlling Notifications To Users And Method Thereof"

The present invention relates to a system and method to facilitate providing computer users with efficient access to electronic notifications while minimizing disruption in the context of ongoing tasks. A notification system provides visual information heralds that provide summarizations of notifications to users. A...

Xna Relationship Management

A data provider application programming interface (API) is configured for use with a game content editing application. An asset relationship management file, which is generated with the data provider API, includes information such as relationship references and annotations and is updated by the data provider API whe...

"Method And System For Exchanging Data Between Computer Systems And Auxiliary Displays"

Described is a system and method by which application programs running on a main computer system communicate with an auxiliary display device (such as a cell phone, pocket-sized computer, alarm clock, television, digital picture frame and so forth) to provide viewable information on the device, remote control capabi...

Detection Of Lists In Vector Graphics Documents

Various technologies and techniques detect lists in vector graphics based documents and use them in meaningful ways. The system detects at least one list in a vector graphics based document using a set of rules. Pattern detection logic identifies characters symbols, numbers letters and/or images that may start a lis...

"Methods And Apparatus For The Evaluation Of Aspects Of A Web Page"

A Methods and apparatus are provided for evaluating the extent to which link text, representing a hypertext link on a web page, corresponds to a web page referenced by the link. In one embodiment, the link text may be compared to the title of a web page referenced by the link, such as by parsing the link text and pa...

"Methods And Systems For Preserving Unknown Markup In A Strongly Typed Environment"

Methods and systems for preserving unknown markup in a strongly typed environment are descnbed In but one embodiment, XML-based markup that may contain XML-based elements that are both known and unknown is received A strongly typed tree that is associated with the known XML-based elements is instantiated and a weakl...

"Using Structured Data For Online Research"

Various embodiments utilize structured data contained within a resource, such as a web page, to enable a user to define collections of data. Individual constituent parts of a collection or "links" are collected within a collection. In one or more embodiments, a full page viewing experience can be provided which enab...

"Wireless Usb Hardware Scheduling"

In wireless USB data transfers over UWB, software configures hardware thresholds to control data transfer in a manner that uses bandwidth for good connections over bad connections, given the high error rate experienced with wireless USB. Periodic transfers are first attempted before asynchronous transfers, as l...

"Adaptive Coefficient Scan Order"

A digital media codec adaptively re-arranges a coefficient scan order of transform coefficients in accordance with the local statistics of the digital media, so that the coefficients can be encoded more efficiently using entropy encoding. The adaptive scan ordering is applied causally at encoding and decoding to avo...

Disaggregated Secure Execution Environment

ABSTRACT DISAGGREGATED SECURE EXECUTION ENVIRONMENT An electronic device, such as, a computer may be adapted for self-monitoring for compliance to an operating policy. The operating policy may specify a pay-per-use or subscription business model and measurements associated with compliant usage. A secure execution...

Synchronization Of Data Between Devices

ABSTRACT SYNCHRONIZATION PEER PARTICIPANT MODEL Various technologies and techniques are disclosed that improve synchronization of data between varying types of devices and/or services. A participant receives a request from another participant to perform a synchronization operation. The synchronization engine dete...

Automatically Determining File Replication Mechanisms

A backup administrator can backup files from a production server on any of a plurality of different bases. In particular, some files can be replicated on a changed-byte basis. In other cases, files can be backed up by replicating updated copies of the entire file, or even byte blocks of the file . Determinations as ...

"System To Facilitate Data Access"

A system and methodology that provide schema inferencing at runtime. An inference component receives as an input an input data stream, and processes the input data stream at runtime to develop a schema based on actual values thereof. The inferred schema is then used to create an inferred output data that is a specia...

"Method And Apparatus For Metadata Driven Business Logic Processing"

A metadata driven system for supporting business application software required in the middle tier for a line of business applications includes a process metadata module adapted to store a process in metadata format, wherein the process object contains logic related to an entity of the application software. The syste...

I/O Based Enforcement Of Multi Level Computer Operating Modes

ABSTRACT I/O-BASED ENFORCEMENT OF MULTI-LEVEL COMPUTER OPERATING MODES A computer is architected so that a monitoring and enforcement of an operating policy is carried out at an interface circuit that transmits data between a processor and one or more function blocks. The function blocks may include system memory...

"Minimizing Dead Zones In Panoramic Images"

Techniques to minimize problems with dead zones associated with panoramic cameras are described. A dead zone is an area about a zero degree boundary where a three hundred and sixty degree panoramic image is split so that a two-dimensional panorama can be rendered. Redirection of the zero degree boundary to a pos...

"Systems And Methods For Providing A User Interface With An Automatic Search Menu"

Systems and methods are provided for a user interface with an automatic search menu. The interface exposes commands to the user as instantly searchable hierarchy. Visually, this is represented as a tree view with an edit box above it. There is no "Search" or "Go" button to press. One second after any character is en...

System And Method For Transferring Web Page Data

A system and method are disclosed which may include accessing an Internet site by a proxy server; converting image data from the Internet site into a multiresolution representation; and transmitting the image data in said multiresolution representation to a client device.

"Managing Display Of User Interfaces"

Managing a display of a user interface, in one implementation, a first user interface and an option to change the first user interface to a second user interface may be displayed. A selection of the option to change the first user interface to the second user interface may be received. In response, the second user i...

Graphical User Interface Management

A graphical user interface (GUI) is presented on a display including a parent window and a number of child windows rendered within the parent window according to a display scheme. When the size of one of the child windows is changed, the size of one or more of the other child windows is changed, so that the display ...

Secure Boot

Systems and methods for performing integrity verifications for computer programs to run on computing systems are provided. An integrity check is completed before passing execution control to the next level of an operating system or before allowing a program to run. The integrity check involves the use of a locally s...

Method And System For Verifying Trust Of A File

Systems and methods for validating integrity of an executable file are described. In one aspect, the systems and methods determine that an executable file is being introduced into a path of execution. The executable file is then automatically evaluated in view of multiple mal ware checks to detect if the executable ...

"Techniques For Reducing Accidental Touch Sensitive Device Activation"

Aspects of the present invention reduce the number of false positive touch inputs made by a non-stylus object such as the user"s finger or hand. When the stylus is located proximate to the touch-sensitive surface, the sensitivity of the surface to non-stylus input is disabled, reduced, or otherwise modified. For exa...

System And Method For Producing And Communicating Requested Data Among Networked Application Program

Delivering document fragments iron) a web server to a server-deployed client application. The invention includes a data structure of a request for data including a namespace field, an event handler field, and a parameter field. A first process sends a populated data structure to a second process. The second process ...

"Managing Web Page Links Using Structured Data"

In accordance with certain embodiments, requests to collect structured data in a web page and to subscribe to that structured data are received. This structured data is stored in a data store to allow offline use of the structured data. In accordance with other embodiments, a computing device displays multiple links...

"Searching Electronic Program Guide Data"

Searching electronic program guide (EPG) data is described. The EPG data may be compartmentalized into channel metadata that describes characteristics of one or more channels and content metadata that describes characteristics of one or more content items. In a implementation, a method includes searching channel met...

"Secure Safe Sender List"

Secure safe sender lists are described. In an implementation, a method includes determining which of a plurality of hierarchical levels corresponds to a message received via a network. Each of the hierarchical level is defined by mechanisms for identifying a sender of the message. The message is routed according to ...

Unifying Discoverability Of A Website's Services

Various embodiments provide a unified discovery control that can be incorporated as part of a web browser. The unified discovery control provides a central location that describes various services that a website has to offer. In addition, the unified discovery control can allow the user to interact with the individu...

"Data Access Layer Class Generator"

Systems and methods that that automatically generate a data access layer lor a middle tier of a relational data store with stored procedures, via a data access layer generator. The data access layer generator can employ an extensible mark up language extension (XML) to determine the stored procedures that are typica...

"Usb Devices In Application Server Environments"

One or more universal serial bus (USB) devices are connected at a client computer. Tlae USB devices are recognized by the client computer and a determination is made as to whether an application server computer provides functionality for one or more of the USB devices. A specific communication path is provided from ...

New Object Search Ui And Dragging Object Results

A unique object navigation system, user interface, and method that facilitate faster and smoother navigation of objects are provided. For example, the system can generate a plurality of objects that can be rendered on a display space that spans a single page in length, thereby mitigating the need to navigate through...

Scalable File Replication And Web Based Access

Scalable File Replication and Web-based Access Various embodiments introduce the notion of a replication entity which implements a highly scalable file replication system. In one embodiment, the replication entity resides in the form of a scalable replication service. In at least some embodiments, the replication s...

Applying Effects To A Merged Text Path

ABSTRACT APPLYING EFFECTS TO A MERGED TEXT PATH Effects are applied to a shape that is generated from a merged text path. The merged text path is created from text paths that are associated with a text run. Boolean operations may be used to create the merged text path The merged text path removes any overlap and re...

"Secure Tunnel Over Https Connection"

SECURE TUNNEL OVER HTTPS CONNECTION ABSTRACT OF THE DISCLOSURE Many secure tunnels require protocols that require special handling, authorization or security certificates, such as L2TP and PPTP. This often eliminates them for use between a corporate or agency network and outside, public networks. A secure socket t...

System For Financial Documentation Conversion

A method to prepare an Extensible Business Reporting Language (XBRL) document in a web-hosted server includes authenticating a user, uploading financial information from a spreadsheet, storing the information, and processing the data into n XBRL compliant document for transmittal to a financial regulatory agency. Th...

Secure Transactional Communications

Systems for providing disposable email addresses are disclosed herein. A user may set up a disposable email address for receiving emails from a trusted, Internet-based enterprise. The user may set up a dedicated mailbox folder associated with the disposable email address or enterprise. The email server may automatic...

Array Based Discovery Of Media Items

A media discovery module (MDM) (1002) is described that facilitates a user's access to desired media items. The MDM (1002) presents a series of arrays of media items to the user. The user's selection within any array governs the composition of media items that are presented in a subsequent array. Different linking c...

Method For Expiring Published Presence Information From A Presence Server

A method and system for increasing the computational and network efficiency of presence servers having collections of publications is provided. The presence system uses several techniques that enable a presence server to provide rich presence information without requiring expensive processing. First, the presence sy...

Advertising Funded Data Access Services

Techniques for using advertising to fund the use of client-side or network-side data access services by a user of a personal electronic device are discussed. Digital advertising content is associated with data items accessible via a particular data access service at a variety of processing locations, using a variety...

Modifying Access To Presence Information

A method and system for increasing the computational and network efficiency of presence servers having collections of publications is provided. The presence system uses several techniques that enable a presence server to provide rich presence information without requiring expensive processing. First, the presence sy...

Interactive Relational Graphic Solutions

Interactive relational graphic solutions facilitate an economical teaching tool to explain a plethora of educational topics. The solutions are associated with a graphics capable application of a computing device. The solutions facilitate user interaction by graphically correlating functions through a series of inter...

Model Based Access Control

Access control as it relates to policies or permissions is provided based on a created model. A security policy is abstracted and can be independent of a mechanism used to protect resources. An abstract model of a potential user, user role and/or resource is created without associating a specific individual and/or r...

"Property Metadata Navigation And Assignment"

A property tree user interface permits user assignment of values to metadata properties and user navigation of data, within a system that includes a data storage subsystem in which data items are organized and queried by way of properties. The property tree (203) includes nodes that expose properties of data items. ...

"Distributed Routing Table Architecture And Design"

A Distributed Routing Table (DRT) mesh can comprise two or more nodes, each of which maintains its own routing table that represents some or all of the overall routing knowledge of the DRT mesh. Each node can be comprised of modular components that can perform various defined functions such that the features and abi...

"Composite Solid State Drive Identification And Optimization Technologies"

Technologies for an operating system identifying SSD and CSSD devices based on a corresponding descriptor, and for optimizing operating system functionalities with respect to the SSD/CSSD device. Optimizations include disabling non-SSD/CSSD functionalities, such as HDD defragmentation, and by enabling SSD/CSSD speci...

"Retention Of Information About Digital Media Rights In Transformed Digital Media Content"

Described herein are one or more implementations for transforming (e.g., transcoding) DRM-protected digital media content while retaining associated DRM-information (e.g., a user license its related information).

"Prepaid Computing Access Using Portable Storage Devices"

A form of removable memory, such as a universal serial bus (USB) flash device (UFD), may allow secure storage of and access to a time balance of a pay-per-use or subscription computing system. A computing device may establish a secure connection to a portable secure computing device to access a stored time balance o...

"Emulation Of Room Lock And Lobby Feature In Distributed Conferencing System'

Architecture for a session lock and lobby feature in a distributed conferencing framework for a conferencing session. Under a lock scenario, once a user enters the session, the session can be locked to prevent other individuals from entering, even if the individuals were invited to the session. Locking can be accomp...

"Extensible And Programmable Multi Tenant Service Architecture"

An extensible, multi-tenant software-as-a-service business application platform is provided for hosting multiple organizations. Organization services are provided by virtual or physical servers with dedicated data stores assembled in scalable groups. Distributed interaction between components of the scalable groups ...

Abstract Execution Model For A Continuation Based Meta Runtime

Providing a workflow engine for virtualizing a managed execution environment. The workflow engine executes a workflow based on an automaton and methods associated therewith. The workflow engine captures continuations associated with the executing workflow to enable modeling of real-world processes. ...

Unified Searching And Running Of Files

A unified user interface is described that allows a user to search, browse, and launch items from the same user interface. For example, a single text input box may be provided that allows the user to perform all these functions by typing in a portion of an item name or an entire item name. The various functions may ...

Framework For Modeling Continuations In Workflows

Enabling creation of control flow patterns in a workflow via continuations. Each continuation represents an activity execution context for an activity executing in the workflow by a workflow engine virtualizing a managed execution environment. Responsive to a request, the activity execution context is recreated via ...

"Method Of Deriving Web Service Interfaces From Form And Table Metadata"

A system and method of deriving web service interfaces from form and table metadata is disclosed. The method uses a discovery subsystem to discover services that are available on an application server, retrieves the metadata descriptions of the services on the application server and uses the services discovered and ...

Framework For Modeling Cancellation For Process Centric Programs

Declaratively canceling execution of an activity. A state automaton for an activity is defined, and the state automaton includes an executing state, a canceling state and a closed state and classifies an execution lifetime of the activity. The activity includes work items and organizes the work items in an executio...

"Integration Of Three Dimensional Scene Hierarchy Into Two Dimentional Compositioning System"

A hierarchy of (2D) visual objects and (3D) scene objects are integrated for seamless processing to render (2D) images including a (2D) view of a (3D) scene on a (2D) computer display. The processing of the (3D) model objects and (2D) visual objects in the visual hierarchy is integrated so that the processing is rea...

Asynchronous Fault Handling In Process Centric Programs

Asynchronous fault handling for a workflow A state automaton for an activity in the workflow is defined. The state automaton includes at least an executing state, a faulting state, and a closed state and classifies an execution lifetime of the activity. The activity is defined to include work items and includes an ...

Refined Search User Interface

ABSTRACT REFINED SEARCH USER INTERFACE A refined search user interface is described. In an implementation, items that are available via a particular service and a list of other services that are also available are displayed in a user interface. The display of items is refined for each character entered via a search...

Managing Presence Information Using A Single Request

A method and system for increasing the computational and network efficiency of presence servers having collections of publications is provided. The presence system uses several techniques that enable a presence server to provide rich presence information without requiring expensive processing. First, the presence sy...

Searching Within A Site Of A Search Result

Searching within a site of a search result is enabled with a user interface, a method etc. that presents a search within a site tool indicator in association with at least one search result of multiple displayed search results. The at least one search result corresponds to a given page of a particular site. The sear...

Estimation Of Initial Dynamic Rendering Control Data

ABSTRACT ESTIMATION OF INITIAL DYNAMIC RENDERING CONTROL DATA Facilitation of web page rendering using dynamic rendering controls. A server identifies a representation of a page to be downloaded to a client. The representation includes a dynamic rendering control that may be used to render a portion of the page Rat...

Declarations For Transformations Within Service Sequences

A declarative model for specifying appropriate transformations that may occur at the input and output of each service of a sequence of services that accomplish a more complex task. Each of the services may have access to the appropriate transformation declarations, and may interpret the declarations to thereby be ap...

Transit Coordinated Local Search

ABSTRACT TRANSIT-COORDINATED LOCAL SEARCH Various embodiments can provide helpful information to a user who is looking for a particular point of interest. In at least some embodiments, first and second searches are conducted The first search uses a local search provider and produces results which describe one or m...

Adaptive Power Management

Embodiments of the present invention are directed at minimizing power consumption of a computer while permitting the execution of meaningful tasks by programs installed on the computer. In accordance with one embodiment, a method that implements power conserving measures based on the amount of capacity that is avail...

"Managing Object Lifetime For Native/Managed Peers"

A system that manages lifetime of an object is provided. The system analyzes references on multiple objects to determine reach ability of a native peer and dynamically transitions between native and managed object lifetime management systems based on the analysis. When a native peer is not reachable by a native appl...

Efficient Database Lookup Operations

A system, apparatus, method, and computer-readable media are provided for efficient database lookup operations. According to method, procedural checks for generating a response to a database query are converted into a set of database operations. The database operations are performed the first time a query of the dat...

Mining Data For Services

Generally described, the present invention provides the ability to process digital voice conversations to identify data packets containing content of interest and to further process the identified data packets. More specifically, mining profiles may be developed identifying particular types of content that is to be ...

Voip Client Information

A method and system for collecting and providing required information to a VoIP client or other service providers is provided. The inquiry for information will be received and processed to identify appropriate contextual information which will be transmitted to the information inquiring party. For example, an inquir...

Tracking And Editing A Resource In A Real Time Collaborative Session

A method and system for tracking and editing a resource in a real-time collaborative session is provided. A collaboration system provides real-time collaborative sessions between participants. When a participant in a collaboration session uploads a non-editable copy of a resource for viewing in the collaborative ses...

Hybrid Unicast And Multicast Data Delivery

Hybrid unicast and multicast data delivery involves delivering data to client devices partially using a unicast communication and partially using a multicast communication. For example, higher-relevancy television metadata may be extracted from television metadata. A server transmits the higher-relevancy television ...

"Hints Model For Optimization Of Storage Devices Connected To Host And Write Optimization Schema For Storage Devices"

Architecture for data communications optimization based on generating and communicating "intents" or "hints" to a storage device and faster/slower solid state memory optimization. Data destined for storage on the storage device (capable of hints processing) can be bracketed to take advantage of improved performance ...

User Interface For Inputting Two Dimensional Structures For Recognition

In embodiments consistent with the subject matter of this disclosure, a user may input one or more strokes as digital ink to a processing device. The processing device may produce and present a recognition result, which may include a misrecognized portion. A user may indicate a desire to correct the misrecognized po...

"Fully Redundant Call Recording"

A system provides redundant telephone call processing. A gateway receives a call and identifies a first server as having primary responsibility for servicing the call and a second server as having secondary responsibility for servicing the call. The gateway communicates the call to both the first server and the seco...

Remove On Delete Technologies For Solid State Drive Optimization

Technologies for identifying data stored on a solid state drive ("SSD") device that correspond to data associated with a delete event, and marking the deleted data stored on the SSD as invalid such that the SSD can avoid unnecessary operations on the invalid data. Included are interfaces operable to communicate inva...

"Pre Authenticated Calling For Voice Applications"

Architecture for providing pre-authenticated information from an endpoint for subsequently authenticating a device and/or user associated with the previously-authenticated information. A pre-authentication module of the architecture can be a trust component as part of an application that facilitates the utilization ...

"Hard Drive Authentication"

A game console determines if hard disk drive is authorized for use with the game console by analyzing an encrypted certificate. The encrypted certificate is stored in memory of the drive. Upon detection of the drive, the game console receives encrypted certificate and decrypts it. The certificate contains parameters...

Systems And Methods Automatically Updating Contact Information

The subject invention provides a system and/or a method that facilitates automatically updating contact information. An interface can receive identification data related to a first mobile communication device, wherein a contact update component can provide contact information to a second mobile communication devic...

"Credential Interface"

Systems and/or methods are described that enable a credential interface. These systems and/or methods may build a credential user interface enabling a user to choose between multiple credentials and submit an authenticator for a chosen credential. These systems and/or methods may also gather information about arbitr...

Distributed Search In A Casual Network Of Servers

Distributed searches in a casual server network may be provided. First it may be determined, at an originating server, that a first request cannot be fulfilled by information associated with the originating server. Then, from the originating server, the first request may be posted to a distributed request ring. Next...

Automated Attendant Grammar Tuning

A system provides automated attendant call processing. A database comprises words that are anticipated to be received in a voice input. Stored in relation to the words are actions to be taken upon receipt of a call comprising to particular words. A server receives a call, and after playing a prompt, receives a voice...

Simultaneous Wireless Support In Software Defined Radio

A system and method for providing the ability to discover the capabilities of a user"s computer to determine whether it is capable of supporting more than one wireless protocol simultaneously is provided. A computing device"s capabilities (including, for example, hardware and/or software capabilities) is checked to ...

Spectrum Auction And Sharing On Wireless Clients

Methods and apparatus to enable spectrum auctioning, allowing a user to gain access to otherwise unavailable spectrum is disclosed. Spectrum providers may have the exclusive rights to the spectrum, but these providers can allow other users to access the spectrum in certain situations, for example, limited time use w...

Ofdm Transmission And Reception For Non Ofdm Signals

Methods and apparatuses for Orthogonal Frequency-Division Multiplexing (OFDM) communication of non-OFDM radio signals are disclosed. The non-OFDM radio signals are force-modulated into OFDM signals. In one example, a non-OFDM signal is received and is processed into an OFDM signal to produce a created OFDM signal. A...

Channel Control Based On Error Correction Values

A computing device configured for wireless communication may effectively control adaptation to channel conditions. The device may be configured to identify and classify conditions impacting performance of a channel so that appropriate adaptations may be made. Interference may be detected by correlating received sign...

"Virtual Points Clearinghouse"

Systems and methods establish a virtual points clearinghouse. The clearinghouse redeems heterogeneous digital micro-payments—such as bonus points received from various points issuers—across diverse service providers. Points meant for exclusive redemption at one service provider may be directly redeemed for non-corre...

"Binding Content Licenses To Portable Storage Devices"

Systems, methods, and/or techniques ("tools") for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices ("stores"), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, ...

Mesh Managing Data Across A Distributed Set Of Devices

Data files, applications and/or corresponding user interfaces may be accessed at a device that collaborates in a mesh. The mesh may include any number or type of devices that collaborate in a network. Data, applications and/or corresponding user interfaces may be stored within a core object that may be shared over t...

"Providing Metadata Corresponding To Data"

An apparatus and method provide a companion application via a companion application corresponding to a host window provided by a host application, the companion window providing information or metadata descriptive of data in the host window. The host application and companion applications may be separate application...

"Photo Generated 3 D Navigable Storefront"

Presented are techniques for creating a photo-generated navigable storefront. Such techniques include receiving a images and processing the images through an image matching algorithm. Such images may include, for example, photos taken with a camera. Additionally, the images are tagged with identifier tags in order t...

"Efficiently Locating Transactional Code Blocks In A Transactional Memory System"

Various technologies and techniques are disclosed for creating and/or locating transactional code blocks in a transactional memory system. A user such as a software developer can decorate a particular function with an identifier to indicate that the particular function is transaction-safe. A normal version and a tra...

Method For Optimizing Near Field Links

In a Near Field Communications (NFC) link, the data link turn-around time is adjusted to optimize battery use while maximizing the data throughput. A receiving device immediately transmits any pending high priority control or data messages in its own queue in response to a message from the sending device, subject to...

"Data Visualization"

Data visualization may be provided. First, a data cell may be displayed. Then a request may be received to expand the data cell into a plurality of sub-cells. A sum of the data corresponding to the plurality of sub-cells may equal a value corresponding to the data cell. Next, a number of sub-cells in the plurality o...

Normalized Images For Cameras

A method and system for producing normalized images of conference participants so that the participants appear to be approximately the same size when the images are displayed is provided. The normalizing system normalizes the size of images based on constraints relating to the distance of participants from the locat...

Integrated Native Language Browsing Experience

A method and apparatus provide for performing language translation by obtaining a selection of a language preference for presentation of text and/or speech on an electronic device. When data is received that includes content in a language other than the preferred language, a decision whether translation is required ...

Processing Raw And Pre Processed Digital Images

unified method for processing Raw and pre-processed digital images (fig. 3 elements 310 and 312) is provided. The method may include receiving digital image data and determining if the data is Raw or pre-processed (fig. 3 element 312). If the digital image data is Raw, the method may further include receiving modifi...

Parallelizing Sequential Frameworks Using Transactions

Various technologies and techniques are disclosed for transforming a sequential loop into a parallel loop for use with a transactional memory system. Open ended and/or closed ended sequential loops can be transformed to parallel loops. For example, a section of code containing an original sequential loop is analyzed...

Network Interface Selection Using Historical Connection Information

A computer may be capable of communicating with devices via network through multiple interfaces. When a new connection is to be established, the computer may select an interface to use for the connection. In some embodiments, the interface may be selected based on historical connection information representing the p...

"Automatic Image Capture For Generating Content"

The presenl invention is directed to a system (200) for automatically capturing images based on the actions of an author (201) in completing steps in an overall task performed on a user interface (205). To capture the images the author (201) activates a recording component (207). The recording component (207) record...

Display Of Search Engine Results And List

Displaying a list of search-engine results in the same web-browser window as a viewing frame that is configured to display one of the results is described herein. A user"s web search is performed on a search engine, and results are returned to a client computing device. The results are listed in a web-browser window...

Input Device Including A Scroll Wheel Assembly

An input device including a scroll wheel assembly for moving an image in multiple directions on a display screen. The scroll wheel assembly may include a finger-engagable control member that may be endlessly rotated about a rotation axis and a tilt sensor containing a tilt contact member coplanar with the finger-eng...

Data Centric Workflow

Providing data bound workflow activities to model messaging between a workflow instance and a workflow host. The workflow author associates a data source with each data bound activity in a workflow without specifying details of the underlying messaging technology. The data bound activity in the workflow instance com...

Setting Up On Line Game Sessions Out Of A Game Context

service that provides for setting up game sessions for a plurality of game players. A number of game players that each have a computing device capable of playing a computer game are linked together by the service. The service allows a player to set up a common game session so that a subset of the players can simult...

Reducing Unsolicited Instant Messages By Tracking Communication Threads

Processes and techniques for reducing spam over instant messaging (SPIM) are described. In one implementation, the number of open instant messaging threads ("chat threads") that a specific user can have at a given time is limited to prevent a potential spimmer from flooding instant messaging users with SPIM. Another...

Presentation Of Information Relating To Programming

A system that includes a content distribution facility coupled to at least one client device for presenting programming via a presentation device having a screen. The system displays on the screen first content having an associated characteristic. In response to an event other than user selection of a program, the s...

"Securing Software"

Tampering with pieces of software is inhibited. The obfuscation oi image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires p...

"Method And System For Ranking Words And Concepts In A Text Using Graph Based Ranking"

A method of identifying a characteristic of interest represented by a textual input, comprising: Building a graph corresponding to the textual input; Scoring sub-graph components of the graph; The scores; and Performing text manipulation based on the identified graph fragments.

Anisometric Texture Synthesis

An anisometric texture synthesis system and method for generating anisometric textures having a similar visual appearance as a given exemplar, but with varying orientation and scale. This variation is achieved by modifying the upsampling and correction processes of the texture synthesis technique using a Jacobian fi...

"Comparing And Contrasting Models Of Business"

The present invention extends to comparing and contrasting models of business. Model processing modules implement formal operators that can be used to manipulate models of business. A compare operator can be used to compare similarly typed models of business. A contrast operator can be used to contrast differ types ...

"Design Time Validation Of Systems"

In accordance with certain aspects of the design time validation of systems, a description of a system being designed and a description of an environment are received. Both of the received descriptions are used to validate the system against the environment while the system is being designed and prior to attempting ...

Recent Contacts And Items

The present invention provides method and system of displaying items that gives the user the ability to easily access recently accessed items.  The recent items list includes both incoming and outgoing correspondences that are attempted to be matched to the corresponding contact stored in the device. The user can ac...

Systems And Methods For Interacting With A User Interface Of A Media Player

Systems and methods for interfacing with plyback of media by a media player are provided. By combining the functionality of fast forward and skip forward into a single button control, the invention reduces the numbers of control buttons that need be included on a device, reducing device costs and consumer "button ov...

"Authenticated Exchange Of Public Information Using Electronic Mail"

Methods and systems are provided for using an existing email transfer protocol, such as SMTP, to exchange digital objects in an authenticated manner. The provided methods and systems solve the bootstrapping problem of computer identities for P2P communication by authenticating the exchange of public information. If ...

Defining User Input Fields On A Portable Media Device

ABSTRACT DEFINING USER INPUT FIELDS ON A PORTABLE MEDIA DEVICE A user may always know that on a portable media device, by pressing an input field in particular location, such as the input field to the right of the center point of a plurality of input fields, the same function may occur no matter what the orientatio...

Versioning Support In Object Oriented Programming Languages And Tools

In a computerized system that includes one or more program components including one or more requesting components that can request to access one or more target components, a method of providing a requesting component with access to an appropriate version of a target component, comprising the act of: receiving a req...

Strokes Localization By M Array Decoding And Fast Image Matching

A method for determining a path of a pen tip within a document, the method comprising: (A) decoding extracted bits associated with a captured image to determine location coordinates of the captured image; (B) in response to (A), if the location coordinates of the captured image cannot be determined by decoding, ma...

"Intelligent Autofill"

An autofill system comprising a trained machine learning component that uses one or more sets of inputs to facilitate autofilling of web-based forms, and an autofill component that selectively enters appropriate data into one or more form fields based at least in part upon information generated by the machine lear...

"Task Oriented User Interface Model For Document Centric Software Applications"

The subject invention relates to systems and methods that utilize a task oriented user interface with a document centric software application. The task oriented user interface aims to be more discoverable than conventional interfaces and better at performing unknown tasks without sacrificing the efficiency of perfor...

"Scenario Synchronism Between A Primary Display And A Secondary Display Of An Electronic Device"

A method and system for scenario synchronizing in a communication device allows a user to complete a task initiated or prompted from a secondary display on a primary display. The secondary display provides quick access to useful information such as time, date, battery life, signal strength, new messages and calendar...

"Dynamic Configuration Of Unified Messaging State Changes"

The subject invention relates to systems and methods that enable dynamic programming and execution of an electronic communications dialog. In one aspect, a configurable messaging system is provided. The system includes a configuration file to describe interface options of a computerized dialog session, wherein the c...

"Automatic Layout Of Items Along An Embedded One Manifold Path"

The coordinates for laying out visual items in two, three-, or dimensional space along an embedded one-manifold or path are calculated and coordinates are generated for placement of the items in a container. A one-manifold may be continuous, discontinuous, be contained entirely within a container or extent bey...

Data Compression

Compression of streaming data is described. In an implementation, a method includes compressing data for communication in a terminal services environment by finding an index in a lookup table that matches an initial sequence in data. The lookup table includes a plurality of entries. Each of the entries is discoverab...

"Platform For Data Servies Across Disparate Application Frameworks"

Data management between a common data store and multiple applications of multiple disparate application frameworks. A data storage component is provided that facilitates the storage of data, which data includes structured, semi-structured, and unstructured data. A common data platform interfaces to the data storage ...

"System And Methods For Capturing Structure Of Data Models Using Entity Patterns"

A system and method directed to capturing the structure of data models using entity patterns is provided wherein an entity pattern is an abstraction, for example in the MICROSOFT BUSINESS FRAMEWORK® (MBF), that surfaces in the model editor of the framework at the root level and consists of one or more entity roles t...

Scenario Synchronism Between A Primary Display And A Secondary Display Of An Electronic Device

A method and system for scenario synchronizing in a communication device allows a user to complete a task initiated or prompted from a secondary display on a primary display. The secondary display provides quick access to useful information such as time, date, battery life, signal strength, new messages and calendar...

"Robust Interactive Color Editing"

A method of converting between color spaces where color components are cached when they are well-defined after color space conversion. When the components become undefined after conversion, the cached values are used instead of using an arbitrary default value. The resulting color editing system is "robust" in that ...

"An Accessibility System For Providing User Interface Information To A Client"

An accessibility system for providing user interface information to a client, the accessibility system comprising, a client which requests user interface information; a server which provides user interface information to the client, characterized by a client side interface comprising a logical tree for revealing use...

"Generic Collection And Delivery Of Telemetry Data"

The present invention extends to generic collection and delivery of telemetry data. A telemetry component receives telemetry data, through a common telemetry interface that is accessible to a plurality of applications, from an application. The received telemetry data is aggregated with any existing telemetry ...

Digital Data Management Using Shared Memory Pool

Memory management techniques involve establishing a memory pool having an amount of sharable memory, and dynamically allocating the sharable memory to concurrently manage multiple sets of sequenced units of digital data. In an exemplary scenario, the sets of sequenced units of digital data are sets of time-ordered m...

Extraction, Transformation And Loading Designer Module Of A Computerzed Financial System

An extraction, transformation and loading (ETL) designer mobile of a computerized financial system that is used to configure an ETL package for loading data elements from a financial table of a financial database into a reporter table in accordance with a predefined format. The ETL designer mobile includes a transfo...

Shema Based Machine Generated Programming Models"

A programming model that takes general purpose APIs and machine-generates new programming models based on user defined schemas that provide the developer with data and view separation, and a way to communicate to the host application using the domain of the problem being solved. The system comprises a schema compone...

Language Model Adaptation Using Semantic Supervision

A method and apparatus are provided for adapting a language model. The method and apparatus provide supervised class-based adaptation of the language model utilizing in-domain semantic information.

Methods And Systems For Providing Automated Actions On Recognized Text Strings In A Computer Generated Document

Methods and systems provide for automatically performing actions on or in association with text or data strings that are recognized as belonging to certain semantic categories. Text entered by a user is passed to a recognizer application. If a given text or data string is recognized as belonging to a given semantic ...

"Method And System For Aggregating Contact Information From Multiple Contact Sources"

A method and system for aggregating contact information of contacts from multiple contact sources is provided. The aggregation system collects contact information for a user from various contact sources. The aggregation system stores the collected content information in a contact data store. The aggregation system m...

Security Associations For Devices

Generating symmetric keys among distributed appliances, includes generating public and private values one at least one appliance, importing a public value from another appliance via an out-of-band entity, and generating a secret value as a function of the private value corresponding to the total appliance and the pu...

"An Apparatus For Classifying A Group Of Data Objects In A Data Processing System"

NA

Method For Duplicate Detection And Suppression.

A method detects similar objects in a collection of such objects by modification of a previous method in such a way that pre-object memory requirements are reduced while false detections are avoided approximately as well as in the previous method. The modification includes (i) combining k samples of features into s ...

Infrequent Word Index For Document Indexes

A document indexing system utilizes two index, an infrequent word index is maintained separately from a frequent word index word to map the location of words that occur infrequently in the indexed documents. The infrequent word index may be stored and partitioned differently than the frequent word index to promote e...

"Dv Metadata Extraction"

A DV video input source (104) can be any type of device or communication network capable of transferring DV video content to computer (102), including for example, portable storage media (104) (1) (e.g., magnetic discs, media card, optical discs), a DV video recording device (104) (2) (e.g., a digital camcorder), or...

"Ghosted Synchronization"

A system and method for synchronizing a database having metadata and raw data. Metadata may be fully synchronized between two systems, with copies stored on both systems. Raw data may be selectively synchronized, so that a client system need not store all of the raw data locally. When disconnected, the client system...

Routing In Peer To Peer Networks

A method comprising; receiving at one of a plurality of nodes in a peer-to peer network, an indication of a change in membership by another said node in the peer-to-peer network; and broadcasting a report; that describes the change; and for receipt by each said node referenced in a routing table included in th...

Distributable, Scalable, Pluggable Conferencing Architecture

ABSTRACT DEFINING USER INPUT FIELDS ON A PORTABLE MEDIA DEVICE A user may always know that on a portable media device, by pressing an input field in particular location, such as the input field to the right of the center point of a plurality of input fields, the same function may occur no matter what the orientat...

Method And Systemfor Protecting Media Content

ABSTRACT IS NOT FILED.

Selective Multi Level Expansion Of Data Base Via Pivot Point Data.

Systems and methodologies are provided for data visualization, retrieval and management of a logically ordered list by a selective multi level expansion of pivot point data. Such pivot points can represent hierarchy expansion designators to a subsequent level, which can include user created groups/clusters of data. ...

"Power Management For Wlan"

Computer-implemented methods for power management of network interface devices are disclosed. Such methods may include dividing a time period into a plurality of time slots, determining an amount of data received by the network interface device during a first of the time slots, and determining whether the amoun...

"Detection Of Supported Network Frequency To Enable Successful Connection To Wireless Networks"

An evaluation of supported rates of available wireless networks is performed and these supported rates are matched against supported rates of wireless connection hardware (e.g., a wireless network interface card) of a computer trying to connect to one of the wireless networks. If the wireless connection hardware of...

"Method And System For Downloading Updates"

Embodiments of the present invention provide the ability for a software provider to distribute software updates to several different recipients utilizing a peer-to-peer environment. The invention described herein may be used to update any type of software, including, but not limited to, operating software, programmi...

Computing Device With Relatively Limited Storage Space And Operating/File System Thereof

A computing device includes a processor, a storage device having an executable file, and a file system for executing the file in place on the storage device on behalf of the processor. The file is divided into multiple non-contiguous fragments on the storage device, and the computing device further includes a virtua...

"Designer Created Aspect For An Electronic Form Template"

Systems and/or methods that enable addition of a designer-created aspect originating from one electronic form template into another electronic form template are described. The systems and/or methods may also, in one embodiment, enable a user to graphically package designer-created aspects of an existing electronic f...

"Composable Query Building Api And Query Language"

A system for constructing information search queries is provided. The system comprises a query language that has a predefined syntax and a constructor that creates a search object. The search object encapsulates a query constructed in the query language. Methods for using the system are also provided. ...

Dynamically Laying Out Images And Associated Text Using Pre Defined Layouts

Technologies are described herein for dynamically laying out images and associated text using pre-defined layouts. The pre-defined layouts are created and data defining the layouts is stored in a layout definition file. An application program provides a user interface for dynamically laying out the images and associ...

Technique For Changing Views Of Web Content

A system for presenting web content that allows the user to select and change the view of the content. A page of content, which is viewable on a web browser, contains a user-operable element, such as a pull-down menu, that allow the user to select a view for that content. The page is generated in a default view, by ...

Temporal Ranking Of Search Results

ABSTRACT TEMPORAL RANKING OF SEARCH RESULTS An information dissemination system ranks the search results based on a temporal weight assigned to each search result. The temporal weight is an indication of the importance to a user that varies with time. For each search result, the information dissemination system ca...

Mutual Exclusion Techniques In A Dynamic Peer To Peer Environment.

Mutual exclusion techniques for use in a dynamic peer-to-peer environment are described. In an implementation, a method includes receiving, at each of a plurality of logical replicas, a request from a client. Each of the logical replicas includes a queue and is for exclusive association with one of the clients. The ...

"Desynchronized Fingerprinting Method And System For Digital Multimedia Data"

A desynchronized fingerprinting method and system for identifying collaborators in the making of illegal copies of digital multimedia products. The desynchronized fingerprinting system and method can be used for both audio and video applications. The method and system include an embedding feature and a detection and...

"Using Directional Antennas To Enhance Wireless Mesh Networks"

The principles of the present invention provide for using directional antennas to adaptively communicate in a wireless mesh network. A number of infrastructure components are included in a wireless mesh network environmemt. Each infrastructure component includes an omni-directional antenna and one or more directiona...

Finding Facts Within Electronic Resources

ABSTRACT OPTIMIZATION OF FACT EXTRACTION USING A MULTI-STAGE APPROACH Facts are extracted from electronic documents by recognizing factual descriptions using a fact-word table to match to words of the electronic documents. The words of those factual descriptions may be tagged with the appropriate part of speech. M...

System And Method For Automated Optimization Of Search Result Relevance

A method, system, and computer-accessible medium are provided for automating the optimization of search result relevance in a search engine. The system and method continually collect data that represent various aspects of how a search result is performing and compare that performance data to the expected performance...

Node Matching In A Dynamic, Decentralized Environment

A decentralized computing environment, comprising; a number of nodes, each nodes in the number of nodes being capable of being a neighboring node of other nodes in the number of nodes, each node being capable of capable querying the availability of neighboring nodes for match, the match being formed when a first no...

"Web Page Rendering Mechanism Using External Programmatic Themes"

A web page rendering mechanism in which a computing system generating a web page from a web page definition. A web page class is complied from the web page definition. The theme-specific properties are described separate from the web page definition in theme-oriented text documents that are compiled into a theme cla...

"Method And Apparatus For Compiling Two Level Morphology Rules"

A method of compiling orthography rules includes compiling first and second orthography rules into individual Finite state Transducers by inserting elements of the rules into Finite State Transducers Templates. The individual Finite State Transducers are combined to form a single combined Finite State Transducer. Un...

Scheduling Application Allowing Freeform Data Entry

A project management application provides an environment in which a user can transform a project sketch, which is based on mostly "freeform" data, into a defined project plan. The project management application facilitates the mixture of freeform task attribute values with structured attribute values of one or more ...

Network Jitter Smoothing With Reduced Delay

ABSTRACT NETWORK JITTER SMOOTHING WITH REDUCED DELAY A method of compensating for jitter in a packet stream is described. The method comprises placing undecoded frames extracted from packets in the packet stream into a jitter buffer while decoding frames from the jitter buffer and placing the decoded frames into a ...

Authenticated Exchange Of Public Information Using Electronic Mail

Methods and systems are provided for using an existing email transfer protocol, such as SMTP, to exchange digital objects in an authenticated manner. The provided methods and systems solve the bootstrapping problem of computer identities for P2P communication by authenticating the exchange of public information. If ...

Automatic Identification Of Telephone Callers Based On Voice Characteristics

When a voice input from the caller is received by the recipient, the characteristics of the voice input are applied to a plurality of acoustic models which include a generic acoustic model and an acoustic model group of the callers who are previously identified and a plurality of respective acoustic scores is obtain...

"Method And Apparatus For Providing Foreign Language Text Display When Encoding Is Not Available"

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows: 1.    A method, comprising: referencing a table that includes double-byte font entries and associated phonetic representations of the double-byte font entries; and using at least one of the double byte ...

Architecture For Controlling Access To A Service By Concurrent Clients"

Architecture (100) for controlling access to a service (102). The architecture allows denial of regular and periodic service to all but a selected number of concurrent clients (104) associated with a subscriber, and without any manual administration at the server of a list of specific computers. Rather than require ...

"Method And System For Binary Serialization Of Documents"

A method for processing XML documents in a computer-based system includes associating each of a plurality of information items with a corresponding one of a plurality of binary-data units and providing a XML document associated with a XML information set comprising one or more of the plurality of information items. ...

Media Foundation Media Processor.

A system and method for a media processor separates the functions of topology creation and maintenance from the functions of processing data through a topology. The system includes a control layer including a topology generating element to generate a topology describing a set of input multimedia streams, one or more...

"Declarative Mechanism For Defining A Hierarchy Of Objects"

Described is a method and data structure that enables an object to be specified declaratively within a markup document. The markup document may be XML-based (310). In accordance with the invention, the object is written based on a mapping. The mapping includes a URL attribute (316) for defining et location for a def...

"Rich Data Bound Applications"

In order to allow for application development without requiring extensive graphical design by software developers or extensive software knowledge by graphical designers, applications are separated into a view and a model. Properties in the view and properties in the model are associated through data binding, ...

System And Methods For Encoding Randomly Distributed Features In An Object.

The described systems and method described are directed at encoding randomly distributed features in an object. Randomly distributed features in an authentication object are determined. Data representing the randomly distributed features is compressed and encoded with signature. A label is created and includes the a...

Delegating Instant Messaging Sessions

The claimed subject matter provides a system and/or a method that facilitates redirecting an instant messaging session or an instant messaging communication. An interface component can receive a portion of data related to an instant messaging session, wherein the portion of data is associated with an instant messagi...

Structured Task Naming

The concept of a specialized task identifier is disclosed to indicate the content of a file within a computer-implemented system for providing help content to a user. In one embodiment, the specialized task identifier includes at least one element selected from a controlled vocabulary. In another embodiment, the spe...

"Systems And Methods For Encoding Randomly Distributed Features In An Object"

The systems and methods described herein generally relate to counterfeit-resistant and/or tamper-resistant labels, and more particularly, to utilizing randomly distributed features of an object (whether embedded or naturally inherent) to limit unauthorized attempts in counterfeiting and/or tampering with the label. ...

Efficient Data Transfer To/From Storage Medium Of Computing Device

A method for an application on a computing device to write data from a source to a storage medium associated with the computing device, the method comprising: the application issuing an application command to a file system of the computing device, the application command including an identification of the source an...

"Method Of Instrumenting Code Having Restrictive Calling Conventions"

A development environment for computer programs in which programs under test may be instrumented with probe functions. The probe functions are called through a wrapper function structured to comply with restrictive calling conventions of the platform for which the computer program is developed. By complying with the...

Unified Provisioning Of Physical And Virtual Images

A system for the unified provisioning of virtual and physical disk images is created. The system includes a library of disk images. Client devices are able to upload to, and select disk images from the disk library. The library is able to determine the hardware requirements of a client device, and format the disk im...

Scalable Print Spooler

An exemplary sclable print spooler efficiently prints data on a printer and is most effective in use with a dedicdated print server. One use of the invention is with a print server that services a large number of client computers haaving applications programs having a need to print data. DThese could include, but ar...

"Apparatus Systems And Methods Relating To Improved User Interaction With A Computing Device"

Apparatus, system and method for enabling an improved portable media player are provided. The aparatus provides improved media recording, synchronization, rendering and user interface experiences for a user. In various embodiments, portable media players are provided with a closed position for substantially protecti...

Redundant Pile Of Inexpensive Drives (Rpid)

The claimed subject matter provides a system and/or method that manages storage media associated with a plurality of disparate devices. The disclosed system can include a network of disparate devices wherein each device in the network can be associated with storage media. Additionally, the disclosed system can also ...

Method For Performing Asynchronous Operations Independent Of The Application Framework

An application is built in accordance with a particular framework. A component is incorporated into the application. When an asynchronous operation is to be performed, the component is configured to issue a standard function call in a manner that is independent of the particular application framework used to build t...

"High Speed Internal Wireless Bus"

Multiple computing devices are connected together using a high-speed wireless link. The wireless link enables expansion of available resources to the host device, such as one or more of volatile memory resources, non-volatile memory resources, and additional processor resources.

Systems And Methods For Deterring Software Piracy In A Volume License Environment

A unique volume license key (VLK)is provided to a volume license holder.A singed file containing the VLK and the data derived from volume from volume license holder"s submitted computing environment information is provided to the volume license holder along with the licensed software.The license file is stored in a ...

Network Based Software Extensions

A data structure embodied on a computer-medium comprising: a first sub-structure indicative of a software extension that is to be incorporated in a software application program; one or more second sub-structures associated with the first sub-structure and indicative of feacture types that can be added by the ext...

Forming A Databse Query For A Database

A database query user interface combines the user convenience of simple text searching with the expressive refinements of powerful query languages. The database query user interface includes a query text string input from a user including one or more terms of a chunk expression language format. The database query us...

Test Case Inheritance Controlled Via Attributes

The present invention is directed towards a test case inheritance behavior that can be controlled via attributes. A base test class from which test objects are derived are useful for reducing test case code and management. For example, base test classes and their derived objects can be used to implement steps that a...

"System And Method For Configuring A Computer"

1.  A computer-readable" medium having thereon computer-executable instructions for performing a method comprising: acquiring at least one raw network DNA component, each raw network DNA component corresponding to an attribute of a computer network; generating at least one derived network DNA component according t...

Principles And Methods For Personalizing Newsfeds Via An Analysis Of Information Novelty And Dynamics

A system for distributing personlized information, comprising: a comparator that determines differences between two or more information items; and an analyzer that automatically determines a subset of the information items as personalized information based in part on the differences and as data relating to the in...

"System And Method For Providing A Consistent Visual Appearance To Output Generated By Miltiple Applications"

The techniques and mechanisms described herein are directed to a method for creating an identity that defines a visual appearance for output generated by multiple applications. The identity may include a base design, an effects scheme, a color scheme, a font scheme, a logo, and business information. The identity bei...

"Progressive Scale Graph"

Graphical presentation of data responds to changes in the range of a value in the data set being graphed by dynamically changing the range on the axis by which the value is represented. As the range of a value changes over time(increasing or decreasing), the range of the axis and its endpoints also dynamically chang...

"Windows Remote Debugger Service"

Systems and methodologies for a scalable remote debugging system that can debug machines positioned behind a firewall and thru the Internet, via employing an Internet Friendly Relay Service (IFRS). The IFRS can be positioned in a common reach location and provide a secure method of exchanging communication traf...

Dynamic User Interface For In Diagram Shape Selection

Technologies are described herein for providing a dynamic user interface (UI) to allow a user to select an active diagram shape for insertion into a flowchart or other diagram without leaving the drawing canvas. Through the use of the embodiments presented herein, a diagramming application provides a user with a dyn...

"Dynamic Service Surrogtates"

Example embodiments of the present invention provide a mechanism for allowing developers to define new interfaces and insert custom translational code that implements these new interfaces for legacy components that otherwise cannot communicate in a web service environment. These new interfaces are then exposed ...

"Selective Suspension Of Bus Devices"

A method and system for asserting power control over one or more hardware devices (86, 90, 92, 94 and 96) connected via a bus (84). The invention includes a method and system for signaling and waiting to suspend a first device connected to a second device. The invention also includes a method and system for suspendi...

Network Security Device And Method For Protecting A Computing Device In A Networked Environment

A network security module for protecting a computing device from a security threat on a network, the network security module comprising: a computing device connection connecting the network security module to the computing device; a network connection connecting the network security module to the network; and a se...

Method And System For Providing A Common Operating System

A method and system for providing a common operating system feature set for supporting a variety of operating system configuration is described. The common operating system feature set is organised to provide a monimal memory footprint applicable to a number of devices and methods of deployment. The common operating...

"Random Code Generation"

[0057] Random code generation may include utilizing a statistical breakdown of real world code to randomly generate code that is lexically and structurally valid.

Method And System For Ranking Words And Concepts In A Text Using Graph Based Raqnking

The present invention is a method and system for identifying words, text fragments, or concepts of interest in a corpus of text. A graph is built which covers the corpus of text. The graph includes nodes and links, where nodes represent a word or a concept and links between the nodes represent directed relation name...

"Method Of Video Processing For Macroblock Field/Frame Coding Type Information And Decoder Thereof"

In one aspect, an encoder/decoder selects a bitplane mode from a group of plural available bitplane modes, and processes a bitplane according to the selected bitplane mode, wherein the bitplane indicates AC prediction status information for plural macroblocks of a video picture. In another aspect, for a first interl...

"Development Framework For Mixing Semantics Driven And State Driven Dialog"

An application program interface embodied on one or more computer readable media is disclosed. The interface includes a first dialog container configured to facilitate development of a first type of dialog within an application. Also included is a second dialog container configured to facilitate development of ...

"Generation Of Meaningful Names In Flattened Hierarchical Structures"

1. A computer implemented system that facilitates the generation of meaningful description for a flattened data structure, comprising: a data structure having a plurality of data nodes; a valuation component that assigns a valuation to one or more of the data nodes in accordance with a predetermined metric, the me...

Presenting And Navigating Content Having Varying Properties

Technologies are described herein for presenting and navigating content having varying properties. One or more local or networked providers are searched for content objects. Content objects include associated metadata and may be stored within a content container. Each content object is displayed separately from its ...

Command Based Group Sms With Mobile Message Receiver And Server

A command-based group text messaging system comprising: an initiating mobile communication device that creates a message for subsequent broadcast to a recipient group; and a communication server that analyzes the message received from the initiating mobile communication device and broadcasts the message to a recipie...

"Mapping Of A File System Model To A Database Object"

The subject invention provides a system and/or a method that facilitates mapping a data base model to a database object. A type storage system can utilize a storage mapping of a file storage data model. The mapping can describe the database object created based at least in part upon a schema and how instances o...

Key Based Advanced Navigation Techniques

A key-based advanced navigation system comprising: a key-based input component which maps to one or more segments of content displayed on a portable device screen, the key-based input component comprising any number of numeric keys and non-numeric keys; a navigation component that facilitates navigating through the...

Integrated Sharing Of Electronic Documents

An online service that allows multiple users to share electronic documents over a computer network. Each user may access the online system after specifying the user"s credentials, after which the user may view the user interface specific to that user. The user interface may contain multiple panes, such as a navigati...

"Method And System For Resource Management"

The present invention manages resources in a computing device to facilitate the allocation of resources amongst competing clients operating on the device. A hierarchy of budgets is constructed to encode restrictions on the aggregated use of a resource allocated by a resource provider to one or more clients. A resour...

Method And System For A Service Provider To Control Exposure To Non Payement By A Service Consumer

A method for controlling exposure to liabililty for non-payment by a service consumer and controlling costs associated with requesting payment when a service provider provides services to a service consumer, the method comprising: specifying a number of services within a billing unit for the service provider and th...

Revocation Of A Certificate And Exclusion Of Other Principals In A Digital Rights Management (Drm) System Based On A Revocation List From A Delegated Revocation Authority

A digital certificate identifies an entity as having authority over the certificate to revoke same as delegated by the issuer. The certificate also has at least one revocation condition relating to possible revocation of the certificate. To authenticate the certificate, the identification of the delegated revocation...

Stream Cipher Design With Revolving Buffers

Techniques are disclosed to limit short-term correlations associated with outputs of stream cipher kesystream generators. Output values of a generator are paired such that the paired outputs are sufficiently far apart to be considered independent. In one described implementation, a method includes sequentially stor...

"Generating A Subgroup Of One Or More Media Items From A Library Of Media Items"

A method for generating a subgroup of one or more media items from a library of media items. The method monitors user playback control actions during a playback experience with the library on a media player. The method chooses a selecting filter based upon the monitored user playback control action and generates a s...

A System And Method For Beamforming Using A Microphone Array

A method for real-time design of beam sets for a microphone array from a set of pre of pre-computed noise models, comprising using a computing device to; compute a set of complex-valued gains for each subband of a frequency-domain decomposition of microphone array signal inputs for each of a plurality of beam widths...

Method And Apparatus For Generating A Program Guide.

A method comprising: receiving a request to display program guide, wherein the request is received by a client device; identifying program schedule information; the client device generating a scrolling program guide; and communicating the scrolling program guide to a display device.

"Undo Infrastructure"

Methods, systems, and computer program products that automatically generate and track undo information so that the developer of a user interface object need not be responsible for generating and tracking undo information. Change notifications for changes to an object within a visual user interface designer are proce...

"Network Load Balancing With Host Status Information"

In a first exemplary media implementation, one or more processor-accessible media include processor-executable instructions that, when executed, direct a system to perform actions that include: accumulating host status information at multiple hosts; and sending the accumulated host status information from the multip...

Web Format Based Wireless Communications

ABSTRACT WEB FORMABASED WIRELESS COMMUNICATIONS Web compatible information is effortlessly exchanged over wireless communications utilizing web-based formats. These techniques can be employed over, for example, NFC air links and other wireless communication means to share information between devices in actual web e...

"Adaptive Machine Translation"

A computer-implemented method for providing information to an automatic machine translation system to improve translation accuracy is disclosed. The method includes receiving a collection of source text. An attempted translation that corresponds to the collection of source text is received from the automatic machine...

"Identity System For Use In A Computing Environment

A system for identifying principals within a computing environment, the system comprising: a plurality of principal objects, wherein each principal object corresponds to a specific principal authenticated to perform a digital action within the computing environment and wherein each principal object is operable for ...

"Use Of A Bulk Email Filter Within A System For Classifying Messages For Urgency Or Importance"

The present invention relates to a system and method to facilitate efficient and automated processing of messages. A bulk filter is provided to categorize one or more received messages according to a range of classification, the range spanning from at least a bulk classification of values to at least a non-bulk cla...

Wireless Mesh Networking With Multiple Simultaneous Transmissions By Nearby Network Nodes"

ABSTRACT WIRELESS MESH NETWORKING WITH MULTIPLE SIMULTANEOUS TRANSMISSIONS BY NEARBY NETWORK NODES A wireless mesh network enables multiple devices near each other to transmit simultaneously, thus allowing increased network bandwidth. Prior to transmitting, a device may determine various parameters of the wireles...

Modeling And Texturing Digital Surface Models In A Mapping Applications

ABSTRACT MODELING AND TEXTURING DIGITAL SURFACE MODELS IN A MAPPING APPLICATION Digital Surface Model (DSM) texturing and modeling of various objects on the earth's surface are provided for implementation in a mapping application. One or more image capture devices having wide-angle tenses can be placed in various ...

"System And Method For Managing Data Using Static Lists"

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows: A method for managing data in a list, the method comprising: creating a list having an item type and a relationship type; and adding an item to the list by generating an entry in the list in accordance wi...

"Method And Apparatus For Interleaving Parts Of A Document"

1.   A method comprising: receiving a first part associated with a document, wherein the document contains a plurality of parts; beginning processing the first part prior to receiving all data associated with the first part; identifying a second part associated with the document, wherein the second part is identi...

Dynamically Updating Syllables On Text Entry

Systems and methods for generating text suggestions are described. The computing system (106) includes a processor (108), and a memory (110) coupled to the processor (108). The computing system (106) further includes an initiation module (112) configured to initiate a text input. A syllable updating module (114) of ...

"Aggregating And Searching Profile Data From Multiple Services"

Profile data from multiple networking services can be combined and queried from one networking service. A primary networking service may store user profile data for one or more secondary networking services and the primary networking service. When stored, the data from the multiple networks may be aggregated or merg...

"Personality Based Device"

A personality-based theme may be provided. An application program may query a personality resource file for a prompt corresponding to a personality. Then the prompt may be received at a speech synthesis engine. Next, the speech synthesis engine may query a personality voice font database for a voice font correspondi...

Bi Directional Data Modification With Synchronization

Systems and methods for synchronizing data between endpoints, including the modification of data on an endpoint without necessarily modifying data that is communicated between endpoints are disclosed. In such systems and methods the representation of data on an endpoint may be modified so that constraints on that pa...

Metered Pay As You Go Computing Experience

A computer with scalable performance level components and selectable software and service options has a user interface that allows individual performance levels to be selected. The scalable performance level components may include a processor, memory, graphics controller, etc. Software and services may include word ...

Techniques For Automatic Software Provisioning

Techniques to perform automatic software provisioning are described. An apparatus may comprise a provisioning database, a client provisioning module and a network interface. The provisioning server may be operative to store software update packages for different packet telephony devices. The client provisioning modu...

Hybrid Resource Manager

A hybrid resource manager is provided for use in a computing environment. The hybrid resource manager serves as the single resource manager that cooperates with an operating system to manage each of the individual device drivers associated with the various functions of a multifunction hardware device. In one example...

Center Locked Lists

Described is a technology by which a user can quickly locate a data item such as media content. A user may choose a pivot (filtering) category, including an aggregated "all" category, and may enter additional filtering criteria to narrow search results. Representations (e.g., images) of data items for are displayed,...

Turbo Scroll Mode For Rapid Data Item Selection

Described is a scrolling technology including a turbo- scroll mode that is automatically entered to increase the rate of scrolling through a set of items, (e.g., media content). The turbo-scroll mode may be triggered by holding down a scroll button for a period of time. In the turbo- scroll mode, visual cues are pro...

Collecting And Presenting Temporal Based Action Information

Functionality is described for collecting and presenting action information. The action information describes actions that take place on items at specified times. Among other applications, the functionality assists a user in identifying and accessing relevant items. In one illustrative case, the functionality can di...

Providing Sender Selected Sound Items To Conversation Participants

Functionality is described for allowing a first user to select a sound item. The first user can use a first device to send this sound item to a second device operated by a second user. Upon the occurrence of a triggering event, the sound item selected by the first user can be presented by the second device to the se...

Secure Key Management For Scalable Codestreams

Key management is performed to generate a single key allowing of the decoding of all authorized levels of a plurality of access types within a scalable codestream. An access node set is derived from sets representing access types having hierarchies representable by fully ordered sets, such as resolution and layer le...

Grammatical Parsing Of Document Visual Structures

A two-dimensional representation of a document is leveraged to extract a hierarchical structure that facilitates recognition of the document. The visual structure is grammatically parsed utilizing two-dimensional adaptations of statistical parsing algorithms. This allows recognition of layout structures (e.g., colum...

Automatically Generating Rules For Connection Security

A method and system for creating security policies (1 12) for firewall (122) and connection policies in an integrated manner is provided The security system provides a user interface through which a user can define a security rule that specifies both a firewall policy and a connection policy After the security rule ...

Ink Warping For Normalization And Beautification/Ink Beautification

Systems and methods are disclosed that facilitate normalizing and beautifying digitally generated handwriting, such as can be generated on a tablet PC or via scanning a handwritten document. A classifier can identify extrema in the digital handwriting and label such extrema according to predefined categories (e.g., ...

Digital Application Operating According To Aggregation Of Plurality Of Licenses

A plurality of digital licenses correspond to a piece wcontefit, including'a bas§ license and at least one add-on license. Each add-on license includes a reference to the base license, and each of the base license and each add-on license sets forth rules specifying how the content may be employed. Each add-on licens...

Object Association A Computer Generated Drawing Environment

Methods and systems for associating two objects in a drawing application with one another are provided. Embodiments of the invention are directed toward a method in a computing environment that includes receiving a command to designate a target and designating the target. The method can further include identifying a...

User Interface Servicing

A set of embodied Application Program Interface(s) (112) are provided for facilitating a method of presenting a presented user-interface shell (UIS) (114) that cooperates with a servicing user-interface shell (UIS) (116). The method includes receiving data indicative of one or more tasks to be completed, coordinatin...

Hardware Accelerated Color Data Processing

Methods for mapping color data having at least one color associated therewith to an output device based on an input device profile and an output device profile, each profile having a tone curve and a color matrix, are provided. In one embodiment, the method includes receiving color data from an input device and dete...

Annotating Shared Contacts With Public Descriptors

A method for annotating shared contacts within a social network with public tags, notes or other data. This allows users of a social network to gain useful information at a glance about others' contacts within that network, as well as providing a means for filtering contacts within that network by user-defined keywo...

Protecting Elementary Stream Content

Protecting elementary stream media content is described. In one aspect, data segments within elementary stream media content are identified. Each data segment includes a single video or audio frame. Encryption boundaries for protecting the payload packets are selected to correspond to data segment boundaries. The el...

Dynamically Configuring, Allocating And Deploying Computing Systems

ABSTRACT DYNAMICALLY CONFIGURING. ALLOCATING. AND DEPLOYING COMPUTING SYSTEMS Computing systems can be dynamically configured, allocated, and deployed based on user requirements. For example, a user can request a number of servers lor dynamic conliguration, aiiocation. and deployment. Embodiments provide a quick a...

"Systems And Methods That Optimize Row Level Database Security"

A robot (12) having a spindle (18) is calibrated by disposing a calibration tool (50) in the robot spindle (18). The position of the calibration tool (50) is measured. An axis of the spindle (18) is determined based on the measured position. A calibration tool center point is determined based on the measured positio...

Techniques For Managing Visual Compositions For A Multimedia Conference Call

ABSTRACT OF THE DISCLOSURE TECHNlOUES FOR MANAGING VISUAL COMPOSITIONS FOR A MULTIMEDIA CONFERENCE CALL Techniques for managing visual compositions for a multimedia conference call arc described. An apparatus may comprise a processor to allocate a display object bit rate for multiple display objects where a total ...

Client Controlled Dynamic Call Forwarding

ABSTRACT OF THE DISCLOSURE CLIENT CONTROLLED DYNAMIC CALL FORWARDlNG A clicnt-side signaling mechanism that allows a client to control how a telephone call is handled on a call server. The client user can create call routing rules on the client device using a clicni control component that manages session protocol m...

Dynamic Fragment Mapping

A dataset is divided into pieces and stored at multiple locations and the system dynamically increases or decreases the number of storage locations where the pieces of the data set may be stored. A data structure comprises a first data field including a first index and a first element, and one or more data fields ea...

Distributed Caching Of Files In A Network

Distributed caching and download of file. A method is described that includes building a peer list comprising a listing of potential peer servers from among one or more networked computers. The peer list includes no more than a predetermined number of potential peer servers. Potential peer servers in the peer list a...

Encrypted Data Search

An indexing value may be determined, transparently with respect to a requester, based on a desired plaintext item of data and a cryptographic key. The indexing value may be used to access an entry in an indexing structure to obtain a corresponding database entry which includes a non-deterministically encrypted ciphe...

Security In Peer To Peer Synchronization Applications

The claimed subject matter provides a system and/or method that facilitates synchronizing data within a data storage system. An interface component can leverage a synchronization technique within the data storage system. A sync component can provide a secure peer to peer data synchronization based at least in part u...

Digital License Migration From First Platform To Second Platform

A digital license is migrated from a source platform to a target platform. At the source platform, a migration image is produced to include the license and corresponding data therein, and the license is deleted from such source platform. At the target platform, permission is requested from a centralized migration se...

Electronic Data Snapshot Generator

A snapshot of electronic data is generated to provide information about a file at a specific point in time. The snapshot may be shared between several users. The snapshot is generated based on the type of snapshot that is requested. The snapshot types include a static snapshot, a published item snapshot and an inter...

Distributed Single Sign On Service

The described implementations relate to establishing authenticated communication between a client computing device and a service provider. In one implementation, once a registration procedure is complete, multiple authentication servers are used by a client computing device and a service provider to facilitate the e...

Changing Product Behaviour In Accordance With License

A computer or other electronic device uses a cryptographic capabllity and hardware identifier to verify a provisioning packet for changing the mode of operation of the device or a licensed component. A secure memory stores the provisioning packet for future reference. A sequence number may be used to limit replay at...

Using Power State To Enforce Software Metering State

A pay-per-use or metered-use computer uses directives from an operating system or other software component to determine whether to meter or not. Because such directives may not be trustworthy, a metering system may determine a state of the computer to verify that the metering state complies with a policy. If the met...

Efficient Navigation Of Search Results

ABSTRACT EFFICIENT NAVIGATION OF SEARCH RESULTS Systems, methods, and computer-readable media for navigating search results are provided. In response to receiving a search query, at least one individual search result is presented in an overlay window, the overlay window being configured to overlay at least a portio...

Plug And Play Device Redirection For Remote Systems

A remote access system connects a server computer with one or more client computers, where devices are connected locally at the client computers. The devices are recognized by the client computers and a device driver is provided for each connected and recognized device. A virtual driver is created at the server comp...

Automated Placement Of Fields In A Data Summary Table

A graphical user interface for creating a data summary table includes a pane including a plurality of fields, and a data summary table. Upon selection of a field to include in the data summary table, the user interface is programmed to analyze the field and automatically place the field in the data summary table. ...

Real Time Synchronization Of Xml Data Between Applications

One or more data stores are maintained separately from a primary presentation storage within a document for storing, relating and for allowing use of arbitrary data that is associated with a computer-generated document between multiple data consumers. The data store exposes application programming interfaces (APIs) ...

Designating Setting And Discovering Parameters For Spreadsheet Documents

For standalone spreadsheet applications and/or Web-based spreadsheet services, the ability to designate, discover and set parameters for spreadsheet documents is provided. When creating a spreadsheet document, the ability to designate certain cells or ranges of cells as parameters to a spreadsheet is enabled. Furthe...

Nested Views In An Electronic File System

A live preview of objects in a folder or other container, including sub-folders, is requiring the user to open the folder or other container. When a user is previewing a set of objects in a closed container, any containers represented in the view may themselves concurrently show to the user a live preview of their c...

Programmability For Xml Data Store For Documents

A programmability mode for interacting with data stores within a document allows real time interaction. Data for structuring information associated with a document, such as document metadata, is maintained in the data store where relationships between different pieces of data are maintained in a location distinct fr...

Script Markup

A script markup language provides a declarative mechanism for defining script-based interactive behavior and application logic associated with a document. The script markup defining the interactive behavior and application logic is presented as an independent portion of the markup for the document, separated from an...

Extensible Xml Format And Object Model For Localization Data

Methods, apparatus, and computer-readable media including computer-readable components for the localization of data included in software programs are described. The computer-readable components comprise data elements defined by a software data schema; a property repository data element for storing a plurality of dat...

Preview Information For Web Browsing

The invention describes a method for displaying preview information to a user for either a website the user is currently browsing or for a website that the user may consider visiting. The invention can be configured to display a web link to a user and to detect a trigger event. Additionally the invention can be conf...

Truth Revealing Market Equilibrium

To use market clearing methods to determine market equilibrium, a market clearing situation is established by determining a number of items to be sold at the market price and allotting a number of pseudo items assignable to bids below the market price. Once bids are received for the items, using the number of pseudo...

Network Connectivity And Wireless Status In A Notification

Described is a technology by which network connectivity information may be communicated via a single notifications area (e.g., system tray) icon, including by representing different images of the icon to display different types / states of connectivity and different types of media connections. For example, the icon ...

Integrating Charts In Documents

A chart is presented in a host application The chart is managed by communicating data corresponding to the chart to a separate application and providing functionality for editing the data in the separate application. The presentation of the data in the separate application is distinct from the presentation of the ch...

Connecting To Different Network Types Through A Common User Interface

Described is a technology by which network connections are unified into a single user interface for user interaction with those networks. Upon receiving information identifying available networks that correspond to different types of media, a user interface component aggregates the available network connections and ...

Methods For Predicting Destinations From Partial Trajectories Employing Open And Closed World Modeling Methods

The claimed subject matter provides systems" and/or methods- inai ias

Template Based Management Of Services

One embodiment of the invention uses templates that define certain features of a given service type, wherein the features are common to all services of that service type. The template can be configured by a user to obtain a service definition for the given service. The service definition is passed to a programmabili...

Connecting Devices To A Media Sharing Service

Sharing media content between entities. A Computing device detects and connects to another Computing device within a predefined proximity. Media content items and associated metadata are selected and exchanged between the connected Computing devices. A subsequent purchase opportunity is provided to the users to purc...

Electronic Catalog

ABSTRACT ELECTRONIC CATALOG An electronic catalog may have one or more associated attributes describing one or more features of included items. A processing device may display a group of nodes, each of which may represent a different attribute with respect to the included items. A user may select one of the nodes ...

Flash Memory Management

Flash memory is managed utilizing memory management data structures residing in volatile memory of a flash memory device. The memory management data structure restart created and updated each time power is supplied to the memory device. During write operations to the flash memory, specific locations in the flash mem...

Integrated Functionality For Detecting And Treating Undesirable Activities

Various embodiments provide integrated solutions for detecting and treating undesirable activities. Detection and treatment solutions are interogative with software entities, such as applications, DLLs and the like, and provide status notifications for the user as to the status of the detection and treatment activit...

A System Capable Of Performing A Fast Boot From A Fully Off State.

Described is a fast boot mechanism that generally operates by persisting static data and/or code for a system component, and then providing the system component with access to the static data and/or code during a subsequent device boot. For example, the static data and/or code of one or more components may be restor...

Productivity Suite To Line Of Business Synchronization Mechanism

A synchronization method is arranged to permit synchronization between a productivity suite application and a line of business (LOB) application such as a Customer Relation Management or CRM application. Requests are sent from the productivity suite application to the LOB application via a web service call to update...

Hash Function Constructions From Expander Graphs

Hash function constructions from expander graphs are described. In one aspect, an expander graph is walked to compute a hash function. The expander graph is walked using respective subsets of an input message. A label of a last vertex walked is an output of the hash function.

Health Integration Platform Api

ABSTRACT HEALTH INTEGRATION PLATFORM API An application program interface (API) is provided for requesting, storing, and otherwise accessing data within a health integration network. The API facilitates secure and seamless access to the centrally-stored data by offering authentication/authorization, as well as the ...

Sharing Television Clips

ABSTRACT SHAEUNG TELEVISION CLIPS Methods, software and apparatus are described which enable users to share and exchange clips from broadcast media using their mobile devices. Whilst watching broadcast media, a user can cause their mobile device to capture a clip, for example by pressing a button. The capture of th...

Offsite Centralized Data Center Providing Client Functionality

A server adapted to provide client functionality may include an offsite centralized data center and a local client functionality component that may be stored in the offsite centralized data center. The offsite centralized data center may remotely host the local client functionality component such that information st...

Formatted Message Processing Utilizing A Message Map

ABSTRACT FORMATTED MESSAGE PROCESSING UTILIZING A MESSAGE MAP A MIME or XML formatted message is stored and a map is processed in place of a message. The map is a compact representation of the message. The map is indicative of the content and structure of the message. The map comprises tags that map to and are ind...

Private Virtual Lan Spanning A Public Network For Connection Of Arbitrary Hosts

Architecture for exposing a virtual private network of peer devices into the public domain via an overlay network. Computing devices, peripheral devices, as well as mobile devices can be physically distributed, but appear to belong to the same virtual private (or home) network, and be accessible from anywhere. Benef...

Extending Flash Drive Lifespan

ABSTRACT EXTENDING FLASH DRIVE LIFESPAN In a computer-implemented method for filtering input/output operations of a flash drive, an input/output request directed toward a flash drive is received. It is determined whether the input/output request is associated with a high volume write operation. If the input/output ...

Propagation Of Conflict Knowledge

A sync community may include a group of synchronization endpoints. When two synchronization endpoints of the sync community synchronize with one another, a synchronization data conflict may be detected when the two synchronization endpoints make a change to a same particular data item and the two synchronization end...

Conditional Policies In Software Licenses

ABSTRACT CONDITIONAL POLICIES IN SOFTWARE LICENSES A software license includes conditional policies that define usage rights for software. A conditional policy contains a condition. If the condition is met, software is authorized for use in accordance with the conditional policy. Conditional policies can authorize...

Reputation Based Authorization Decisions

This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to auth...

Mobile Device Management Proxy System

A general-purpose proxy mobile device management architecture. The architecture serves as a proxy for a mobile client seeking services from backend systems.  A virtual client image of state information associated with the mobile client is stored such that when the mobile client interacts with the proxy, the virtu...

Image Processing System For Digital Collage

It is required to provide a framework for an automated process for forming a visually appealing collage from a plurality of input images. It is required to provide a framework for this type of automated process which is flexible and robust and which can easily be interfaced to a related software application. An imag...

"Web Application Architecture"

A method and protocol for communication between a first computer and a second computer is disclosed, along with a system providing a networked application in a client-server environment. A protocol includes a request from the first computer to the second computer including a function identifier for a function on the...

Interactive Marketplace Infrastructure

ABSTRACT INTERACTIVE MARKETPLACE INFRASTRUCTURE Online marketplace experiences are substantially enhanced by employing marketplace infrastructures. A marketplace infrastructure can provide structured features desired by most customers without requiring a user to be redirected from the marketplace. Marketplace infr...

Automatic Vulnerability Detection And Response

ABSTRACT AUTOMATIC VULNERABILITY DETECTION AND RESPONSE Various embodiments detect security vulnerabilities and, responsively, can modify an affected program so that even if an exploit runs, the program"s integrity can be maintained. In at least some embodiments, a local automatic vulnerability detection and respon...

Training Ranking Systems With Arbitrary Cost Functions

The subject disclosure pertains to systems and methods for training machine learning systems. Many cost functions are not smooth or differentiable and cannot easily be used during training of a machine learning system. The machine learning system can include a set of estimated gradients based at least in part upon t...

"Detecting Clock Drift In Networked Devices Through Monitoring Client Buffer Fullness"

A digital media system uses client buffer fullness reports to detect clock drift between a clock on a host/source device that delivers streaming media content and a clock on a client playback device that receives the streaming media content. The system provides a reduction in playback interruptions during playback ...

"A System And Process For Controlling A Shared Display Given Inputs From Multiple Users Using Multiple Input Modalities"

A system for controlling a shared display, comprising: a general purpose computing device; and a computer program comprising program modules executable by the computing device, comprising, a plurality of input modules each providing a different communication modality, and which collectively input information from m...

Direct Update Software Transactional Memory

A transactional memory programming interface allows a thread to directly and safely access one or more shared memory locations within a transaction while maintaining control structures to manage memory accesses to those same locations by one or more other concurrent threads. Each memory location accessed by the thre...

"Systems And Methods For Shielding An Identified Vulnerability"

Systems and methods are described for shielding a vulnerability in an application through disablement of one or more features. In an implementation, a method includes identifying a vulnerability in at least one of a plurality of features for an application module. A communication is formed for receipt by a p...

"Systems And Methods For Managing Multiple Keys For File Encryption And Decryption"

Systems and methods for managing multiple keys for file encryption and decryption may provide an encrypted list of previously used keys. The list itself may be encrypted using a current key. To decrypt files that are encrypted in one or more of the previous keys, the list can be decrypted, and the appropriate prev...

System And Methods For Facilitating Third Party Call And Device Control

The present difndoj

Fault Detection And Diagnosis

A network troubleshooting framework is described. In an implementation, a method includes detecting a discrepancy in operation of a network by supplying data that describes the network to a network simulation so that the network simulation provides an estimation of network performance. A determination is made as to ...

"Digital Media Clearing House Platform"

Peer to peer distribution is provided by a digital media clearing house platform, where content is transferred from one peer (provider) to another (recipient) in return for a payment. When the recipient pays, a portion of the payment of the payment is passed to the owner of the rights in the content, according to an...

"Generate A Power State Alter Signal For A Mobile Device

ABSTRACT A system and method for providing a power state alter signal to a device based upon a position signal corresponding to the mobile device is disclosed. The technology initially accesses a position based rule. The position based rule is then compared to a position signal. A power alerting signal is provided ...

System And Method For A Tool Pane Within A Markup Language Document

A tool pane is included in a markup language document, such as a web page, that allows web page and web parts included in the web page to be modified. The tool pane allows a user to select among various modes for the tool pane including a gallery mode, a properties mode, and a customization mode. During the gallery ...

"System For Facilitating Data Handling"

1. A system that facilitates data handling, comprising: a component that receives data; and a data manager that determines an intent of the data, reformulates at least a subset of the data based on the intent, and automatically presents the reformulated data to a user.

"Creation And Composition Of Sets Of Items"

A data organization system comprises an interface component that receives input that relates to properties associated with a first item type. A set generator component filters a collection of items of the first item type as a function of select properties associated with the input and creates and stores a first filt...

"Method Of Speech Recognition Using Variational Inference With Switching State Space Models"

A method is developed which includes 1)defining a switching state space model for a contnuous valued hidden production-related parameter and the observed speech acoustics, and 2) approximating a posterior probability that provides the likelihood of a sequence of the hidden production-related parameters and a sequenc...

"Print Job Queuing And Scheduling Systems And Methods"

Printing systems and methods are described in which the priorities of print jobs are programmable. A scheduler component oversees print job management and scheduling, and works in concert with components called prioritizers, to provide for ease of programming and customization. In at least some embodiments, an ...

Systems And Methods For Managing Discussion Threads Based On Ratings

A method for deleting threads from a discussion group comprising a plurality of posts, comprising:     receiving a rating from each of the users whether the post was useful;     determining whether at least one user has rated at least one post within the threae as useful;      if at least one user has rated...

Tag Based Schema For Distributing Update Metadata In An Update Distribution System.

A tag-based structure for communicating software update metadata information to client computers and to update service nodes is presented. An update metadata file includes: an identifier tag including a software update identifier that uniquely identifies the software update; zero or more general properties tags that...

Collapsible Container With Semi Collapsed View

A user interface system and method of lists of information using a squeezed / semi-collapsed states of the group that shows, for example, a portion of the group (e.g., only the first few items of the group) is provided. The squeezed / semi-collapsed state takes up less room on the screen than an open state but gives...

Techniques For Generating Usage Rights For An Item Based Upon Access Rights

A method and computer-readable medium are provided for generating usage rights lor an item based upon rights to access the item. According to the method, a request is received at a document management system for an item stored in a library. In response to the request, access rights to the item for the requ...

Method And Identification Tag For Asset Management

ABSTRACT IS NOT FILED.

"System And Method For Secure Full Text Indexing"

Documents are indexed in accordance with a process that separates the filtering and word breaking portions of the process so that they are performed under a restricted security setting. When a document is requested by an indexer, the document is retrieved and then passed to the higher security process. The docu...

"Bidirectional Dynamic Offloading Of Tasks Between A Host And A Mobile Device"

One or more functions are exposed by a mobile device to a host connected to the mobile device. A function of the one or more functions is executed at the mobile device in response to a request from the host, wherein the function is associated with a host task. The result of the function is returned to the host. ...

"Method And Computer Readable Medium For Formula Based Document Retention"

A method and computer-readable medium are provided for formula-based document retention. According to the method, a retention formula and a retention action are defined for one or more items. The retention formula is utilized to calculate a retention date for each item. The retention action specifies the acti...

Selective Confirmation For Execution Of A Voice Activated User Interface

A voice-activated user interface for an application is described. The voice activated user interface invokes a speech recognition component to recognize audio input from a user. If the audio input is a command, then a validation component is invoked to determine whether to validate the command prior to execution. ...

Radiometric Calibration From A Single Image

A method for determining an inverse response function of a camera, the method comprising: finding a first pixel in an output image of the camera in which the first pixel images a first region having a first color and a second region having a second color, the first pixel representing a blended color derived from th...

Signing And Validation Of Session Initiation Protocol Routing Headers

A method of processing a Session Initiation Protocol (SIP)message, the method comprising: (a) receiving a SIP request at a SIP node, the SIP request including a message header; (b) generating a signature based upon at least a portion of the message header; (c) generating a SIP node header entry; and (d) insertin...

File Locker And Mechanisms For Providing And Using Same

A file locker manages the storage and use of protected data for software objects. A protected environment maintains the cryptographic and isolative infrastructure to support sealing of data items for use by a trusted agent. The file locker uses the protected environment's sealing functionality to seal data items for...

"A System For Cryptographically Secure Person Identification"

A system for cryptographically secure person identification, the system comprising, an identification issuer to produce one or more person identification documents (IDs) for a person, the ID comprising first and second representations of person-distinguishing data which distinguishes persons, the first representatio...

Rapidly Obtaining A Subset Of Message Data From A Server For Filtering

Described is a system and method in which client-side tracing mechanisms allow a computing device to efficiently decide which message need to be downloaded from a server for subsequent filtering evaluation, and request only those messages. For example, the present invention may be used to limit a download of POP3 em...

Address Support For Resources In Common Language Runtime Languages

A computer-implemented method is disclosed for reducing coding errors prior to runtime in the context of a managed code execution environment. The method includes providing a developer with access to a plurality of managed code resources. The method also includes verifying that a resource identifier input by the dev...

Generating Large Units Of Graphonemes With Mutual Information Criterion For Letter To Sound Conversion

A method and apparatus are provided for segmenting works into into component parts. Under the invention, mutual information scores for pairs of graphoneme units found in a set of words are determined. Each graphoneme unit includes at least one letter. The graphoneme unit includes at least one letter. The graphoneme ...

Connectivity Objects Under A Mobile Device Management Tree

The present invention is provides a system and method for managing connectivity objects and their associated parameters for a mobile device. The connectivity parameters are stored in a tree structure. For example, a proxy may be a node in the tree with its connectivity parameters listed as leafs. Similarly, a networ...

Virtual Private Network Structure Reuse For Mobile Computing Devices

A method for persisting virtual private network structures across multiple network addresses assigned to a mobile node, the method comprising; Setting up a virtual private network tunnel between a virtual private network tunnel server and the mobile node, wherein virtual private network structures supporting the v...

"Method And System For Unlocking A Computing Device"

A password locked computing device may be unlocked by coupling the locked device to a password unlocked computing device that is associated with the same user as the locked device. If the devices recognize each other as being associated with the same user, the locked computing device is automatically pass...

Adaptation Of Compressed Acoustic Models.

The present invention is used to adapt acoustic models, quantized in subspaces, using adaptation training data (such as speaker-dependent training data). The acoustic model is compressed into multi-dimensional subspaces. A codebook is generated for each subspace. An adaptation transform is estimated, and it is appli...

"A System Protecting Digital Media Of Various Content Types"

Systems and/or methods ("tools") are described that enable a digital rights management policy to be associated with digital media having an arbitrary content type or transfer control protocol. In some embodiments, the tools encrypt dam segments of a media file and add a descriptor to each of those segments. These de...

"System And Method For Generating Aggregated Data Views In A Computer Network"

A system and method for generating aggregated content views in a computing network are provided. A host computing device obtains a request for an aggregated view of content corresponding to a set of criteria. The host computing device queries itself and each computing device in a defined network for locally stored c...

Decoupling Scanning From Handoff For Reduced Delay Over Wireless Lan

Methods and systems for handing off a wireless client between access points wherein the scanning for access points in decoupled from the handing off, thus reducing the delay in the handing off.

"Method And System For Calculating Importance Of A Blocks Within A Display Page"

A method and system for identifying the importance of information areas of a display page. An importance system identifies information areas or blocks of a web page. A block of web page represents an area of the web page that appears to relate to a similar topic. The importance system provides the characteristics or...

"Method And System For Identifying Image Relatedness Using Link And Page Layout Analysis"

A method and system for determining relatedness of images of pages based on link and page layout analysis. A link analysis system determines relatedness between images by first identifying blocks within pages, and then analyzing the importance of the blocks to web pages, web pages to blocks, and images to blocks. Ba...

"Full Scale Video With Overlaid Graphical User Interface And Scaled Image"

The present disclosure relates to displaying full scale images with overlaid similar scaled images and a graphical user device in a display of a client device. The client device receives video streams of the full scale images and scaled images. The video streams are broadcast independent of one another, and a user o...

"Auxiliary Display System Architecture"

Described is an architecture by which application programs can provide data to auxiliary display devices of essentially any type for display to a user. A defined application layer (e.g., accessed via interfaces) allows programs to provide data to a service that controls the output of data to an auxiliary display dev...

"Xparts Schematized Data Wrapper"

.x parts are schematized data wrappers that provide a means by which a suit of office applications can share data amongst themselves and other application as well. Data from an arbitrary resource is selected and is associated with a schema. A schema is used to define the data type of the data, which facilitates repr...

"Synchronized Graphic And Region Data For Graphics Remoting Systems"

A method, comprising;synchronously gathering region data for displaying a region of a server desktop remotely on a client display, wherein the region data describe a shape and a position of the region;synchronously gathering graphics data for the region, wherein the graphics data describe visual content of the regio...

"Method And System For Classifying Display Pages Using Summaries"

A method and system for classifying display pages based on automatically generated summaries of display pages. A web page classification system uses a web page summarization system to generate summaries of web page. The summary of a web page may include the sentences of the web page that are most closely related to ...

"Wireless Cassete Adapter"

A wireless cassette adapter in the form of an audio cassette that can be inserted into an audio cassette player provides an audio interface for wireless mobile devices to existing audio systems. A wireless interface is established by the wireless cassette adapter to one or more wireless mobile devices and receives ...

"Seamless Discovery Of Workstation Installed Remote Application From The Extranet"

Systems and methods for enumerating applications by a remote client computer are described. The applications are deployed in an Intranet. The remote client computer is external to the Intranet. In one aspect, a remote application discovery request is sent to a Web service. The Web service is deployed on a remote app...

"Visual Composition Rendering On Client Devices"

A method and protocol to create and control compositions on a remote device is disclosed. The protocol allows servers and other devices to take advantage of processing capabilities of remote devices to render compositions on the remote devices, thereby increasing server scalability and leveraging the remote device p...

"Systems And Methods For Initializing Multiple Virtual Processors Within A Single Virtual Machine"

The present invention is a system for and method of initializing multiple virtual processors in a virtual machine (VM) environment. The method of initializing multiple virtual processors includes the steps of the host creating a multiple processor VM and activating a "starter virtual processor," the "starter virtual...

"Method And System For Synchronizing Identity Infromation"

An identity system and method that stores identity information related to different principals and stores the identities on different or disparate systems such that the different systems can use the identities. A synchronization process synchronizes identity information and rules based on identity information betwee...

Method For Maintaining Wireless Network Response Time While Saving Wireless Adapter Power

To reduce the power consumption of a wireless communication hardware device, power conservation scheduling algorithms can be implemented. Reoccurring events, including DTIM intervals and listen intervals can be scheduled as awake times. Similarly expected response intervals can be scheduled as awake times based on i...

"Systems And Methods For Collecting Operating System License Revenue Using And Emulated Computing Emvironment"

Several embodiments of the present invention provide means for collecting license revenue for operating system or applications software that resides in a virtualized computer system. Certain of these embodiments are specifically directed to providing a means for collecting license revenue for modem or legacy operati...

"Method, System And Apparatus For Providing Custom Product Support For A Software Program Based Upon States Of Program Execution Instability"

A method and apparatus are provided for providing custom product support for a computer program based levels of execution instability. The execution of a software program is monitored over a period of time to determine the execution stability of the program. Based upon the monitoring and upon one or more threshold l...

"Flexible Context Management For Enumeration Sessions Using Context Exchange"

Mechanisms for providing requested date items in a request-driven enumeration session while retaining to control over how much inter-message context information is retained by the data provider. Upon receiving request for the data items, the data provider identifies a portion of the data items to be provided in the ...

Managing A Communication Connection Using Keep Alive Packet

Keep-alive processing for NAT devices and reducing power consumption in wireless clients. A server driven keep-alive mechanism facilitates keep-alive messages to a NAT device currently providing a connection to a mobile client to refresh the NAT state, thereby reducing or eliminating power consumption in a wireless ...

"Identifying Executable Scenario Solutions In Response To Search Queries"

Systems, methods, and computer-readable media for identifying executable scenario solutions relevant to a user query and returning such executable scenario solutions as search results in response to the user query are provided. Upon receiving a user query, a plurality of results is returned, each result being repres...

"Private Sheets In Shared Spreadsheets"

Private sheets are disclosed, in shared computer applications, such as spreadsheets. In one aspect, a public sheet is accessible to a first client and a second client; and, moreover, a private sheet is accessible only to the second client. The private sheet is configured to access content in the public sheet, but th...

"Using Scenario Related Information To Customize User Experiences"

Methods for using scenario solution-related information to generate customized user experiences are provided. Upon receiving a query, results are returned, each result being representative of a scenario solution which may be utilized to address a particular issue relevant to the query. At the time of authoring, each...

Enabling Routing Of Data On A Network Based On A Portion Of Data Accessed From A Non Network Enabled Device

A system and method for enabling routing of data on a network based on a portion of data accessed from a non-network enabled device is disclosed. The technology includes a method for enabling routing of data on a network based on a portion of data accessed from a non-network enabled device. The method includes detec...

"System And Method For Protected Operating System Boot Using State Validation"

A mechanism for protected operating system boot that prevents rogue components from being located with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is validated, and a...

"Method And Apparatus For Viewing And Interacting With A Spreadsheet From Within A Web Browser"

A method, system and apparatus are provided for enabling a spreadsheet to be viewed and modified with the context of a Web browser application program. According to a method, a request is received to view a spreadsheet document in the web browser application program. In response to the request, a representation of t...

"Method System And Apparatus For Exposing Workbooks As Data Sources"

A method, system, and apparatus are provided for exposing and utilizing workboods as server data sources. The system includes a client computer capable of executing a spreadsheet application program for creating a workbook including one or more worksheets. The workbook may be published to a server computer where the...

"Aligned Behavior In Templated Lists"

A list control allows for a harmonized display of heterogeneous list element data by using at least two templates. The templates define the layout for the list element data. The templates consult an interface while calculating the layout. The interface provides information regarding the location of at least one grid...

"Support For User Specified Spreadsheetr Functions

A facility for enabling the use of user-defined function in a spreadsheet document made up of cells is described. The facility receives a trigger to evaluate cells that include a distinguished cell. In response to receiving the trigger, the facility determines that the distinguished cell contains an invocation of a ...

"Query Forced Indexing"

A searchable index is created using a query process and an indexing process. The query process cooperates with the indexing process to catalogue items that are located within a specified search scope. Previously indexed items are evaluated to ensure that their indexes are up-to-date. Items that are out-of-date have ...

"Using Scenario Related Metadata To Direct Advertising"

Mechanisms for directing advertising in search result presentation and/or scenario solution execution based upon a user"s locality are provided. Locality refers to a collection of metadata created based upon scenario solutions executed by a user and/or enablers acquired by a user during scenario solution execution. ...

"Definable Application Assistant"

A user creates an application assistant by recording a series of steps to complete a specific task involving one or more computer applications. Additional steps that may not involve the use of a computer application may be included. For each step, annotations may be created. The series of steps and annotations are s...

Method And System For Restarting A Project Management System Scheduling Engine Based On User Input Of Contractual Start/Finish Data

Method and systems are provided for managing automated project management scheduling based on user input of contractual project milestone start and/or finish data. A project scheduling engine may be managed by provision of contractual start/finish data. The scheduling engine may restart a project management schedule...

Remote Data Access Techniques For Portable Devices

A wide-area network ("WAN")-based service enables remote data access transactions between participating endpoints within a group of participating endpoints that includes at least one server and at least one portable electronic device. Each participating endpoint is configured for communnication via one or more commu...

"Self Managed Processing Device"

A processing device may automatically provide protective services and may provide backup services for backing up and restoring user files, system files, configuration files, as well as other information. The processing device may be configured to check one or more performance conditions and perform an action to impr...

System For Security Method Incorporating Human Participation For Retrieving Data

A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is provided to the requester. Proper solution of the puzzle requires human participation. The puzzle is chosen such that its solution is within the capabilities o...

"System And Methods For Supporting Inheritance For User Defined Types"

Various embodiments of the present invention are directed to a database with an extensible type system for at least one user-defined type that comprises information for describing its structure as well as information for describing an inheritance relationship between itself and another user-defined type (either a su...

"System And Methods For Automatic Database Or File System Maintenance And Repair"

The present invention relates generally to database and file system management and, more particularly, to automatic database and file system maintenance and repair to ensure data reliability. Various aspects of the present invention relate to responding and correcting data corruptions at a data page level (482) for ...

"Hierarchical Materials"

The present invention provides a unique system and method that facilitates incrementally updating spam filters in near real time or real time. Incremental updates can be generated in part by difference learning. Difference learning involves training a new spam filter based on new data and then looking for the differ...

"Selfdescribing Software Image Update Components"`

Described is a system and method in which software images including updates are provided as packages. The package is self-describing, thereby facilitating the replacement of only component parts of an image. A software build process maps operating system features (comprising files, metadata, configuration informatio...

"System And Method For Ranking Search Results Based On Tracked User Preferences"

A method and system are provided for ranking search results based on user preferences. The method includes monitoring user selections in response to user receipt of search results and tracking metadata related to user selections for user selections that exhibit a threshold satisfaction level. The method additionally...

"Organizing Scenario Related Information And Controlling Access Thereto"

Mechanisms for organizing scenario solution-related information based upon a user"s locality are provided. Locality refers to a collection of metadata created based upon scenario solutions executed by a user and/or enablers acquired by a user during scenario solution execution. Such metadata may be stored in associa...

Robust Detector Of Fuzzy Duplicates

At least one implemenatation, described herein, detects fuzzy duplicates and eliminates such duplicates. Fuzzy duplicates are multiple, seemingly distinct tuples (i.e. records) in a database that represent the same real-world entity or phenomenon.

"Systems And Methods For A Large Object Infrastructure In A Database System"

Various embodiments of the present invention are direct to the utilization of Blob Handles (BHs) (item 300) which are an internal representation of a large value. BHs are immutable and stateless.references to a large data object. The structure of a BH (item 300) contains enough information to return an ILockBytes in...

"Efficient Coding Of Digital Media Spectral Data Using Wide Sense Perceptual Similarity"

Traditional audio encoders may conserve coding bit-rate by encoding fewer than all spectral coefficients, which can produce a blurry low-pass sound in the reconstruction. An audio encoder using wide-sense perceptual similarity improves the quality by encoding a perceptually similar version of the omitted spectral co...

"Background Transcoding"

A system and methods are described for transcoding media content in the background on a source computer device prior to such time as a target media playback device is connected to the source computer for synchronization of the media content. The system and methods anticipate which media content to background-transc...

"Camera Pen Tip Mapping And Calibration"

X-y positions of a digital pen"s tip may be determined by using a calibration parameter to map the x-y positions of the respective centers of images captured by the pen"s camera. The calibration parameter may be generated by iteratively clculating estimates of the calibration parameter. Calibration input data may be...

"Positionally Encoded Document Image Analysis And Labeling."

Disclosed embodiments of the invention relates to analyzing document images, which contain positionally encoded information, such as a maze-pattern watermark, and labeling the images based on a degree to which the document"s content, such as text, occludes the position-encoding information. Depending on the degree o...

"Dispersing Search Engine Results By Using Page Category Information"

Systems and methods for dispersing search engine results by category. A search engine application queries a searchable index of document data associated with a plurality of electronic documents in response to a search request to identify one or more electronic documents having document data matching data included in...

"Content Recordation Techniques"

Content recordation techniques are described. In an implementation, a method includes querying electronic program guide (EPG) data to determine if a content item described in a recording document is available for recording. If the content item is available, a reference is added to a recording list for causing record...

"File Server Pipeline With Denial Of Service Mitigation"

A method of metering bandwidth allocation on a server using credits is disclosed. The method may receive a request for data from a client, respond to the request for data and determining if the request for data for the client exceeds a current data allocation credit limit for the client. Using the round trip time, t...

"Configuring An Ad Hoc Wireless Network Using A Portable Media Device"

A computer-readable portable media device is used for transferring network settings for an ad hoc wireless network to simply the task of configuring devices for the ad hoc wireless network. A configuration program on an initiating compurer assists a user in creating the network settings, including a security key, an...

"Query Generation Using Environment Configuration"

A query for a help system includes data about a user system and a task that the user is attempting. The query may be used by a search engine to generate relevant results to aid the user. The user system data may include configuration data about hardware and software. The task data may be derived from the current sta...

"Parallel Dll Tree Initialization"

A parallel processing method and apparatus for initializing libraries is disclosed. Libraries for an application are identified, an initialization order for the libraries is determined, and the libraries are initialized in asynchronous stages. The initialization order is determined by forming a library tree of the l...

Handling Customizable Data In Multi Tenant Data Sharing Environment"

In a multi-tenant data sharing environment with shared, customizable data attributes are assigned to requested data and stored in a cache store along with the requested data. For non-customized data designated as system data, one copy is stored in the cache store for use by multiple tenants allowing optimization of ...

"Time Management Representations And Automation For Allocating Time To Projects And Meetings Within An Online Calendaring System"

Systems and methods are provided for representing multiple tasks and their associated properties, including the time and nature of a deadline and preferences about the granularity of time for focussing on the task. This includes providing several services, including atuomated scheduling of project focus meetings wit...

"System And Method For Photo Editing"

A method and system are provided for facilitating editing of a captured photograph using a set of user interface photo interaction tools. The method includes receiving a user selection of an editing function, which may be a cropping function, through the user interface photo interaction tools. The method additionall...

"Xml Schema For Network Device Configuration"

constitution setting file is generated by using an extensible markup language (XML) schema. A wireless constitution XML schema defines a XML file for constituting wireless network setting on a wireless device. A wide area network (WAN) constitution schema defines the XML file for constituting a WAN device. A local a...

"Threshold Billing"

The present invention involves a system and method that facilitate a purchasing experience in part by consolidating any number of purchases and their respective charge amounts until the purchases or charge amounts reach a threshold level. The threshold level can be based in part on resources used (consumed or purcha...

"Differential Update For Data Broadcasting"

Systems and methods for differential updates in a data broadcasting environment are disclosed A data broadcasting system receives profile information representative of information desired by subscribers to the data broadcasting system Broadcast content may be adjusted m response to changes in the aggregate status of...

Binary Verification Service

A binary is received at a binary verification service from a binary verification client agent. The binary verification service performs binary verification of the binary, wherein binary verification includes determining whether the binary is complicit with a set of usage rules. The binary verification service sends ...

Enabling Recording And Copying Data

A data encryption key may be generated for encrypting data content. The data encryption key includes multiple portions. For example, the data encryption key may be generated by combining a drive seed and a media seed where the drive seed includes a value that is unique to the drive reading data content or a group of...

Transactional Memory Using Buffered Writes And Enforced Serialization Order

Various technologies and techniques are disclosed that support buffered writes and enforced serialization order in a software transactional memory system. A buffered write process is provided that performs writes to shadow copies of objects and writes content back to the objects after validating a respective transac...

"Automatic Configuration Of Transaction Based Performance Models"

The described systems, methods, and data structures are directed at automatic configuration of transaction-based performance models. Models of an infrastructure are created and automatically configured using data provided by existing management tools that are designed to monitor the infrastructure. These automatical...

"Digital Photography With Flash/ No Flash Extension"

A system and method for improving digital flash photographs. The present invention is a technique that significantly improves low-light imaging by giving the end-user all the advantages of flash photography without producing the jarring look. The invention uses an image pair - one taken with flash the other without ...

"System And Method For Optimized Property Retrieval Or Stored Objects"

A system and related techniques generate an interrogation request from an initiator device, such as a client desktop machine or other machine, to a mobile or other media player, such as a digital camera, MP3 player, video camera or other device or hardware to enumerate the media content contained in that device, alo...

"System And Method For Determining Display Differences Between Monitors On Multi Monitor Computer System"

A system and method for determining differences and other conditions on a multi-monitor system is provided. A first line is displayed across two monitors. A user aligns one segment of the line on one monitor with the other segment. A second line is displayed across the monitors, parallel to the first. The user then ...

"Partially Materialized Views"

Partially materialized views in the field of database systems are described herein. A method of partially materializing a view computed from one or more source tables comprises generating a view definition including a query expression and at least one control predicate referencing at least one control table. The que...

Contextually Relevant Functionality Controls

An improved user interface is provided for displaying selectable functionality controls that identifies the context of the object to which the user interface is relevant, which contains rich functionality controls for applying contextually relevant functionality to a selected object, and which may be efficiently swi...

System And Method For Generating Selectable Extension To Media Transport Protocol

A protocol and related techniques and platforms allow vendors to selectably extend the Media Transport Protocol (MTP), or other defined protocols to implement vendor-specific commands, data fields, instructions and other extension sets. According to embodiments of the invention in one regard, one or more extension s...

"An Improved User Interface For Displaying Selectable Software Functionality Controls That Are Relevant To A Selected Object"

An improved user interface is provided for displaying selectable software functionality controls that are relevant to a selected object and that remain visibly available for use while the selected object is being edited. Upon selection of a particular object for editing, functionality available for editing the objec...

"Structured Communication Using Instant Messaging"

The present invention uses instant messaging to effectuate structured communication. A structured communication component is used in conjunction with an instant messaging component to allow an instant messaging user to quickly formulate a structured communication for transmission to one or more recipients. The recip...

"Remote File Updates Through Remote Protocol

An improved remote protocol enables efficient and reliable updating of files on a remote server. A gather-copy extension to a remote protocol enables a client to instruct a server to gather portions of data from an existing source file on the server and to copy those portions of data to appropriate offsets within a ...

"Cross Application Geocoding User Interface"

The invention is relates the system for cross-application geo-coding, comprising: a component for authoring mutual hyperlinking and method for cross-application geo-coding, comprising: receiving a mutual hyperlink; and inserting geo-coding information in the mutual hyerlink.

"A System And Method For Binding A Subscription Based Computing System To An Internet Service Provider"

A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any reques...

"Interactive Ticker"

An interactive ticker is described. In embodiment(s), an interactive ticker can be displayed to include selectable ticker data that can be selected by a viewer. The interactive ticker can be displayed over and/or with television media content that is also being displayed for viewing. In addition, a control input can...

"Aligning Video Data To Create A Comprehensive Program Guide"

Providing content listings for digital television broadcasts. A computing device matches digital broadcast television channel data (e.g., call signs or broadcast frequencies) with analog broadcast television channel data to create a list of mapped channels. The computing device creates a program guide for the digita...

"Methods And System For Constructing And Editing Electronic Program Guide Lineups"

Various embodiments provide accurate EPG lineup construction and PVR scheduling for users, regardless of their geographic location. In accordance with the described embodiments, the guide retrieves and aggregates data from multiple available sources, particularly in-band scanning and EPG metadata download. Services ...

"Reader Application Markup Language Schema"

The subject invention provides a system and/or method that facilitates executing a Radio Frequency Identification (RFID) process by employing a reader application markup language (RAML) schema that provides a portable format to setup and deploy such RFID process. A schema component can receive RFID data relating to ...

"Query Graphs"

The present invention leverages query-related information based on a query and/or a search intention to provide a systematic means to facilitate a user in locating desired information despite lacking exact search parameters. This allows users to find information without first formulating an optimum search query. The...

Declaratively Defined Control Actions

An extensible control design framework is utilized to declaratively define a control (both visual and non-visual) and other components. The functionality of a control may be expanded by declaratively adding behaviors and semantics via an object called an action. The control does not become unduly complex by the addi...

Extensible Visual Effects On Active Content In User Interfaces

Methods and systems for applying visual effects to active content, such as buttons, comboboxes, video, edit fields, etc., wherein interactivity of the active content are retained thereafter. Also, the present disclosure provides a mechanism for developers to build new visual effects and have them applied to active c...

"Efficiently Ranking Web Pages Via Matrix Index Manipulation And Improved Caching"

A remote control apparatus for a light vehicle wherein a reception unit (227) for receiving a signal from a normal portable transmitter (226) carried by a vehicle user is disposed on a light vehicle in which an accommodating box (30) is disposed below a riding seat (31) mounted for opening and closing movement and, ...

"Deploying And Receiving Software Over A Network Suceptible To Malicious Communication"

Systems and/or methods that enable secure deployment and/or receipt of an operating system and updates for the operating system to a bare computer across a network susceptible to malicious communication are described. These systems and/or methods can, in one embodiment, securely deploy an image having an operating s...

Virtual Machine Migration

Virtual machine migration is described. In embodiment(s), a virtual machine can be migrated from one host computer to another utilizing LUN (logical unit number) masking. A LUN of a storage array can be mapped to a virtual drive of the virtual machine. A LUN mask that associates the LUN with a first host computer of...

"Dynamically Loading Scripts"

The present invention extends to methods, systems, and computer program products for dynamically loading scripts. Web pages can include references to script loaders that control the loading of other scripts at a Web browser. A script loader can load scripts in accordance with script loading rules that override the d...

"Distributed Behavior Controlled Execution Of Modeled Applications"

The present invention extends to methods, systems, and computer program products for distributed behavior controlled execution of modeled applications. Embodiments of the invention facilitate the interoperation of a central data store along with various peer-to-peer functionalities. Thus, distributed applications ca...

"Securely Publishing User Profile Information Across A Public Insecure Infrastructure"

The present invention utilizes existing encapsulation or encoding mechanisms for embedding user profile information in electronic messages. Such information may then be distributed amid a community of users for which an individual, organization or other entity interact. The present invention takes advantage of hidde...

"Flick Gesture"

A system and method for determining whether a flick gesture has occurred is described. A flick gesture is a simple gesture that may be easily detected and is characterized by minimal interference with other applications or gestures.

"Identifying And Correlating Electronic Mail Messages"

Technologies are described herein for identifying and correlating e-mail messages. The contents of the subject and recipients fields of e-mail messages received at and sent from a computing system are hashed and stored in a database. When an incoming e-mail message is received at the computing system, the contents o...

Iteratively Locating A Position Corresponding To A Desired Seek Time

ITERATIVELY LOCATING A POSITION CORRESPONDING TO A DESIRED SEEK TIME Techniques enable locating a position within a file that corresponds to a desired seek time without having access to an index specifying the desired seek time"s position. An iterative process may be used to estimate the position that corresponds t...

"Efficient White Listing Of User Modifiable Files"

A system and method for efficiently determining that a received file is not malware is presented. In operation, when a file is received at a computing device, an evaluation is made as to whether the file includes user-modifiable, or superficial, data areas, i.e., areas of the file that by their nature do not typical...

"Message Passing Processor"

A processor designed to directly execute machine code that is based on the asynchronous pi-calculus is disclosed Such a processor may be an element of a multi-processor system that aims to provide a scalable, loosely-coupled architecture for executing programs based on the pi-calculus

"Updating Software While It Is Runing"

To avoid extensive time during which servicing of clients" requests is stopped for updating a piece of software or a data structure, various embodiments of the invention update an instance of the piece of software or an instance of the data structure instead of updating the original piece of software or the data str...

"Securing Lightweight Directory Access Protocol Traffic"

Lightweight directory access protocol (LDAP) management is described. In an implementation, a method includes intercepting data, configured according to a lightweight directory access protocol (LDAP), for communication between a client and a server. One or more polices are applied to the data to determine whether pe...

"System And Method For Providing A Geographic Search Function"

A system and method are provided for implementing a geographic search mode in connection with a search engine. The method may include indexing geographic locations for resources available to the search engine in a search engine index. The method may additionally include determining a target location for a particular...

"Method And System For Distributing Security Policies"

A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rule...

Extensible Mechanism For Object Composition

An extensible framework for object oriented programming comprises a reception component that receives a customized strategy relating to composing a target object. An implementation component automatically implements the customized strategy to compose the target object based at least in part upon context associated w...

Providing Relevant Text Auto Completions

A processing device, such as, for example, a tablet PC, or other processing device, may receive non-textual language input. The non-textual language input may be recognized to produce one or more textual characters. The processing device may generate a list including one or more prefixes based on the produced one or...

"Peer To Peer Collaboration System With Edge Routing"

A peer-to-peer collaboration system in which changes to a shared space may be broadcast to all of the peers in a collaboration session using messages sent with a combination of addressing techniques. Messages may be addressed for direct peer-to-peer transmission, indirect transmission through another peer or indirec...

"Techniques To Manage Facsimile Communications"

Techniques to manage facsimile communications are described. An apparatus may comprise a facsimile device having an assigned access number, and a call terminal having the assigned access number and a facsimile control module, the call terminal to establish a call connection in response to a call request with the acc...

"User Authentication By Combining Speaker Verification And Reverse Turing Test"

Methods and system for authenticating a user ere disclosed The present invention includes accessing a collection of personal information related to the user The present invention also includes performing an authentication operation that is based on uhe collection of pergonal information The authentication operation,...

"A System And Method For On Line And Off Line Advertising In Content Delivered To A Display Screen"

An on-screen advertising system that employs paginated on-screen pages that adapt based on display and window size and allow for the anchoring and sizing of advertisements based on a given relative paginated page size. Content is reflowed to fit the advertisements

"Speech Recognition Macro Runtime"

The disclosed speech recognition system enables users to define personalized, context-aware voice commands without extensive software development. Command sets may be defined in a user-friendly language and stored in an extensible Markup Language (XML) file. Each command object within the command set may include one...

"Parsing Hierarchical Lists And Outlines"

A system and method for determining hierarchical information is described. Aspects include using the Collins model for parsing non-textual information into hierarchical content. The system and process assign labels to lines that indicate how the lines relate to one another.

"Method And System For Caching Remote Files Locally"

A method and system for caching remote objects locally. A request to access an object is received. A determination is made as to whether the object is cached. If the object is cached and the request is not to create a new object, modify an existing object, or open a directory, the request is directed to a local file...

"Dynamic Content Change Notification"

A content page is configured by a user and located on a network. Changes made to the content page are automatically communicated with notifications to a group of contacts for the user. Only contacts with permission to view the content page, or the changed content, will receive the notification and have permission to...

"System And Method For Customization Of Search Results"

A system and method are provided for customizing search result descriptions for results returned by a search engine. The search result descriptions may be obtained through a search over a computer network. The system includes a search result description request component for enabling selection of particular data for...

"Mechanism For Binding A Structured Data Protocol To A Protocol Offering Up Byte Streams"

A mechanism for sending structured data using a corresponding byte stream. Upon accessing structured data such as a Simple Object Access Protocol (SOAP) envelope, a byte stream is generated. The byte stream includes bytes that represent the structured data, as well as a collection of bytes that represents properties...

"Message Exchange Protocol Extension Negotiation"

A mechanism for negotiating a relatively transport agnostic communication protocol for use in accomplishing a distributed activity. The potential protocols subject to negotiation may be, for example, extensions to Web Services Coordination. In that case, when the initiator creates a transaction, the initiator also n...

"Method, System, And Computer Readable Medium For Applying A Global Formatting Scheme To A Chart In An Electronic Document"

A method, system, and computer-readable medium are provided for applying a global formatting scheme to a chart in an electronic document. According to a system, a chart application program receives a selection of a chart object in the electronic document and a document theme. The document theme includes a combinatio...

"Camera Lens Shuttering Mechanism"

A camera lens shuttering mechanism includes an image conducting unit disposed within a shutter housing when the camera is in a closed position so that the camera cannot record images. When moved to an open position, the shutter housing does not block the image conducting unit from imaging objects. The image conducti...

"File Formats, Methods, And Computer Program Products For Representing Documents"

File formats, methods, and computer program products are provided for representing a document in a modular content framework. The modular content framework may include a file format container associated with modular parts. A file format includes logically separate modular parts that are associated with each other by...

"Server Queuing System And Method"

A queuing server is used for reliable message transport, where one subsystem desires to execute one or more ordered operations asynchronously. Messages are sent to the queue in groups, which may have one or more messages. Messages within a particular group are processed in a predetermined order. Optionally, groups o...

"Method And Computer Readable Medium For Verifying And Saving An Electronic Document"

A method and computer-readable medium are provided for saving the contents of a memory structure stored in a volatile memory. According to the method, corrupted portions of the memory structure are identified and an attempt is made to repair these portions. If the corrupted portions cannot be repaired, the saving of...

"System And Method For Interactively Linking Data To Shapes In A Diagram"

A facility for linking data from an external data source to shapes in a diagram is provided. The facility is implemented as a component of a graphical visualization program, and provides a modeless data window that is operable to display data from a data source through a two dimensional table. Users can use the faci...

"Method And Apparatus For Evaluating Aspects Of A Web Page"

An automated method is provided for evaluating the validity of links included in a web page. The web page may contain commands, such as dynamic HTML or other embedded commands, which are configured for execution upon the occurrence of an event, such as a provision of input by a user. According to one embodiment, the...

"Synchronizing Contents Of Removable Storage Devices With A Multimedia Network"

Methods, systems, and engines are presented for synchronizing contents of removable storage devices with a multimedia network. In one implementation, a change in status of a connection between a removable storage device and a multimedia network is detected. A network inventory list of recordings is updated, triggere...

"System And Methods For Inline Property Editing In Tree View Based Editors"

A system and method directed to inline property editing for tree view based editors is provided. A user selects a desired node within a tree view and then hover the mouse cursor over the node causing a smart tag anchor to appear. When the use clicks on the smart tag anchor an object property panel appears injected i...

"Systems And Methods For Validating Executable File Integrity Using Partial Image Hashes"

Systems and methods for validating integrity of an executable file are described. In one aspect, multiple partial image hashes are generated, the combination of which represent a digest of an entire executable file. Subsequent to loading the executable file on a computing device, a request to page a portion of the e...

"Use Of Separate Control Channel To Mitigate Interference Problems In Wireless Networking"

Described is a system and method for transporting interference-related control data and other information between nodes in a wireless network, using a control channel that is distinct from a content channel used to transport content.The control channel may be a different channel in the same unlicensed band as the co...

"Extensible Framework For Mitigating Interference Problems In Wireless Networking"

Described is an architecture comprising a flexible and extensible framework embodied in a robust coexistence service that couples sensed RF spectrum (interference) data to modules that process the data into dynamic feedback information used to mitigate network communication problems caused by the interference. Via a...

"A Method For Generating An Avatar And A System Thereof"

Racing-based computer games typically include a mode in which one or more human players can compete against one or more computer-controlled opponents. For example, a human player may drive a virtual race car against a computer-controlled virtual race car purported to be driven by Mario Andretti or some other race ca...

"Personal Media Channel"

Exemplary systems, engines, and methods allow a multimedia service subscriber to upload personal media content to a multimedia service. The personal media content is then distributed to selected recipients over a personal media channel that is offered only to the selected recipients.

"Object Model Tree Diagram"

A designer tool that facilitates design of an object model. The tool takes as input a computer-readable representation of a graph of objects {e.g., classes), and creates automatically one or more diagrams that depict these classes as editable trees showing their relationships and properties. These graphs naturally h...

"Use Of Frame Caching To Improve Packet Loss Recovery"

Various new and non-obvious apparatus and methods for using frame caching to improve packet loss recovery are disclosed. One of the disclosed embodiments is a method for using periodical and synchronized frame caching within an encoder and its corresponding decoder. When the decoder discovers, packet loss, it inform...

"A Method For The Control Unit To Produce Routing Information"

A routing and bandwidth allocation system that maximizes network throughput while maintaining global fairness in the sharing of network resources. From gathered global network information, routing tables and bandwidth allocation policies are computed for routers (110- 118). In some embodiments, the computations invo...

"Application Programming Interface For Administering The Distribution Of Software Updates In An Update Distribution System"

An application programming interface (API) for administering the distribution of software updates on an update service node is presented. The API provides a plurality of interface calls through which an administrator can establish rules by which software updates available to the update service node are distributed. ...

"Data Communication Coordination With Sequence Numbers"

Described are sequence numbers for client-server communication, to control a client"s use of server resources. A server grants the client credits, and the client consumes a credit for sending each command to the server. Each credit corresponds to a sequence number, with the set of sequence numbers forming a valid co...

“Method And System For Accessing A File From File Server”

Described is a data communication protocol, in which a client and server negotiate in a manner that does not require the client to retry negotiation when servers are not capable of the client-desired protocol. In one example implementation, the desired protocol is SMB 2.0 or greater. The protocol describes a create ...

"A Data Mapping System And Method Thereof"

Prior to searching a multidimensional feature space populated with data objects, each dimension in the feature space is divided into a number of intervals. When a query is received, a single interval that is overlapped by the query is selected from each dimension. A reduced set of data objects is then selected that ...

"Ultra Wide Band Power Save"

A network node selects a "sleep" level based on its current or projected battery capacity. In an embodiment of the invention, sleep levels define the types of communication to which the node in question will be a party and the physical radius within which the wireless network node will engage other devices. The node...

"Energy Detection Receiver For Uwb"

The receiver portion of a UWB wireless device is altered by replacing analog-to-digital circuitry with a simple energy detection circuit. In embodiments of the invention, the coding methodology of a transmitter is altered to support the simplified receiver configuration. For example, instead of coding the data to be...

"System And Method For Gathering And Reporting Screen Resolutions Of Attendees Of A Collaboration Session"

A screen resolution information gathering and reporting system allows access to screen resolution Information of attendees of a collaboration session. When attendees first join the collaboration session, each attendee"s screen resolution information is gathered. The collected screen resolution information is then pr...

"Diagrammatic Access And Arrangement Of Data"

Customizable data diagrams are provided by a data diagram software facility. The facility receives a reference to a multidimensional data set on which to base an initial data diagram. Based, at least in part, on this information, the facility generates a data diagram providing a graphical representation of nodes cor...

"Type Checking System And A Method Thereof"

A representation of types, type-checker, and compiler are provided for checking consistency in various forms of an iniermediaie language Type-checking a programming language in a compiler is accomplished by taking one or more rule sets as input to a type checker, which selects one or more of the rule sets based upon...

System And Method To Lock Tpm Always 'On' Using A Monitor

A computer may be secured from attack by including a trusted environment used to verify a known monitor. The monitor may be used to determine a state of the computer for compliance to a set of conditions. The conditions may relate to terms of use, such as credits available for pay-per-use, or that the computer is ru...

Xml Specification For Electronic Data Interchange (Edi)

Extensible Markup Language (XML) specification for transforming electronic data interchange (EDI) transactions. A collection of EDI data is received in a batch. The batch of EDI data includes a plurality of EDI documents and each of the plurality of EDI documents has at least one EDI transaction corresponding to a t...

"Techniques For Managing Dual Channel Wireless Devices"

Techniques for managing dual-channel wireless devices are described. A dual-channel wireless device may comprise a first transceiver operative to communicate control information over a data channel using a packet-switched network. The dual-channel wireless device may further comprise an enhanced call module communic...

Security Tokens Including Displayable Claims

A system for providing a digital identity includes a claims transformer programmed to generate a security token including a computational token and a display token, the computational token including one or more claims associated with an identity of a principal, and the display token including display information abo...

Dynamically Repositioning Workflow By End Users

Systems and methods that dynamically reset a workflow state by employing a dynamic state manager that is external to the workflow, and enables interaction of a host with a workflow instance. An event driven workflow or state machine workflow can be supplied, wherein ad hoc events are employed to reset and manipulate...

Multi Jurisdictional Payroll Requirements

ABSTRACT Payroll requirements are compiled from a plurality of jurisdictions. A plurality of payroll codes are cataloged that are required in one of the plurality of jurisdictions. A user representation includes the plurality of payroll codes. An implementation representation of calculating pay is formed. The imple...

Multi Dimensional Aggregation On Event Streams

ABSTRACT Multi-dimensional aggregation on event streams for generating reports based on metadata about what events are available. An aggregation definition tool receives the event stream and, responsive to user input, identifies events of interest and specifies a correlation pattern for defining activities from the...

Alternative Graphics Pipe

ABSTRACT Various technologies and techniques are disclosed that improve the operation of accessibility applications. A graphics pipe is provided that can be called in user mode from multiple accessibility programs. A request is received from an accessibility application to access the graphics pipe, and a connection...

Flexible Display Translation

A user interface for displaying source data and a translated copy of a segment of the source data is provided. The user interface includes a first display portion for displaying at least a subset of the source data on the display. The user interface includes a second display portion for displaying a translated copy ...

Object Model On Workflow

Systems and methods that objectify view of workflows and management behavior via an access component that supplies access to the real workflow instance. The subject innovation enables custom features to be defined for interaction during run time. For example, custom features {e.g., strongly typed workflow) can inclu...

Multiple Concurrent Workflow Persistence Schemes

Systems and methods that supply workflow management and workflow interaction with a plurality of persistence stores via employing a routing persistence service and an association lookup component. The routing persistence service routes and/or assigns each workflow instance to a corresponding persistence store, and t...

Peer To Peer Remediation

A network in which peer-to-peer remediation is provided to keep clients in the network up-to-date. As network clients establish peer-to-peer connections, they exchange status information. The status information allows the clients to mutually identify whether one client is more out-of-date than another. The more up-...

"Active Speaker Identification"

Procedures for identifying clients in an audio event are described. In an example, a media server may order clients providing audio based on the input level.  An identifier may be associated with the client for identifying the client providing input within the event. The ordered clients may be included in a list whi...

"Visual Feedback Display"

Visual feedback may be provided. First, a continuous contact with a first point on a surface may be detected. The surface may comprise, for example, a touch screen or a toucn pad. The continuous contact may be caused by a selecting element comprising, for example, a stylus or a digit of a subject. Then a menu may be...

"Multiple User Authentications On A Communications Device"

A communications device provides a biometric reader to authenticate users onto the communications device based on a single biometric input. The communications device maintains a local copy of the strong authentication credentials, such as a user identification and password, and the biometrics which were previously ...

Advertising Keyword Cross Selling

Seed keywords are leveraged to provide expanded keywords that are then associated with relevant advertisers. Instances can also include locating potential advertisers based on the expanded keywords. Inverse lookup techniques are employed to determine which keywords are associated with an advertiser. Filtering can th...

Discovery Of Network Nodes And Routable Addresses

Systems and related methods for discovering network nodes and routable addresses include a scan server, local link segment, an agent coupled to the local link segment, and a router coupled to place the scan server in communication with the agent. The scan server commands the agent to discover a network node coupled ...

Triggerless Interactive Television

TRIGGERLESS INTERACTIVE TELEVISION Various technologies and techniques are disclosed that relate to providing interactive television by synchronizing content to live and/or recorded television shows. Content is synchronized without the use of in-band triggers. A broadcast stream is received, and search/action pairs...

Device Provisioning And Domain Join Emulation Over Non Secured Networks

Proxy service that enables a domain join operation for a client over a non-secure network. The join operation is achieved with minimal security exposure by using machine identity information rather than user credentials. The proxy only uses permission associated with adding a new machine account to the enterprise di...

Mechanisms To Conceal Real Time Video Artifacts Caused By Frame Loss

The claimed subject matter provides systems and/or methods that facilitate describing, communicating, utilizing, etc. a frame dependency structure in connection with real time video communication.  For example, a protocol can be employed to communicate the dependency structure from a sender to a receiver. More...

Increasing File Storage Scale Using Federated Repositories

A storage management system using federated repositories directs content to child repositories in a hierarchical structure. A service for managing the storage maintains a list of active and historic repositories and routing of the content for storage is performed based on a file plan that includes the structure of t...

"Graphical Tile Based Expansion Cell Guide"

A discovery interface facilitates the selection of available media content. Content-relevant graphical tiles are displayed in strips within the discovery interface. In this manner, a user can survey graphics associated with available content. When the discovery interface section (e.g., a row) is in focus, the graphi...

"Unified Rules For Voice And Messaging"

The claimed subject matter provides a system and/or a method that facilitates managing an incoming data communication in connection with unified communications. A unified communications component can employ unified communications for a data communication with at least the following data communication modes: an email...

Method For Processing Video Data

Methods and systems for protecting data that is intended for use and processed on video or graphics cards are described. In various embodiments, data that is intended for use by a video card can be encrypted such that aby time the data is provided onto a bus (e.g. a PCI or AGP bus) between the video card and the co...

"A System For Facilitating Integrity Of Assemblies"

A system for facilitating integrity of assemblies that prevents unverified assemblies employed by applications from executing on the hardware electronic device, the system comprising; a memory (220), interface (132, 133, 134), a processor (200), characterized by, a manifest(42,72,94) that contains a list of modu...

"A System For Facilitating Secured Name Spaces Of Assemblies"

A system for facilitating secured name and spaces of assemblies employable by application programs at runtime, the system comprising a memory (122), interface (132, 133, 134), a processing unit (121), characterized by a digital signature component (265) that provides a manifest within an assembly with a public key a...

"Global Localization By Fast Image Matching"

An efficient technique is provided for determining a portion of a document corresponding to a captured image. Areas of a document in which the pattern is at least partially obscured are identified. A reference pixel in the image is selected, and an offset between the pixel and the pattern is determined. A pixel-by-p...

"Multi Layer Graphical User Interface'

A multi-layer graphical user interface provides multiple types of information in at least two layers of a common display space, such as a window. In one implementation, a shared network folder includes two layers of display objects to separately represent files contained in the folder and users with whom the folder ...

Secure Hierarchical Namespaces In Peer To Peer Networks

A method and data structure are provided that enables name resolution via a hierarchical or chained lookup of delegated authorities independent of requiring IP address of delegated authorities. In an embodiment, the method provides for lookups by first generating cryptographic keys associated with a namespace An au...

"A System And Method For Image Coding Employing A Hybrid Directional Prediction And Wavelet Lifting"

A system and method that provides an efficient scheme to code images and video by exploiting spatial correlations within an image by employing hybrid directional prediction and lifting wavelet techniques.

A Method Of Adjusting Image Data For Rasterizing An Image On A Display Device

N/A

"Colorized Template Previews"

Methods and systems are provided for generating colorized previews of selected document templates. Upon selection of a desired color scheme, each document template represented by a collection of displayed document template previews is colorized according to a user-selected color scheme to provide the user with a pre...

Enabling Network Devices Within A Virtual Network To Communicate While The Network Communications Are Restricted

A system and method for enabling a network device to resume network activities in a secure manner on a communication network when network activities are generally blocked by protective security measures implemented by network security modules is presented. During its periodic update request, a network security modul...

Transferable Restricted Security Tokens

In a web-based service environment, third party providers need to have varying degrees of access to user data for their complementary services. To prevent third party providers from having broader access than necessary or not adequate levels of access, transferable restricted security tickets are employed to determi...

"System And Method For Creating, Managing And Using Code Segments"

A code segment and elements of information (e.g., meta information) associated with the code segment are encoded in an XML file. One or more encoded code segments are saved within a library of encoded code segments. An encoded code segment may be selected and inserted into source code file. When the encoded code is ...

"Hardware Enhanced Graphics Acceleration Of Pixel Sub Component Oriented Images"

Hardware acceleration of the rendering and animation of characters that treat each pixel sub-component as a distinct luminance intensity source. A bit-map representation of the sub-component-oriented character is generated by using a single image sample to generate each pixel sub-component. This may be accomplished ...

Staged, Lightweight Backup System

A restore system may perform a two staged restore operation. The first operation may restore system state and basic operational data to a system sufficient that the system may begin performing a set of basic operations. The second operation may restore secondary data over a period of time while the system is at leas...

"Enforcing Rights Management Through Edge Email Servers"

The present invention provides for methods, systems, and computer program products for ensuring that sensitive subject matter within electronic messages is not inappropriately transferred between domains with differing security rights. The present invention utilizes the appropriate placement of message transfer agen...

"Method And System For Improved Electronic Task Flagging And Management"

An improved method and system are provided for creating tasks and for inputting information associated with created tasks according to an electronic task management application or system. Electronic correspondence items may be flagged as tasks. Upon flagging an individual electronic correspondence item, a correspond...

"Matching Digital Information Flow To A Human Perception System"

A method and system for matching digital information flow to the human perception system. In various embodiments, multi-monitor (multimon) support is leveraged to take advantage of multiple windowing and window positioning to separate elements of different tasks into information planes (which are based on a concept ...

"Systems And Methods For Providing Intermediate Targets In A Graphics System"

Systems and methods for utilizing intermediate target(s) in connection with computer graphics in a computer system are provided. In various embodiments, intermediate memory buffers in video memory are provided and utilized to allow serialized programs from graphics APIs to support algorithms that exceed the instruct...

"File System Shell"

A file system shell is provided. One aspect of the shell provides virtual folders (615-655) whicll expose regular files file and folders users in different views based on (heir metadata instead of the actual physical underlyinj; file system structure on the disk. Users are able to work with the virtual folders thro...

Reinforced Clustering Of Multi Type Data Objects For Search Term Suggestion

System and method for related term suggestion are described. In one aspect, Relationships among respective ones of two or more multi-type data objects and identified. The respective ones of the multi-type data objects includes at least one objects of a first type and at least one objects of a second type that is dif...

"System And Method To Associate Content Types In A Portable Communication Device"

A system and or/methodology that facilitates organizing content on a portable communications device to generate a compilation (e .g ., presentation) containing the organized content. The system and/or methodology includes an authoring component that associates content of a first type with a subset of other content a...

Processing Collocation Mistakes In Doucuments

A sentence is accessed and at least one query is generated based on the sentence. At least one query can be compared to text within a collection of documents, for example using a web search engine. Collocation errors in the sentence can be detected and/or corrected based on the comparison of the at least one query a...

"Reducing Storage Requirement For Route Information'

A communication system of a proxy node receives a request sent from a source endpoint to a destination endpoint during a dialog. The request includes route information that identifies a path of nodes through which a request from the destination endpoint to the source endpoint is to travel after arriving at the proxy...

Instant Messaging Object Store

A method includes receiving a name associated with a user on a remote computer, the name including location data and a hash value uniquely associated with a data object representing the user and retrieving the data object from one of a local cache based on the hash value or a location identified by the location data...

"Method And Computer Readable Medium For Consistent Configuration Of Language Support Across Operating System And Application Programs"

A method and computer-readable medium are provided for consistent configuration of language support between an operating system and application programs According to the method, an integrated process is provided for receiving and implementing one or more language settings for an operating system and one or more lang...

Counterfeit And Tamper Resistant Labels With Randomly Occurring Features

Techniques are disclosed to enable utilization f randomly-occuring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determined the labes' features. The informati...

"Content Distribution Using Network Coding"

A method of performing stretch-driven mesh parameterization. A method of performing stretch-driven mesh parameterization comprising, computing a spectral analysis to parameterize a mesh, and iterating a stretch optimization calculation to further optimize the initial parameterization

"Methods And System For Caching And Synchronizing Project Data"

Methods and system are provided for intelligently managing project data in a project management application. According to various aspects of the invention, project management data may be loaded and saved to a local cache of a client computer, such as a hard disk cache. The invention also provides a mechanism for red...

"Caching Data For Offline Display And Navigation Of Auxiliary Information"

Described is a system and system by which application programs provide data to auxiliary display device for display, including at times when the main computer system is powered down. The cache maintains the user data in association with structured navigational information, to allow navigation within the data via the...

Utility Object For Specialized Data Entry

An object associated with one or more controls in a software application. An object associated with a control determined the operation of the data entry user interface when the data entry user interface is being employed to enter data into that control. More particularly, the object may communicate interface charact...

System And A Method For Presenting Related Items In A Data Store To A User

1. A computer system for presenting related items in a universal data store to a user, the system comprising: a universal data store containing a plurality of items stored in accordance with a universal data schema and containing relational information corresponding to at least a portion of said plurality of items, ...

"Registration Identifier Reuse"

A facility for generating and using a unique identifier as a key to identify a unique user agent instance among multiple user agents of the same user is provided. The facility generates an identifier for a first user agent instance, which is an instance of a user in an application instance. The facility uses the ide...

"System And Methods Providing Enhanced Security Model"

The present invention relates to a system and methodology to facilitate security for data items residing within (or associated with) a hierarchical database or storage structure. A database security system is provided having a hierarchical data structure associated with one or more data items. The system includes a ...

"Machine Learning"

An automated response system (e.g., an automated voice response system) may employ learning strategies to develop or improve automated response capabilities. Learning strategies may include using communications(e.g., utterances, text messages, etc.) of one party in a conversation (e.g., a customer service agent) to ...

"System And Method For Intra Package Delta Compression Of Data"

A system and method for providing file data, such as a set of files for updating a computer system, in a self-contained package, in which the package size is significantly reduced via delta compression. A build mechanism examines files to be distributed, and generates a self–contained package containing files an del...

"System And Method For Encoding High Density Geometric Symbol Set"

A system and related techniques provide a platform for encoding high density geometric symbol sets, for example a triangular barcode-type of encoding which may be used to encode drivers" licenses, biometric IDs, passports, or other transaction or identification media. According to embodiments of the invention in one...

User Mapping Information Extension For Protocols

A hint containing user mapping information is provided in messages that may be exchanged during authentication handshakes. For example, a client may provide user mapping information to the server during authentication. The hint (e.g., in the form of a TLS extension mechanism) may be used to send the domain/user name...

"Text Input Window With Auto Growth"

A user input panel (202)dynamically expands to accommodate user input (102), such as handwritten or keyboard input. Expansion may occur in one or two out of four possible directions, depending upon the language to be written or typed. For example, when writing English words, the input panel may expand to the right (...

"Test Automation Stack Layering"

Separation of aspects of automated testing into architectural layers enables automated testing to occur sooner and faster and to provide more comprehensive testing. A physical layer provides an object model over the user interface of an application. A logical layer provides an object model around the functions of an...

"Method And Implementation For Referencing Of Dynamic Data Within Spreadsheet Formulas"

The present invention relates to a new type of structured name within a spreadsheet program that allows users to refer to tables, columns of data within tables, headers of tables, totals from tables, PivotTables(R), and portions of PivotTable(R) data by the data"s headers. Embodiments of the present invention compri...

A System For Routing Real Time Multimedia Information

A system for efficient routing of real-time multimedia information is provided. The system efficient routes messages containing real-time multimedia information by configuring and using multi-control unit connectors (“connectors”), which are special-purpose components optimized to route messages. A computing device ...

"Systems And Methods For Implementing An Operating System In A Virtual Machine Environment"

The present include systems for and methods of implementing an operating system that is capable of ascertaining whether it is operating in a virtual machine environment and is further capable of modifying its behavior to operate more efficiently in a virtual machine environment. Embodiments of the present invention ...

"A System For Deploying An Operating System Via A Network"

Described herein is an implementation for secure deployment, over a network, of software (e.g., an operating system) and updates to a bare computer (e.g., a server), so that it is not susceptible to malicious network-based intrusion.

"Virtual Connectivity With Local Connection Translation"

A middle layer network protocol enhancement, virtual connectivity (VC) makes the network attachment point changes of local and remote peers transparent to applications that use network services. A virtual connectivity module local to each peer translates communication connection parameters from apparent to real and...

"Method And System For Creation Of Data Store"

A generic mechanism to persist data objects into databases without a fundamental dependence on the underlying data store is provided. Rather than relying on the expertise of a programmer to know what the structure of a database should look like, data types are defined and adorned by the programmer with attributes th...

Service Oriented Pipeline Based Architecture

Service-oriented systems employing pipeline architecture to accommodate third party extensions for extending existing functionality or providing additional functionality are provided. User or third party provided plug-ins are registered through metadata and executed in a pipeline along with platform operations. The ...

A System And Method For Visual Echo Cancellation In A Projector Camera Whiteboard System

A system and method for transmitting a clear image of a whiteboard work surface for remote collaboration. The image is separated into two portions; the projected image of the work surface, and the writing physically added to the whiteboard by participants. This separation allows several benefits. The bandwidth requi...

"Data Types With Incoporated Collation Information"

The subject invention pertains to a system and method of incorporating collation information into data types. In particular, the subject invention provides for parameterizing data types with collation information such that a comparison between two different collations generates a static-type error rather than a run-...

"Presenting A Merged View Of Remote Application Shortcuts From Multiple Providers"

Systems and methods for presenting a merged view of remotely installed applications to which a user has terminal server (TS) based access are described. In one aspect, a client computing device generates one or more shortcuts to one or more respective applications. Each of the applications is installed at one or mor...

"System And Method For A Software Distribution Service"

The present invention is directed to a system and method for managing software updates. More specifically, the present invention is directed to a system and method for facilitating the selection and implementation of software updates while minimizing the bandwidth and processing resources required to select and impl...

"Command User Interface For Displaying Selectable Software Functionality Controls"

An improved user interface is provided for displaying selectable software functionality controls and for presenting logical groupings of particular functionality controls associated with a selected top-level functionality. Underneath a row of top-level functionality tabs, functionalities controls associated with a g...

"Ergonomic Pointing Device"

An ergonomic pointing device receives commands from a user for controlling an electronic device. The ergonomic pointing device generally comprises a shaft, a roller, and a frame. The shaft comprises a ground spring contact and two direction-sensing spring contacts. The roller is disposed around the shaft so that the...

"Mapping Architecture For Arbitrary Data Models"

A data mapping architecture for mapping between tow or more data sources without modifying the metadata or structure of the data sources themselves. Data mapping also supports updates. The architecture also supports at least the case where data sources that are being mapped, are given their schemas predefined, and c...

"Systems And Methods For Flexible Report Designs Including Table, Matrix And Hybrid Designs"

Columns and/or rows of a report can be declaratively defined as either dynamic or static. The declarative definition can be represented by any marking. If a columns row is declaratively designated as dynamic, it remains as a single column or row to represent only the specified column or row data. Subgroups of column...

"Drill Through Queries From Data Mining Model Content"

A drill-through feature is provided which provides a universal drill-through to mining model source data from a trained mining model. In order for a user or application to obtain model content information on a given node of a model, a universal function is provided whereby the user specifies the node for a model and...

"Anomaly Detection In Data Perspectives"

The present invention leverages curve fitting data techniques to provide automatic detection of data anomalies in a "data tube" from a data perspective, allowing, for example, detection of data anomalies such as on-screen, drill down, and drill across data anomalies in, for example, pivot tables and/or OLAP cubes. I...

A Computing Device Connected To A Network Through A Wireless Device

NA

"Automated System For Content Acquisition Using A Web Portal"

Described are techniques and mechanisms that implement an automated process for content acquisition using a Web portal. The process allows a content provider to visit a location on a wide area network and interact with one or more resources to upload a document. Within the process, several tasks are automated that w...

"System And Method For Batched Indexing Of Network Documents"

A process takes advantage of a structure of a server hosting a network site that includes a change log stored in a database to batch index documents for search queries. The content of the site is batched and shipped in bulk from the server to an indexer. The change log keeps track of the changes to the content of th...

"Media Integration Layer"

A media integration layer including an application programming interface (API) and an object model allows program code developers to interface in a consistent manner with a scene graph data structure in order to output graphics. Via the interfaces, program code adds child visuals to other visuals to build up a hiera...

Method And Apparatus For Multi Sensory Speech Enhancement On A Mobile Device

A mobile hand-held device comprising: an air conduction microphone that converts acoustic waves into an electric microphone signal" an alternative sensor that provides an electric alternative sensor signal indicative of speech; and a processor that uses the microphone signal and the alternative sensor signal to esti...

Automatic Query Clustering

A computerized interface for data presentation, comprising: a property analyzer to determine an item distribution for atleast two cluster properties; and an organizer that forms new clusters based in part on the item distribution.

"Systems And Methods For Extensions And Inheritance For Units Of Information Managable By A Hardware/ Software Interface System"

By modeling real-world application objects with complex structures, behaviors, and operations described by a schema which is enforced by the hardware/software interface system, various embodiments of the present invention provide rich sub-typing filnctionality by extending Items (and Item types) using "Extensions" w...

Extensible And Automatically Replicating Server Farm Configuration Management Infrastructure

An extensible and automatically replicating server farm configuration management infrastructure is provided. A centralized configuration database stores all configuration data for the server farm. New configuration data can be added to the configuration database by extending a configuration object model without know...

Method And Systems For Asymmetric Supersampling Rasterization Of Image Data

N/A

Method And System For Protecting Data

The described embodiments relate to data security. One exemplary system includes a first component associated with data on which an action can be performed and a second component configured to perform the action on the data. The system also includes a third component configured to ascertain the action and determine,...

"Multi Image Feature Matching Using Multi Scale Oriented Patches"

A system and process for identifying corresponding points among multiple images of a scene is presented. This involves a multi-view matching framework based on a new class of invariant features. Features are located at Harris corners in scale-space and oriented using a blurred local gradient. This defines a similari...

"Systems And Methods For Providing Color Management"

Systems and methods are provided for color management in connection with a variety of computing devices having different color display characteristics. The X11 graphics platform is augmented to support color management systems, such as ICC, sRGB and scRGB, which begin and end with device dependent colors. CMYK color...

"Method, Apparatus, And Computer Readable Medium For Managing Specific Types Of Content In An Electronic Document"

A method, apparatus, and computer-readable medium are provided for managing specific types of content in an electronic document. A user interface is provided for displaying a specific type of content in a predefined area of and electronic document. The user interface includes a content region for receiving the speci...

"System And Method For Updating Files Utilizing Delta Compression Patching"

A system and method for updating one or more files on a computing device are provided. A client computing device obtains update information including an index identifying particular delta patches with specific versions of installed files. Upon selecting which of the applicable updates will be implemented, an update ...

"Communications Device Processor Peripheral"

A communications device, such as a cellphone, functions as a peripheral for a processor, such as a laptop computer. The cellphone and the laptop are directly coupled via a communications link that is not the cellular network. Audio, still images, video data, and/or user interaction options are provided to the cellp...

"System And Method For Analytically Modeling Data From Different Measure Groups Onto A Single Cube"

A system and method for analytically modeling data from different measure groups onto a single cube are disclosed. The single cube preferably includes a first measure associated with a first measure group with a first set of corresponding dimensions. The single cube preferably also includes a second measure associat...

"Method And System For Assignment Of Membership Through Script"

A method of determining membership in a group includes receiving a request to determine if an element is a member of a group. The request may be generated by a software application where the application provides at least one parameter to a script which resides external to the application. The script, along with an o...

"Generating A Two Layer Representation And A Disparity Map Of An Image"

A system and process for generating a two-layer,3D representation of a digital or digitized image from the image and a pixel disparity map of the image is presented. The two layer representation includes a main layer having pixels exhibiting background colors and background disparities associated with correspondingl...

Biometric Credential Verification Framework

Use of a biometric identification device in a client computer system to subsequently access an authentication system includes receiving biometric sample data which is digitally signed and combining the data with a user ID and PIN. This package of data is then securely transmitted to a biometric matching server to va...

Fitness Based Routing

The present invention extends to methods, systems, and computer program products for fitness based routing. Embodiments of the invention significantly improve the likelihood that routing nodes contained in routing table have adequate (or even relatively increased) ability to transfer and process messages in an overl...

"Methods And Systems For Encoding And Decoding Video Data To Enable Random Access And Splicing"

Various embodiments provide approaches that facilitate decoding in the context of video coding standards that allow for complicated dependencies among pictures of an encoded sequence of pictures. In some embodiments, the notion of a random access point or "RAP" is utilized. A random access point is effectively a loc...

"System And Method For Virtual Folder And Item Sharing Including Utilization Of Static And Dynamic Lists"

A system and method for virtual folder and item sharing including utilization of static and dynamic lists. Static and dynamic lists may be created as types of virtual folders. Virtual folders expose regular files and folders to users in different views based on their metadata instead of the actual physical underlyin...

Cross Pollination Of Multiple Sync Sources.

The present invention allows a user to synchronize a device with a least two data sources that may cross-pollinate. The user"s device is used to shuttle changes between the sources and resolves conflicts when changes are made to an item on multiple sources concurrently. The user"s device keeps track of which version...

"Micro Monitor To Monitor Database Environments"

A micro-monitor for use in the monitoring of database environments is provided. In an illustrative implementation, a micro-comprises a graphical user interface (GUI) having controls for navigation of information, controls to control database environments, a display area for displaying monitoring information about t...

"Common Query Runtime System And Application Programming Interface"

A query runtime architecture and an exemplary application programming interface suitable for the architecture are presented. The architecture inputs one or more XML queries and views and enables the queries to be translated wherein the queries and views may be run over multiple data sources of different data models....

"Web Based Data Form"

A web-based data form enables modifications made to values in the data form to be dynamically implemented in a data source Form fields of the data form are associated with items in the data source using data binding information Data from the data source is transformed into intermediate code using Extensible Styleshe...

"Hidden Conditional Random Field Models For Phonetic Classification And Speech Recognition"

A method and apparatus are provided for training and using a hidden conditional random field model for speech recognition and phonetic classification. The hidden conditional random field model uses features, at least one of which is based on a hidden state in a phonetic unit. Values for the features are determined f...

"Systems And Method For Locking And Isolation In A Storage Platform"

The sharing model for file system operations is unified with the transaction and locking model of query language statements to provide an overall framework for locking and isolation in a storage platform (308). Additionally, transactional support is provided for file system operations so that they may be executed in...

A Method Of Exposing Items To A User And System Thereof

A system and method utilizing virtual folders (fig. 3). The virtual folders expose regular files and folders to users in different views based on their metadata instead of the actual physical underlying file system structure on the disk (fig.3). The virtual folders (308) contain collections of items. The system inc...

"Shell Texture Functions"

Techniques are provided for at least modeling any one of mesostructure shadowing, masking, interreflection and silhouettes on a surface, as well as subsurface scattering within a non-homogeneous volume. Such techniques include, at least, acquiring material parameters for a material sample, determining irradiance dis...

"Framework To Enable Integration Of Anti Spam Technologies"

A method that enables multiple spam detection solutions to be deployed in a manageable and rational manner to determine if a message is spam is presented. A framework invokes anti-spam filters to analyze the message and return confidence levels of whether a message is spam. The framework evaluates the highest confid...

"Intelligent Data Broadcasting"

Systems and methods for intelligent data broadcasting techniques are disclosed. A data broadcasting system receives profile information representative of information desired by subscribers to the data broadcasting system. Broadcast content in one or more broadcast regions may be adjusted in response to changes in ag...

A Progressive To Lossless Embedded Audio Coder (Pleac) With Multiple Factorization Reversible Transform

A system and method for lossless and/or progressive to lossless data coding (e.g., audio and/or image) is provided. The system and method employ a multiple factorization reversible transform component that quantized coefficients based, at least in part, upon a mulitple factorization reversible transform. The multipl...

"Strategies For Transmitting In Band Control Information"

Strategies are described for transmitting control information from a host module to a client module. The host module transmits the control information in-band along with a stream of media content information packets. The control information can be used to govern the operation of the client module. In one case, the c...

Dynamic Instant Comments

Method for dynamically providing instant comments. A first instruction is received from a first user for activating an instant commenting tool for enabling instant commenting on a web media object on an online environment. The web media object is identified by the activated instant commenting tool in response to the...

Protection Of Software On Portable Medium

A portable rewritable medium and a method are provided for preventing unauthorized use of executable software stored on the portable rewritable medium. A portion of the software stored on the portable rewritable medium may include instructions for a processing device to determine whether execution of the executable ...

"Security State Watcher"

A security device watches over the secure functionality in a computer system. This "watcher" security device may be integrated within the computer system or may be separate from it. The security device queries the secure functionality to determine whether the state of the secure functionality is acceptable. If no ...

Dynamic Email Directory Harvest Attack Detection And Mitigation

Dynamic directory harvest attack detection and mitigation system is accomplished by altering the logic surrounding how a receiving email server enforces its email delivery rules. The email server"s assumed response to received emails is changed when it is determined that the server is under attack, thereby foiling t...

"Electronic Document Style Matrix"

A method and system for rendering electronic document objects is provided in which a style matrix holds potential attribute values, ar:d attribute references are used to address values is the style matrix. A mix of attribute references and actual attribute values may be used so make some attributes theme- and applic...

Licensing The Use Of Software To A Particular User"

The use of software is licensed to a particular user, regardless of the computing device on which the software has been launched. A computing device is logged onto a central service. The central service either directly approves the launching of the software or it provides a code to the computing device, which in tur...

"Document Stamping Antivirus Manifest"

A stamp is created and associated with a computer file. The stamp includes the address locations of data in the file that may be infiltrated by computer related viruses and/or malware. Using this stamp, an anti-virus program can identify the specific parts of the file that should be scanned for virus infection. Othe...

"Unified Messaging Architecture"

A system and/or methodology that unifies a telephonic communication component and/or system with a data (e.g., messaging) server component and/or system. The system can facilitate telephonically accessing rich information in the server (e.g., messaging server). This riclrinformation can include email content, calend...

"Simplifying Complex Characters To Maintain Legibility"

Methods, systems, and computer program products for adding hinting instructions to a sharacter in order to improve a character bitmap produced from an outline of the character at a certain size and output resolution when the character outline is scan converted. A character is retrieved to be output. A determination ...

Embedded Virtual Media

A method and an optical storage medium are provided for storing data to and accessing data from an embedded virtual medium within the optical storage medium. Information describing the embedded virtual medium may be stored on to the optical storage medium. Space for an embedded lead-in area of the embedded virtual m...

Controlling Network Access

Systems and methods for controlling network access determine that a client computer on the network is in compliance with administrator-defined network health policy standards before the client computer is granted access to the network. A packet exchange mechanism is defined wherein filtering instructions from a serv...

"Content Re Lock Control"

Content re-lock control is described. In an embodiment, restricted content is unlocked such that the restricted content can be rendered for a rendering duration. A user-selectable input is received that time-shifts the rendering duration of the restricted content, and an effective rendering duration of the restricte...

"Complex Data Access"

Methods, systems, and computer-readable media implementing various aspects of complex data in a conceptual table are disclosed which enable complex data in the form of tables to be added to a conceptual table. The complex data can map to scalar values in a plurality of data tables. Complex data may be entered via da...

"A Method And System For A Self Healing Device"

A self-healing device is provided in which changes made between the time that an infection resulting from an attack on the device was detected and an earlier point in time to which the device is capable of being restored may be recovered based, at least in part, on what kinds of changes were made, whether the change...

"Method, System, And Computer Readable Medium For The Layout Of Automatically Placed Elements And User Placed Elements In A Chart"

A method, system, and computer-readable medium are provided for determining a layout of automatically-placed elements and user-placed elements in a chart created in a chart application program. User-placed elements in the chart include chart elements that have been moved and/or resized by a user. User-placed element...

"Secured Views For A Crm Database"

The claims of the present application recite a method and system for accessing information in an otherwise inaccessible application database of a DBMS using view definitions that implement a security protocol.

"System And Method For Utilizing A Search Engine To Prevent Contamination"

A system and method are incorporated within a search engine for preventing proliferation of malicious searchable content. The system includes a detection mechanism for detecting malicious searchable content within searchable content traversed by a web crawler. The system additionally includes a presentation mechanis...

"Synchronization Of Runtime And Application State Via Batching Of Workflow Transactions"

Workflow management for maintaining consistency of persisted state across communicating components via batching of uncommitted work. A workflow component defines a workflow containing work items to be performed by service provider components. The workflow component assigns the work items to the service provider comp...

"Calendar Rule Definition, Ranking, And Expansion"

The method may include providing at least one primary calendar, providing a plurality of calendar rules, each of the plurality of rules comprising a rank and a rule-scope. The method may also include providing a representation of the primary calendar and the plurality of calendar rules, and allowing expansion of the...

"Directional Input Device And Display Orientation Control"

A computer system includes a processor creating a renderable image in a first orientation, a display showing the image in the first orientation, and a directional input device having an orientation indicator that is movable between a first position associated with the first image orientation and a second position as...

Method And System For Resizing Graphical Objects Using Force Inputs

[91] The use of pressure-sensitive controls is disclosed in which controls respond differently to different pressure applied by a stylus on a digitizer. Users interacting with displayed controls may modify the speed, increment, or other property of the control by pressing harder or softer. Devices that allow for th...

"Automatic Detection And Testing Of New Networking Connections"

A new connection wizard automatically detects available networking hardware, as well as networks that are available. The wizard then presents the user with a list of choices, i.e., different connection types that they can set up. This list of options is based on the hardware and networks that were detected initially...

"Bus Abstraction"

Systems and methodologies that facilitate a unification of bus protocols and networks via an abstraction system that can bind device models and higher level protocols to multiple bus implementations. Such abstraction system can provide a common language among buses for message transfers according to priority - e.g.,...

"Improving Touch Screen Accuracy"

A user interface is provided allowing a user to simulate mouse hovering with the user"s finger on a touch-sensitive display. When a finger or other stylus touches the touch-sensitive display adjacent to a displayed cursor, a control appears that enables the user to drag the cursor about the display by dragging the c...

"Method And System For A Target Device Display Simulation"

A method of viewing a high resolution display on a low resolution development system display for a digital device includes selecting a target device and identifying an image form for the selected device. An image form displays a realistic form of the selected target device. A form factor is selected which represents...

"Binding A Device To A Computer"

A device, such as a component or a peripheral, and corresponding computer are adapted to be bound such that the device will only operate with that computer after the binding process. Cryptographic messages are sent between the device and computer to confirm the relationship. When the device cannot confirm it is oper...

"Queued Sessions For Communicating Ordered Messages Over A Network"

Systems and methods in accordance with the present invention allow for messages to be delivered from one application to another over a network in discrete groupings or communication sessions. For example, a sending computer system sends a group of related messages to a queue at a recipient computer system. The recip...

"Integration Of A Non Relational Query Language With A Relational Data Store"

A system and/or methodology that employs a non-relational (e.g., XML (extensible markup language)) query language to access stored procedures employed in connection with relational (e.g., SQL (structured query language)) database management systems is provided. Stored procedures in SQL enable the predetermination of...

"Mediadescription Data Structures For Carrying Descriptive Content Metadata And Content Acquisition Data In Multimedia Systems"

A MediaDescription data structure that includes both descriptive metadata, such as EPG information, about a multimedia content item and instructions for acquiring the content item is assigned to each multimedia content item in a multimedia system. A MediaDescription data structure is transferable as a token for repr...

"System And Method For Query Refinement"

A method and system are provided for automatically enhancing initial search results produced by a search engine in response to a multi-word user query. The method may include implementing a result evaluation mechanism within the search engine for evaluating adequacy of the initial search results. The method may addi...

"Synchronizing Digital Media Between A Source Device And A Target Device"

A collection of digital media is stored at a source device and transferred to a target device.  A subset of the collection may be transferred based on a priority related to a points assigned by a user"s rating of particular digital media and on rules based on particular user actions.

Additional Content Based On Intended Travel Destination

When users travel to an intended destination, a plurality of information can be beneficial to assist their travel. If a person is traveling to a crowded event, then information can be provided such that congested traffic areas can be provided. There can be financial opportunities available in relation to providing i...

Reconfigurable Radio Architecture

A computing device with a software defined radio. The software defined radio has an architecture with separate components to provide control functions and data processing functions. The control components configure the data processing components so that the software defined radio provides desired operating character...

Collaborative Authoring Modes

A collaborative authoring application provides an authoring environment in which two or more users can edit a document concurrently. Each user edits a copy of the document, sends updates to a master copy of the document, and receives updates from the master copy of the document. The authoring environment may be conf...

"A System Facilitating A Computer Object Access Control"

A computer object access control graphical user interface allows a user to set computer locations where a computer object may be accessed and other users who may access the computer object. The computer object may be a computer file, a computer message, person contact information, elc. The access conlrol user interf...

Method And System For Authenticating Components Along The Paths For Processing Renderable Digital Data

Methods, systems and architectures for processing renderable digital content are described. The various embodiments can protect against unauthorized access or duplication of unprotected content (i.e. decrypted content) once the content has reached a rendering device such as a user"s computer. A flexible framework in...

Resampling And Picture Resizing Operations For Multi Resolution Video Coding And Decoding

Techniques and tools for high accuracy position calculation for picture resizing in applications such as spatially-scalable video coding and decoding are described. In one aspect, resampling of a video picture is performed according to a resampling scale factor. The resampling comprises computation of a sample value...

Fast Display Initialization And Light Up

ABSTRACT FAST DISPLAY INITIALIZATION AND LIGHT UP Described is a technology by which a computer display may quickly resume outputting video data following its awakening from a deep sleep state Displayed settings are maintained in a memory, such as a memory of the display, while the display is in a sleep state. The...

Managing User Feedback Data To Rank Search Results

ABSTRACT USING USER FEEDBACK TO IMPROVE SEARCH RESULTS The invention discloses a system and method for managing feedback data that will be used for ranking search results. The invention can aggregate a plurality of user feedback data from more than one user into a search index. The user feedback data can be associa...

Product Activation/Registration And Offer Eligibility

An offer may be provided to a user in conjunction with activating or registering a software product. A request for activation of the software product or registration of the software product may be sent to a server via a network. In response to receiving the request, the server may send an activation code to the proc...

Relevancy Sorting Of Users Browser History

Various embodiments provide a Web browser that employs a relevancy algorithm to make an educated guess as to the likelihood of a user"s intended destination when the user begins to enter text into a browser"s address bar. In one or more embodiments, the relevancy algorithm employs various parameters and assigns weig...

Federated Entertainment Access Service

This document describes tools capable of managing digital content from multiple content providers based on a user"s identity. By so doing, the tools may free people from the limitations of their storage media and devices. The tools may perform these and other actions through an indirect relationship with users, such...

Asynchronous Multi Level Undo Support In Javascript Grid

Architecture for multi-level undo on a client in grid-based applications. The architecture is a control driven cascading changes system where change tracking works seamlessly in asynchronous (and synchronous) scenarios. A client application is associated with a grid object and, instantiates and configures the grid o...

Complex Transform Channel Coding With Extended Band Frequency Coding

An audio encoder receives multi-channel audio data comprising a group of plural source channels and performs channel extension coding, which comprises encoding a combined channel for the group and determining plural parameters for representing individual source channels of the group as modified versions of the encod...

Join In Progress On Line Game Session

A computer-based, multi-player, on-line, game session is capable of being joined while the session is in progress without requiring an invitation from the host of the game session. A player can join the game session via a set of User Interfaces (UIs) provided by the gaming system. The player is not required to conta...

Block Count Based Procedure Layout And Splitting

The present invention extends to methods, systems, and computer program products for block count based procedure layout and splitting. Embodiments of the invention utilize code block counts to provide a total ordering of code blocks that improves execution time of generated procedure code by minimizing branches alon...

Quickly Providing Good Matchups

Multiplayer tournaments may be established, and then automatically executed by tournament server devices to help provide users with quality matchups against players of similar skill. Tournaments may be defined by an administrator, and then automatically instantiated any number of times to accommodate demand by playe...

Computer Hosting Multiple Secure Execution Environments

A plurality of secure execution environments may be used to bind individual components and a computer to that computer or to blind computers to a given system. The secure execution environment may be operable to evaluate characteristics of the computer, such as memory usage, clock validity, and pay-per-use or subscr...

Wireless Communications Environment Overlay

A method is provided, wherein the method comprises identifying nearby wireless communication access points (APs) to which a client computing environment can cooperate with to communicate and receive data through a subscription to a neighborcast group from indentified nearby cooperating access points such that illust...

Coexistence Tools For Synchronizing Properties Between On Premises Customer Locations And Remote Hosting Services

Coexistence tools are described for synchronizing properties between on-premises customer locations and remote hosting services. These tools may provide methods that send the tools for installation onto on-premises infrastructure located at customer sites, execute the tools to manage the customer infrastructure remo...

Orthogonal Frequency Division Multiple Access With Carrier Sense

A communication system in which an access point and one or more devices communicating through the access point adaptively apply Orthogonal Frequency Division Multiple Access (OFDMA).   The access point may assign orthogonal subcarriers to devices as in conventional OFDMA, but the access point senses activity on t...

Instantiation Of Service Application

Methods, systems, and computer-storage media having computer-executable instructions embodied thereon that, when executed, perform methods in accordance with embodiments hereof, for managing component programs within a service application according to a service model. Initially, configuration settings, which can be ...

Graphics Remoting Architecture

Systems and methods to implement a graphics remoting architecture for rendering graphics images at remote clients are disclosed. In one implementation, when a D3D application hosted on a remote server is used by a remote client, the graphics associated with the D3D application are created and rendered at the remote ...

Rfid Receiving Process For Use With Enterprise Resource Planning Systems

A Radio Frequency Identification (RFID) receiving method for use with an Enterprise Resource Planning (ERP) system is provided. The method includes reading, at a receiving point, information from RFID tags included on delivered items, which are not recorded on an Advanced Shipment Notification (ASN). An item arrival...

Dynamic Soft Keyboard

In accordance with one or more aspects of a dynamic soft keyboard, a user input is received via a soft keyboard having multiple keys. Information describing a current input environment for the soft keyboard is obtained, and a determination is made as to which one or more keys of the multiple keys was intended to be ...

Text Box Numbering And Linking Visual Aids

A graphical user interface is disclosed for tracking and managing the use of text boxes by providing visual aids that make it easy for a user to see which text boxes are linked to which as well as the order of text boxes in a linked chain The present system also makes it easy to track the creation and breaking of ...

Migrating A Virtual Machine That Owns A Resource Such As A Hardware Device

ABSTRACT MIGRATING A VIRTUAL MACHINE THAT OWNS A RESOURCE SUCH AS A HARDWARE DEVICE A computing device has first and second virtual machines (Vrms) and a resource assigned to the first VM. Each access request for the resource is forwarded thereto immotile the first VM is to be saved or migrated. Thereafter, each ac...

Permiting Multiple Tasks Requiring Elevated Rights

ABSTRACT PERMITTING MULTIPLE TASKS REQUIRING ELEVATED RIGHTS System(s), method(s), and/or technique(s) ("tools") are described that enable a user to permit multiple tasks requiring elevated rights with as little as one rights elevation. For example the tools may enable an installation wizard operating within a lim...

Document Overview Scrollbar

ABSTRACT DOCUMENT OVERVIEW SCROLLBAR A document overview scrollbar renders a miniaturized replica of an entire document. The document overview scrollbar provides an efficient and expeditious tool for searching, navigating, and/or editing documents. A visual pattern in the document is easily identifiable in the rep...

Method For Registering A Domain Name Using A Global Names Zone

[0038] A DNS server includes one or more zones that store information, such as IP addresses, associated with domain names. These zones include a global names zone that stores data correlating host names to domain names When a name query is received from a client device, the DNS server checks the global names zone ...

Pre Processing Of Image Data For Enhanced Compression

Embodiments herein provide for a pre-processing stage or mechanism for enhancing data compression of an image by splitting or separating the color channels for pixels into planar data sources. Typically, image data is displayed as an interleaved set of channel types for a color space such that each pixel within an i...

Scalable Transformation And Configuration Of Edi Interchanges

Transforming one or more of a collection of electronic data interchange (EDI) transactions. A type of EDI transactions is identified to be transformed from a source format to a destination format. The collection of the EDI transactions is received according to the source format. A particular one or more of the colle...

File Based Compression On A Fat Volume

A stapler (1) includes a body (3) and a strike plate (7) movably mounted to the body (3) between a rest position and a loaded position. The strike plate (7) is adapted to drive a staple into a target object. The strike plate (7) may be moved from the rest position to the loaded position by a loading mechanism (6) ag...

Methods And Systems For Secure User Communication

A computer system includes a security module programmed to generate a first privacy key for use with secure communications with a first web site, and a second privacy key for use with secure communications with a second web site, the first and second keys being different. The computer system also includes an identit...

Targeted Queries Using An Oma Dm Protocol

Various technologies and techniques are disclosed for extending the functionality of the Open Mobile Alliance (OMA) Device Management (DM) protocol. An addition is made to the OMA DM protocol that enables the server to specify node filtering criteria as part of a query to a target node on a mobile device to indicate...

Techniques To Generate A Visual Composition For A Multimedia Conference Event

Techniques to generate a visual composition for a multimedia conference event are described. An apparatus may comprise a visual composition component operative to generate a visual composition for a multimedia conference event. The visual composition component may comprise a video decoder module operative to decode ...

Xml Payload Specification For Modeling Edi Schemas

ABSTRACT XML PAYLOAD SPECIFICATION FOR MODELING EDI SCHEMAS Modeling an electronic data interchange (EDI) document using extensible Markup Language (XML) at runtime. A plurality of structural elements is identified in the EDI document. A plurality of corresponding data values is identified from the identified plur...

Management And Application Of Entitlements

ABSTRACT MANAGEMENT AND APPLICATION OF ENTITLEMENTS [0039] A method and system for managing and applying entitlements is described herein. An identity integration server centrally manages data associated with entitlements for a plurality of identities. The integration server may select one of a plurality of workf...

Scalable Algorithm For Sharing Edi Schemas

ABSTRACT SCALABLE ALGORITHM FOR SHARING EDI SCHEMAS Developing a file corresponding to an electronic data interchange (EDI) schema. The EDI schema is selected for transmission to a destination device. A plurality of syntax structures in the selected EDI schema is identified. The plurality of syntax structures defin...

Multi Cache Cooperation For Response Output Caching

Caching data. A method may be practiced, for example, in a computing environment including a server system that provides data to client systems. The server system includes a number of caches for storing data. The method allows a least expensive cache to first cache data or return data requested by a client. The meth...

Perceptual Image Preview

ABSTRACT PERCEPTUAL IMAGE PREVIEW Systems and methods for perceptual image preview are described. In one aspect, a naive preview image is generated by downsampling a larger image. Perceptual features of the larger image are then detected. Information associated with the detected perceptual features is then incorpor...

Speaker Authentication

SPEAKER AUTHENTICATION speaker authentication is performed by determining a similarity score for a test utterance and a stored training utterance. Computing the similarity score involves determining the sum of a group of functions, where each function includes the product of a posterior probability of a mixture co...

Multi Protocol Removable Storage Device

ABSTRACT MULTI-PROTOCOL REMOVABLE STORAGE DEVICE A removable storage device that automatically selects a communication protocol to exchange information with a host computer includes a physical layer interface, a protocol failure detection module, a connect and disconnect emulator, an insert and removal detector, an...

Adaptive Compiled Code

ABSTRACT [0060] In a managed execution environment, an error may be deferred until execution of the application, program, function, or other assemblage of code reaches a point at which calling the reference to a module associated with a missing type or type member becomes inevitable.

Command Line Pipelining

ABSTRACT COMMAND LINE PIPELINING Piping command line functions. A method may be practiced in a computing system. The method includes acts for performing functions using a single command line utility capable of performing multiple functions. The command line utility is able to accept output of the command line util...

Propagating Relevance From Labeled Documents To Unlabeled Documents

ABSTRACT PROPAGATING RELEVANCE FROM LABELED DOCUMENTS TO UNLABELED DOCUMENTS A method and system for propagating the relevance of labeled documents to a query to unlabeled documents Is provided. The propagation system provides training data that includes queries, documents labeled with their relevance to the queri...

Edi Instance Based Transaction Set Definition

ABSTRACT EDI INSTANCE BASED TRANSACTION SET DEFINITION CreatIng an electronIc data Interchange (EDI) transactIon from a descrIptIon of the EDI schema. The descrIptIon defInes the EDI schema In a non-EDI structure. The descrIptIon of the EDI schema Is receIved. A pluralIty of data unIts Included In the receIved desc...

Secure And Usable Protection Of A Roamable Credentials Store

A tool which facilitates a balancing of security with usability enabling secure user access to multiple secure sites and locations from several computing devices utilizing a roamable credential store (RCS) which is highly resistant to offline attack. The RCS facilitates a protected Unified Credential Vault (UCV) via...

Rfid Business Process Decoupling Of Design And Deployment Time Activities

ABSTRACT RFID BUSINESS PROCESS-DECOUPLING OF DESIGN AND DEPLOYMENT TIME ACTIVITIES The claImed subject matter provIdes a system and/or a method that facIlItates ImplementIng a bIndIng between a radIo frequency IdentIfIcatIon (RFID) process and a devIce. An RFID process can receIve a tag read event from a devIce and...

Describing And Querying Discrete Regions Of Flash Storage

A flash driver can be used by file systems and other applications to determine more detailed attributes and properties, such as region geometry, that describe the underlying flash component. This allows a file system, for example, to be made aware of each flash region and its properties. The file system may then be ...

A Rich Set Of Synchronization Rules Across Multiple Accounts With Multiple Folder And Consent Types

A unique system and method that facilitates synchronizing data across multiple accounts at about the same time is provided. The system and method involve configuring an intelligent set of synchronization rules that can apply to various data types from one or more user accounts or storage locations. In addition, the ...

Rss Data Processing Object

Various embodiments utilize a special object referred to as an rsshttp objec2W222323! to acquire an RSS feed, process the feed and expose an object model to a web page or application. In at least some embodiments, the rsshttp object can parse through the feed's associated RSS data, normalize the feed data to a stand...

Client Category Configuration

Client category configuration is described, in which, a computer-implemented method may be employed to find categories of clients based on configuration data obtained from the clients. A configuration recommendation is then created for a particular one of the categories based on configuration of one or more of the c...

System For Running Applications In A Resource Constrained Set Top Box Environment

A system is described that is specifically adapted for use in a resource-constrained set-top box environment. The system uses an interpreter-based common language runtime (CLR) that is specifically configured for use in the set-top box environment. The system also includes a unique application manager and UIpane man...

Community Based Targeted Advertising

Computing devices, computer-readable media, and methods are provided for facilitating community based targeted advertising. A message is received from a first user. At least one intended recipient of the message is determined. Additionally, at least one preferred active communication channel associated with the at l...

Interactive Surface Computer With Switchable Diffuser

An interactive surface computer with a switchable diffuser layer is described. The switchable layer has two states: a transparent state and a diffusing state. When it is in its diffusing state, a digital image is displayed and when the layer is in its transparent state, an image can be captured through the layer. In...

Location Description For Federation And Discoverability

System and methods for directing a federated search using a location description file to locate a data source are provided. For a federated search, a location description may be used to describe the location of each data source searched, and may further be used to connect the user to that particular data source. The...

Safe File Transmission And Reputation Lookup

Safe file transmission and reputation lookup. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protec...

Service Preview And Access From An Application Page

In one or more embodiments, users are able to access small previews of a service from within their present application context. For example, users can install various services in an application, such as a Web browser. Based upon a user action within the application, a user interface instrumentality can be presented ...

User Interface Morph Based On Permissions

Forms may be morphed based on permissions such that objects for which permission or a license is not available are not displayed. Relevant code may be analyzed to determine whether permission to a table is available and if permission to a table is not available, objects that rely on that table are not included in th...

User Translated Sites After Provisioning

The display language of a site may be changed to another alternate language by users of a site at any time. For example, a first user may access the same site in its default language (i.e. English) and a second user may access the site using their preferred language (i.e. French) even though the default language of ...

Associating Command Surfaces With Multiple Active Components

The same command surface on a page may be associated with unrelated components and applications. Each of the components registers the commands associated with a shared command surface that they will be utilizing. Each component may utilize an arbitrary number of commands that are associated with the command surface....

A User Interface For A System And Method For Head Size Equalization In 360 Degree Panoramic Images

A User Interface (Ul) for a real-time panoramic image correction system and method that simplifies the use of the system for the user. The Ul includes a control panel that allows a user to enter meeting table size and shape, camera position and orientation, and the amount of normalization desired (e.g. 0 to 100%)....

Booting An Electronic Device Using Flash Memory And A Limited Function Memory Controller

A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if a...

Computing Environment Representation

A computing environment may be represented as a deployable object hierarchy, which may be organized according to an object hierarchy schema that is commonly shared among the computing environment host and the devices that are configured to render the computing environment. A particular object hierarchy schema is pre...

Synchronized Media Experience

A synchronized media experience is described. A media server identifies a group of two or more remote media entertainment systems through which user-controlled play of media content may be presented. The server generates and transmits one or more synchronization commands to the remote media entertainment systems t...

Registration Of Applications And Complimentary Features For Interactive User Interfaces

An exemplary computer-implementable method includes receiving a call from an application executing on a host computer, the host computer having a collection of graphical user interfaces, and, in response to the call, registering the application whereby the registering comprises providing one or more entry points ...

Business Process Meta Model

ABSTRACT BUSINESS PROCESS META-MODEL A meta-model representing a business process. Operative expressions arc defined for identifying the business process. The business process includes a plurality of activity sequences. Metadata is collected associated with the defined operative expressions. The collected metadata ...

Unified Concept Of Presence

ABSTRACT UNIFIED CONCEPT OF PRESENCE A method and system may provide a unified concept of presence across all connected hosts by providing a common point of access for all presence-related data on the system. The application abstraction layer may provide a common interface for all presence enabled applications to ...

Managing Network Response Buffering Behaviour

ABSTRACT MANAGING NETWORK RESPONSE BUFFERING BEHAVIOR The present invention extends to methods, systems, and computer program products for managing network response buffering behavior. A computer system receives a request for content trom a client. The computer system has a default response buffering behavior used...

Variable Ofdm Subchannel Coding And Modulation

ABSTRACT VARIABLE OFDM SUBCHANNEL CODING AND MODULATION A system for selecting a modulation scheme and an error correction coding scheme for each subchannel in an OFDM system based on the energy detected on that subchannel.

Policy Based Messege Aggregation Frame Work

ABSTRACT POLICY BASED MESSAGE AGCREGATION FRAMEWQRK Messages generated by an originating application are aggregated into batches based on a configuration policy. The configuration policy contains business logic used to aggregate messages into a batch. Once a batch is complete, it is formatted into a single stream ...

Bios Configuration Update Technique

ABSTRACT BIOS CONFIGURATION UPDATE TECHNIQUE The present EMOS configuration update technique allows a system administrator the ability to remotely configure a set of computing systems from various manufacturers from a single administrator console. A BIOS configuration description is used for defining hardware sett...

Filtered Replication Of Data Stores

ABSTRACT FILTERED REPLICATION OF DATA STORES Methods for enabling multi-master synchronization of particular sets of data using filters. In a synchronization request, data including knowledge and filters may be supplied. A response may comprise data including changes that are identified by the filter and that have ...

Authentication For A Commercial Transaction Using A Mobile Module

ABSTRACT AUTHENTICATION FOR A COMMERCIAL TRANSACTION USING A MOBILE MODULE Current embodiments provide for authorization and payment of an online commercial transaction between a purchaser and a merchant including verification of an identity of the purchaser and verification of an ability of the purcliaser to pay...

Ofdma Based On Cognitive Radio

ABSTRACT OFDMA BASED ON COGNITIVE RADIO A multiuser scheme allowing for a number of users, sets of user, or carriers to share one or more channels is provided, in the invention, the available channel bandwidth is subdivided into a number of equal-bandwidth subchannels according to standard OfDM practice. The trans...

Secure Network Commerical Transactions

ABSTRACT SECURE NETWORK COMMERCIAL TRANSACTIONS Current embodiments provide for authorization and payment of an online commercial transaction between a purchaser and a merchant including verification of an identity of the purchaser and verification of an ability of the purchaser to pay for the transaction, where th...

Graphical Representation Of Social Network Vitality

A method for presenting a graphical representation of the strength or vitality of a contact"s social network is disclosed. When a user pulls up a graphical user interface displaying contacts in his or her social network, in addition to the traditional profile data for each contact, a virtual object may be displayed....

Audio Codec Post Filter

Techniques and tools are described for processing reconstructed audio signals. For example, a reconstructed audio signal is filtered in the time domain using filter coefficients that are calculated, at least in part, in the frequency domain. As another example, producing a set of filter coefficients for filtering a ...

Robust Decoder

Techniques and tools related to delayed or lost coded audio information are described. For example, a concealment technique for one or more missing frames is selected based on one or more factors that include a classification of each of one or more available frames near the one or more missing frames. As another exa...

Work Item Event Procession

ABSTRACT WORK ITEM EVENT PROCESSION Detailed herein is a technology which, among other things, monitors the flow of events between a front-end application and a backend server. In one approach is technology, a new event is received at the backend server. This new event has an event type, which is used to set a new...

Flexible Quantization

ABSTRACT FLEXIBLE QUANTIZATION A digital media encoder/decoder uses a flexible quantization technique that provides the ability to vary quantization along various dimensions of the encoded digital media data, including spatial, frequency sub bands and color channels. The codec utilizes a signaling scheme to signal...

Updating Virtual Machine With Patch Or The Like

ABSTRACT OF THE INVENTION UPDATING VIRTUAL MACHINE WITH PATCH OR THE LIKE Each of a plurality of virtual machines (VMs) is stored in a halted form in a library for retrieval from the library and re-starting on a host. Each re-started VM includes a plurality of software constructs, each of which is at least potentia...

Agenda And Day Hybrid Calendar View

ABSTRACT AGENDA AND DAY HYBRID CALENDAR VIEW A user interface and user interface control for displaying calendar data is provided. In particular the user interface provides a hybrid view that includes both a schedule view of listed calendar items together with an overview strip that displays a compressed version ...

A Generic Interface For Deep Embedding Of Expression Trees In Programming Languages

ABSTRACT A GENERIC INTERFACE FOR DEEP EMBEDDING OF EXPRESSION TREES IN PROGRAMMING LANGUAGES The claimed subject matter provides a system and/or a method that facilitates querying data utilizing ah explicit representation of an embedded language. An lEnumberable component can receive a data operation that can be ...

Annotation By Search

ABSTRACT ANNOTATION BY SEARCH Annotation by search is described. In one aspect, a data store is searched for images that are semantically related to a baseline annotation of a given image and visually similar to the given image. The given image is then annotated with common concepts of annotations associated with ...

Distributed Firewall Implementation And Control

ABSTRACT DISTRIBUTED FIREWALL IMPLEMENTATION AND CONTROL One or more devices on a network may be configured to provide firewall services for other devices on the network. Each of the firewall service suppliers may publish its capability with respect to firewall services and the service receivers may publish their ...

Publisher Unions

ABSTRACT PUBLISHER UNIONS [0027] A publisher union comprises a plurality of publishers, a channel, and a publisher union administrator The publisher union is administered by receiving a channel proposal, determining whether the channel proposal is acceptable, forming a channel, and presenting the channel for monet...

Claim Transformations For Trust Relationships

ABSTRACT CLAIM TRANSFORMATIONS FOR TRUST RELATIONSHIPS This disclosure relates to the ability to use multiple claim transformation modules in a. trust relationship. Claim transformation modules transform a claim or claim set into a transformed claim or claim set for use by a trusted partner and/or application. Mul...

Multi Level Representation Of Reordered Transform Coefficients

Techniques and tools for encoding and decoding a block of frequency coefficients are presented. An encoder selects a scan order from multiple available scan orders and then applies the selected scan order to a two-dimensional matrix of transform coefficients, grouping non-zero values of the frequency coefficients to...

Multithread Spreadsheet Processing With Dependency Levels

MULTITHREAD SPREADSHEET PROCESSING WITH DEPENDENCY LEVELS ABSTRACT This disclosure relates to a method and system of processing chain calculations in spreadsheet applications utilizing multiple processors, each having a separate recalculation engine. A single calculation chain may be reordered into a unified chai...

User Presence Aggregation At A Server

ABSTRACT USER PRESENCE AGGREGATION AT A SERVER A presence aggregation system provides a presence aggregation server that allows for the publication of presence state of a publisher from the publisher's multiple endpoints. A presence state includes an availability value and an activity. An activity may include an ac...

Fault Tolerant Resource Committal

FAULT-TOLERANT RESOURCE COMMITTAL ABSTRACT [0055] This document describes tools that enable fault-tolerant resource committal for a system having computing devices needing to have operations of a particular type performed by one of multiple external resources. The tools may do so without relying on leadership from...

Position Based Tactile Reporting

POSITION BASED TACTILE REPORTING ABSTRACT Position based tactile reporting provides for adequate and socially acceptable reporting. A tactile element is moved from a first position to a second position to indicate a status. The tactile element is maintained in the second position so that touching the tactile eleme...

Keyword Expression Language For Online Search And Advertising

Media and methods are provided for creating and operating a keyword expression language. Syntax is generated as an abbreviation to represent a list of keywords. The syntax is executed as part of the keyword expression language to provide keywords. The syntax includes tokens that substitute for groups of information....

A Computer System And A Method For Operating A Platform Portable Virtual Machine Running On The Computer System

This invention relates to a computer system (20) comprising a processing unit (21), a keyboard (40) coupled to the processing unit, a display device (47) coupled to the processing unit, and an operating system (35) running on the processing unit, a system input method editor (116) running on the processing unit ...

Parametric Calibration For Panoramic Camera Systems

ABSTRACT PARAMETRIC CALIBRATION FOR PANORAMIC CAMERA SYSTEMS Architecture for spatially calibrating a multi-sensor panoramic camera. A panorama warping calibration model and manufacturing calibration data is characterized in a parametric model that is stored on the camera and utilized for camera calibration Calibr...

Efficient Phrase Pair Extraction From Bilingual Word Alignments

ABSTRACT EFFICIENT PHRASE PAIR EXTRACTION FROM BILINGUAL WORD ALIGNMENTS A method is provided for identifying phrase alignment pairs between a source sentence and a target sentence. Boundaries for a phrase in the source sentence are identified by requiring that a source word be aligned with at least one target wor...

"System For Joining Meeting Over Peer To Peer Network"

A method for creating, discovering, and joining meetings over a peer-to-peer network involves creation of a graph of meetings on a local subnet. When a meeting is created a meeting record is added to the graph where it may be discovered by other potential meeting attendees. A user may select from a list of meetings ...

"Relative Search Results Based Off Of User Interaction"

A program product and method is disclosed that rely on user interaction in the ordering of search results returned by a search engine. Each of a plurality of records in a database is associated with a user-interaction parameter that is associated with the duration of time that a user accesses a particular record of ...

Query By Image Search And Retrieval System

An image query system, and associated method and computer program product are disclosed that enhance and accelerate image-based querying. To this end, the present invention presents a digital image query with implict and explicit associated metadata and retrieval of visually similar images or other pertinent informa...

Pre Configured Settings For Portable Devices

The technical features mentioned in the abstract do not include a reference sign between parentheses (PCT Rule 8.1 (d)). A system, method, and computer-readable media are disclosed for retrieving configuration files from host units to devices. The system, method, and computer-readable media can, through a media devi...

Capturing Contacts Via People Near Me

Users on a peer-to-peer network, particularly a local subnet or ad hoc wireless network, may publish first contact information to a graph or data store on the network. The first contact information may include a certificate with a public-key and a user identification, such as a peer name. Other users may discover th...

Scheduling Collections In A Scheduler

A scheduler in a process of a computer system includes a respective scheduling collection for each scheduling node in the scheduler. The scheduling collections are mapped into at least a partial search order based on one or more execution metrics. When a processing resource in a scheduling node becomes available, th...

Storing Queries On Devices With Rewritable Media

A system and method for preparing and storing pre-determined queries on devices with large re-writable media. This invention addresses the problem of processing of data query request on devices that may not have the processing power to return query results in a timely manner. A requesting device queries a target dev...

Accessing A Menu Utilizing A Drag Operation

Computer-readable media, computerized methods, and computer systems for intuitively invoking a presentation action (e.g., rendering a menu) by applying a drag-operation at a top-level control button rendered at a touchscreen display are provided. Initially, aspects of a user-initiated input applied at the top-level ...

Performing Networking Tasks Based On Destination Networks

Methods and systems which identify and interact with network interfaces based on the network to which they provide access. A computing device operating in accordance with one or more of the principles described herein may examine available network interfaces and identify the network to which the network interface...

Pivot Search Results By Time And Location

Aggregating temporal information and location information to form a collective query. A search query is received from a user to identify search results. Temporal information and location information associated with the query inputs from information sources are received. One or more search results associated with the...

Blocking Local Sense Synchronization Barrier Esource Management For Virtualisation Of Graphics Adaptors

A blocking local sense synchronization barrier is provided. The local sense variable is not processor private or global, but truly local to the synchronization barrier function. Safe deletion is provided by making sure the last operation a thread performs on a barrier is a write. Just before returning, threads incre...

Multi Sensory Speech Enhancement Using A Speech State Model

A method and apparatus determine a likelihood of a speech state based on an alternative sensor signal and an air conduction microphone signal. The likelihood of the speech state is used, together with the alternative sensor signal and the air conduction microphone signal, to estimate a clean speech value for a clean...

Performance Enhancements For Video Conferencing

PERFORMANCE ENHANCEMENTS FOR VIDEO CONFERENCING ABSTRACT A conference server may request a key frame from a conference participant in response to determining that the conference participant should become a most active participant and the conference server may make the conference participant the most active partici...

Two Way And Multi Master Synchronization Over Web Syndications

TWO-WAY AND MULTI-MASTER SYNCHRONIZATION OVER WEB SYNDICATIONS ABSTRACT Synchronization of a web syndication item over a Really Simple Syndication (RSS) format between a publisher and a subscriber. The publisher creates the web syndication item by including a media content associated therewith. The synchronization...

Multi Dvr Node Communication

MULTI-DVR NODE COMMUNICATION ABSTRACT Multi-DVR node communication is described. In an embodiment, television-based client devices are each a node of a multi-DVR system where the nodes are implemented for communication with each other. A node status can be communicated from a node of the multi-DVR system to the tel...

Locating Services Using Compiled Scopes

LOCATING SERVICES USING COMPILED SCOPES ABSTRACT In a computing environment incorporating multiple computing systems capable of intercommunication, a computing system assists in locating a service offered by other computing system(s). For instance, upon receiving a query that represents a scope of a service to be ...

Application Program Interface To Manage Media Files

APPLICATION PROGRAM INTERFACE TO MANAGE MEDIA FILES ABSTRACT OF THE DISCLOSURE An application program interface to manage media files may be described. An apparatus may comprise a media processing sub-system having a processor and a memory. The memory may store an application program interface software library hav...

Automatically Generating Web Forms From Database Schema

AUTOMATICALLY GENERATING WEB FORMS FROM DATABASE SCHEMA ABSTRACT The present invention extends to methods, systems, and computer program products for creating Web forms with automatically generated links. A database mapping for a database is accessed. One or more dynamic queries for querying a database are automat...

Remoting Sub Pixel Resolved Characters

REMOTING SUB-PIXEL RESOLVED CHARACTERS ABSTRACT Remoting sub-pixel defined text. Text is remoted at sub-pixel precision in a computing environment including a terminal server and a terminal client. At a terminal server text definitions are generated. The text definitions include character definitions defining char...

Inferring Road Speeds For Context Sensitive Routing

SENSITIVE ROUTING Sensing, learning, inference, and route analysis methods are described that center on the development and use of models that predict road speeds. In use, the system includes a receiver component that receives a traffic system representation, the traffic system representation includes velocities fo...

Auxiliary Output Device

AUXILIARY OUTPUT DEVICE AABSTRACT Techniques are provided for notification regarding communications. An incoming communication for a user of a primary device is received. An auxiliary device is provided for the primary device. Filter criteria for the auxiliary device is provided. A determination is made as to wheth...

Inter Proximity Communication Within A Rendezvous Federation

The present invetion extends to methods, systems, and computer program products for facililating inicr-proximity communication within a rendezvous federation. Nodes maintain collateral ring set entry tables [hat include collateral rings and corresponding entry nodes into the collateral rings. Nodes can exchange c...

Declarative Management Framework

DECLARATIVE MANAGEMENT FRAMEWORK ABSTRACT User productivity can be facilitated by providing an interface between a high-level intent and low-level settings that should be configured to achieve the intent. The intent can be expressed in declarative language. The intent can be verified to determine if it conforms to ...

Techniques To Manage An Electronic Program Guide

Techniques to manage an electronic program guide may be described. An apparatus may include a display to display an electronic program guide comprising a dynamic scaling grid. The apparatus may also include a media processing device coupled to the display. The media processing device may comprise a processor and an ...

Methods And Architectures For Context Sensitive Reminders And Service Facilitation

N Methods and architectures for context-sensitive reminding and service facilitating are disclosed. The architectures monitor user context and activity, senses or infers relevant reminders, goals, such as those that come from a growing need of the user that should be fulfilled, and computes best reminders, and reco...

A Method Of Switching Between Different Prediction Modes Of An Interlaced B Frame

For interlaced B-fields or interlaced B-frames, forward motion vectors are predicted by an encoder/decoder using forward motion vectors from a forward motion vector buffer, and backward motion vectors are predicted using backward motion vectors from a backward motion vector buffer. The resulting motion vectors are ...

Scheduler Instances In A Process

A runtime environment of a computer system is provided that creates first and second scheduler instances in a process. Each scheduler instance includes allocated processing resources and is assigned a set of tasks for execution. Each scheduler instance schedules tasks for execution using the allocated processing res...

Online Ad Serving

Online ad hosting (e.g., hosting ads from one domain on a webpage from a different domain) is accomplished using a cross-domain frame (e.g., an inline frame (IFrame)), a secure inter-frame communications channel, and a source code interface (e.g., a set of application program interfaces (APIs)). That is, a cross-dom...

Techniques To Manage A Whiteboard For Multimedia Conference Events

Techniques to manage a whiteboard for multimedia conference events are described. An apparatus may comprise a whiteboard manager component operative to manage whiteboard recording, image processing and reproduction operations for a multimedia conference event. The whiteboard manager component may comprise an image q...

Coding And Decoding For Interlaced Video

Various techniques and tools for coding and decoding interlaced video are described, including (1) hybrid motion vector prediction for interlaced forward-predicted fields, (2) using motion vector block patterns, (3) selecting between dominant and non-dominant polarities for motion vector predictors, (4) joint coding...

Coding And Decoding For Interlaced Video

NA

Displaying A List Of File Attachments Associated With A Message Thread

[0052] Technologies are described herein for displaying a list of file attachments associated with a message thread an email application. The messages associated with the message thread are identified, along with any file attachments attached to those messages. An aggregated attachment list is generated containing a...

Association Of An Input And Output Of A Peripheral Device In A Computing System

A coupled peripheral device (102) output is associated to a peripheral device (102) input, A descriptor configuration input is received from the coupled peripheral device describing attributes of the peripheral device and an association between the peripheral device input and output. Peripheral device classes of ass...

Synchronized Conversation Centric Message List And Message Reading Pane

Technologies are described herein for a user interface uniting two primary components, a list view and a reading pane, within a message reading application. Technologies are also described for synchronizing status and parameters between the two primary user interface components. In particular, a user interface for r...

Remotely Accessing Protected Files Via Streaming

A source device permits a user of a remote device to access a protected file on the source device when the user of the remote device has a right to access the protected file. The user locates the protected file on the source device using the remote device and accesses the protected file using a media player on the r...

Video Registration And Image Sequence Stitching

A "Keyframe Stitcher" provides an efficient technique for building mosaic panoramic images by registering or aligning video frames to construct a mosaic panoramic representation. Matching of image pairs is performed by extracting feature points from every image frame and matching those points between image pairs. Fu...

Preparing And Playing Digital Mediapresentations

APIs discussed herein promote efficient and timely interoperability between hardware and software components within the media processing pipelines of media content players. A PhysMemDataStructure API facilitates a hardware component"s direct access to information within a memory used by a software component, to enab...

"Methods And Systems For Cryptographically Protecting Secure Content"

Methods and systems are provided for cryptographically protecting secure content in connection with a graphics subsystem of a computing device. Techniques are implemented to encrypt the contents of video memory so that unauthorized software cannot gain meaningful access to it, thereby maintaining confidentiality. Mo...

Identifying Design Issues In Electronic Forms

A technology for identifying design issues during an electronic form generating process is disclosed. In one method approach, a user selected runtime environment to be applied to an electronic form is received. A form design check is performed on the electronic form. A reporting object generates a list of design iss...

"System And Methods For Providing Controllable Texture Sampling"

Systems and methods are provided for controlling texture sampling in connection with computer graphics in a computer system. In various embodiments, improved mechanisms for controlling texture sampling are provided that enable 3-D accelerator hardware to greatly increase the level of realism in rendering, including ...

"Method To Synchronize And Upload An Offloaded Network Stack Connection With A Network Stack"

A method to synchronize and upload an offloaded network stack connection between a host network stack and peripheral device is presented. A state object for each layer in the stack is sent to the device that includes state variables that are classified as a constant, a cached variable handled by the host, or a deleg...

"Persistent Authorization Context Based On External Authentication"

Methods and systems are provided to allow users that are authenticated by a trusted external service to gain controlled levels of access to selected local computing resources without requiring the user to also have conventional access control capabilities for the resources.

"Peer To Peer Name Resolution Protocol (Pnrp) Security Infrastructure And Method"

A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ...

"Method And Apparatus For Provisioning Software"

A dynamic software provisioning system allows provisioning software on a number of different computing devices based upon a desired business process. The dynamicsocwa provisioning system allows a user to request usage of the operating system for a specific period of time, for a specific amount of usage, or in any ot...

Method And System For Authenticating Components Along The Paths For Processing Renderable Digital Data

Methods, systems and architectures for processing renderable digital content are described. The various embodiments can protect against unauthorized access or duplication of unprotected content (i.e. decrypted content) once the content has reached a rendering device such as a user's computer. A flexible ...

A Method And System For Dynamic Wizard Interface

The present invention relates to a system and method for providing dynamic wizard interfaces to end users. In one embodiment, a client device retrieves a container encapsulating a number of packages utilizing a self-describing data format from a remote server. A wizard engine on the client, device interprets the con...

System And Method For Visual Group Interface For Group Connectivity

A communication icon represents a shared connection allowing members of an online group to interact with each other and participate in different activities together. The icon through which the group interacts resides on each group member's desktop and 5 has many attributes including click activation modes and dr...

Content Filtering Web Browsing

The present invention provides a system and method for controlling whether a user may access certain Internet sites when using a computer. The system and method are carried out on a personal computer having a local ratings cache, a cache refresher, a local ratings interpreter and an allow-block list. When th...

"System And Method For Supporting Non Native Xml In Native Xml Of A Word Processor Document"

A system and method for enabling validation of an extensible markup language (XML) document having elements associated with two or more schemata where elements of each schema may be arbitrarily nested within elements from the other schema and each set of elements remains valid within it"s own schema. Elements of the...

Identity Information Including Reputation Information

A system for providing reputation information includes a relying party programmed to receive a security token including a claim with reputation information associated with a party, and the relying party is further programmed to utilize the reputation information when deciding whether to transact with the party A me...

Machine Translation In Instant Messaging Applications

Abstract Machine Translation in Instant Messaging Applications An instant messaging translation plug-in interacts with an instant messaging program to intercept incoming messages and forward these messages to a language translation service. The plug-in then displays a translation received from the service along wit...

Auto Generation And Syndication Of Tables As Forms

Techniques for automatically generating a form associated with a spreadsheet table are disclosed herein. Such a form may have data entry fields that correspond to data attributes listed on the spreadsheet table. The form may be associated with the spreadsheet table by means of a user interface, such as an icon or ot...

Rss Hostable Control

ABSTRACT RSS HOSTABLE CONTROL The embodiments described above utilize and leverage RSS to enable a user to interact more easily with different types of data, or data from different sources that are available over the web. In accordance with at least some embodiments, a hostable and/or customizable control is provid...

"Distributed Computing Services Platform"

N/A

Authoring Arbitrary Xml Documents Using Dhtml And Xslt

N/A

Network Based Software Extensions

N/A

"Method And Computer Readable Medium For Improting And Exporting Hierarchically Structured Data"

A method and computer-readable medium are provided for selectively importing and exporting data in an electronic document. An import application program interface (API) may be implemented to import content from a hierarchically structured document, such an XML file. The import API works in conjunction with a parser ...

Protection Of User Information

ABSTRACT Embodiments of persistent public maciiine setting are presented. in an implementation a web service provider sign-in is provided which presents customized information for multiple users of a client device. A user interface is presented having a plurality of portions each corresponding to a particular user...

Auxiliary Display Gadget For Distributed Content

ABSTRACT AUXILIARY DISPLAY GADGET FOR DISTRIBUTED CONTENT [0075] Described is a technology by which a specific gadget program is installed (e.g., created) on a main host computer system that receives data (e.g., an RSS feed) from a distribution source, in which the feed data contains the information needed to inst...

Dynamic Thresholds For Conditional Formats

ABSTRACT DYNAMIC THRESHOLDS FOR CONDITIONAL FORMATS Generally described, embodiments of the present invention provide the ability to itilize dynamic thresholds and dynamic threshold values when generating variable brmatting rules to be applied to a range of cells. Dynamic thresholds include, but are not imited to,...

Customizable Service Provider User Interface

ABSTRACT A customizable service provider user interface is described. In an implementation, a user is logged onto a suite a web services, to which, the user has not previously logged on. A user interface is output having a plurality of portions, one or more of which are customizable by the user through use of one o...

Flexibly Editing Heterogeneous Documents

The present invention extends to methods, systems, and computer program products for flexibly editing heterogeneous documents. Different types of documents can be organized on a universal and dynamically adjustable workspace canvas in a manner that indicates relationships between the documents. The workspace canvas ...

Serving Cached Query Results Based On A Query Portion

ABSTRACT SERVING CACHED QUERY RESULTS BASED ON A QUERY PORTION The embodiments contemplate a system and method for obtaining related results for a portion of a query and for generating an updated set of queries for a cache of a server. Other queries beginning with the portion of the query may be identified and obt...

Maintaining Multiple, Simultaneous Wireless Network Connections Using A Single Radio

A method and apparatus for managing simultaneous virtual connections with multiple wireless networks. A plurality of ports in a hardware driver may be each associated with a corresponding wireless network and maintain a unique MAC state relative to other ports. Each port may have a corresponding virtual NIC that com...

Creating Templates Of Offline Resources

Implementations of the present invention allow software resources to be duplicated efficiently and effectively while offline. In one implementation, a preparation program receives an identification of a software resource, such as a virtual machine installed on a different volume, an offline operating system, or an a...

Declarative Model For Concurrency Control Across Lightweight Threads

Implementing synchronization among threads in a workflow. A memory area stores a plurality of work items in a scheduler queue. The work items are associated with an activity in the workflow, and each work item is associated with a thread. A processor is configured to assign a synchronization handle to each of the wo...

Extensible Query Language With Support For Rich Data Types

An query language with support for rich data types is provided. A system may comprise an application configured to generate queries according to the query language. Also provided is a platform for handling queries that are generated according to the provided query language. The platform generally comprises an object...

Mapping Architecture With Incremental View Maintenance

A data access architecture is provided that includes a mapping architecture for mapping data as may be used by an application to data as persisted in a database. The mapping architecture makes use of two types of mapping views - a query view that helps in translating queries and an update view that helps in translat...

"Active Content Wizard: Execution Of Tasks And Structured Content"

The invention describes a system for authoring and executing wizards. New wizards are created either from existing structured content like HELP files, KB articles etc or are created using simple authoring tools that target authors with. expertise of applications (not requiring development skills). The wizards work o...

Dynamically Updated Virtual List View

A virtual list view in a web application is dynamically updated such that a uses can seamlessly and manage the presented data despite the inherent latency involved with the web. Data associated with the virtual list view is downloaded in chunks and view as user scrolls. By coupling the user"s scrolling and particula...

Singnificant Change Search Alerts

An alert search mechanism is used with search engines such as a crawler to search for desired documents and or resources. Particular documents are found by using search queries The search mechanism track values of a set of relevant properties in queries. Whenever a document is searched for by the system, the values...

Frame Protocol And Scheduling System

Serialized datas from broadcast services is provided to a broadcast server for transmitting to one or more client devices. The serialized data may correspound to shared data, or control data. Data is scheduled for transmmission based on weighted priorities inculding quality of service metrics. The transmission fr...

Peer To Peer Contact Exchange

ABSTRACT PEER-TO-PEER CONTACT EXCHANGE A system may publish authenticated contact information in a publicly available index store, retrieve the contact information, and validate it. The claimed method and system may provide a client-based, server optional approach to publishing. The publicly available index store ...

A System And Method For Controlling Congestion On Network Connections

ABSTRACT ENABLING NETWORK DEVICES TO RUN MULTIPLE CONGESTION CONTROL ALGORITHMS Creating different congestion control modules (CCMs) that can be plugged into a network communications stack (e.g., a TCP/IP stack). Software abstractions defining transport control events, congestion control algorithms and other infor...

Computer Radio With Pre Defined Configuration Set

A computer with a software defined radio that can be configured based on a wireless technology specification. The computer may negotiate with a second computer that also includes a software defined radio to define a set of wireless technology specifications and trigger events indicating when each of the wireless tec...

Content Editing Protected View

ABSTRACT CONTENT EDITING PROTECTED VIEW A software application window shows current content in a content region and navigation information in a plurality of navigation regions, with the navigation regions showing contextual information for the current content, as well as for related content. A request to hide navi...

Editing Text Within A Three Dimensional Graphic

ABSTRACT EDITING TEXT WITHIN A THREE-DIMENSIONAL GRAPHIC A two-dimensional text editing mode is used when editing three-dimensional text. Once the three dimensional text is selected for editing a two-dimensional text editing mode is automatically entered such that the user may easily edit the text. The two dimensio...

Global Provisioning Of Millions Of Users With Deployment Units

ABSTRACT GLOBAL PROVISIONING OF MILLIONS OF USERS WITH DEPLOYMENT UNITS Described herein is technology for, among other things, global provisioning of a service. The technology involves a provisioning server obtaining location information for a client. The provisioning server determines an appropriate deployment ...

Launching Hypervisor Under Running Operating System

ABSTRACT OF THE DISCLOSURE LAUNCHING HYPERVISOR UNDER RUNNING OPERATING SYSTEM The launching of a hypervisor after there is already a running operating system. The operating system itself may launch the hypervisor. The running operating system may be used instead of the hypervisor to discover the physical resources...

Synchronizing Structured Web Site Contents

ABSTRACT SYNCHRONIZING STRUCTURED WEB SITE CONTENTS Techniques to synchronize structured web site content are described. An apparatus may include a server having a server synchronization module to identify structured content types shared by the server and a client, and synchronize structured content corresponding t...

Booting An Operating System In Discrete Stages

ABSTRACT BOOTING AN OPERATING SYSTEM IN DISCRETE STAGES A computing device is configured to assemble and boot an operating system in stages A primary boot image is first obtained teat includes enough of the operating system to support basic networking. Once the primary boot image is obtained, either through downl...

Efficiently Filtering Using A Web Site

ABSTRACT EFFICIENTLY FILTERING USING A WEB SITE A technology for efficiently filtering using a web site is disclosed. In one method approach, distinct filtering values based on a type of data selected from a web page associated with a web site are received without requiring retrieval of filtering values that are u...

Enhanced Network Communications

ABSTRACT ENHANCED NETWORK COMMUNICATION Aspects of the present invention are directed at software systems for sending a data item from a sending client to a receiving client. In accordance with one embodiment, software components are provided that include a command handling component and a processing component. Th...

Delegating User Credentials From A Client Computer

ABSTRACT A credential security support provider (Cred SSP) enables any application to securely delegate a user's credentials from the client, via client side Security Support Provider (SSP) software to a target server, via server side SSP software. The Cred SSP provides a secure solution based in part upon a set o...

Stack Signaling To Application Lack Of Requested Bandwidth

COLLISION AVOIDANCE FOR TRAFFIC IN A WIRELESS NETWORK ABSTRACT Techniques for avoiding collision of traffic in a wireless network are described. A station detects for synchronization of its traffic with traffic of other stations. The station may detect for synchronization based on, e.g., percentage of first tran...

Converting Machines To Virtual Machines

CONVERTING MACHINES TO VIRTUAL MACHINES ABSTRACT OF THE DISCLOSURE Physical (or prior virtual) machine volumes can be converted to virtual machines at a virtual machine host while the physical machines are running. In one implementation, a volume shadow copy service can be used to create an application (and/or file...

Deploying Virtual Machine To Host Based On Workload Characterizations

ABSTRACT DEPLOYING VIRTUAL MACHINE TO HOST BASED ON WORKLOAD CHARACTERIZATIONS To determine whether to deploy a candidate VM to a candidate host, taking into consideration resources available from the candidate host and resources required by the candidate VM, a sub-rating is calculated for each of several resource...

Adaptive Customer Assistance System For Software Products

An adaptive customer assistance system that can serve as an integrated online and offline help platform for a suite of software products is provided. The assistance system includes a customer-interaction interface and a data management component and a download management component for distributed customer interacti...

Large Mesh Deformation Using The Volumetric Graph Laplacian

Large mesh deformation using the volumetric graph Laplacian is described. In one aspect, information is received from a user, wherein the information indicates how an original mesh is to be deformed. The original mesh is then deformed based on the information and application of a volumetric differential operator to ...

System And Method For Describing Applications For Manageability And Efficient Scale Up Deployment

Systems, methods and computer storage media for operating a scalable computing platform are provided. A service description describing a requested service is received. Upon receiving the service description a determination of the required resources and the available resources is made. An instance description is prod...

Personalizable Information Networks

A facility for creating shareable pinboard collections is described. In various embodiments, the facility receives an indication of a query defining a term for searching, employs a search provider to perform a search for information items matching a criteria, receives from the search provider an indication of a resu...

Virtualization Of Mobile Device User Experience

ABSTRACT A device virtualization service (DVS) is provided that uses a generalized thick resident on a mobile device to provide user interface generation support to a myriad of services providing mobile device content. The DVS abstracts device specifics from services to provide device independent user experienc...

Auto Subscribing To Syndication Feeds Using Contact Lists

AUTO-SUBSCRIBING TO SYNDICATION FEEDS USING CONTACT LISTS ABSTRACT An application executes on a client device to automatically subscribe a user to a particular syndication feed. In at least some instances, the user can be preliminarily unaware that they have been subscribed to the feed. In at least some embodiment...

Modifying A Chart Using Pictoriallyprovided Chart Elements

A method for formatting a chart, the method comprising: receiving (310) a standard chart; providing (315) a plurality of chart elements pictorially, wherein each of the plurality of chart elements represents a chart modification for use in changing the standard chart; modifying (325) the standard chart with one o...

Hybrid Memory Device With Single Interface

HYBRID MEMORY DEVICE WITH SINGLE INTERFACE ABSTRACT Described is a technology by a memory controller is a component of a hybrid memory device having different types of memory therein (e.g SDRAM and flash memory), in which the controller operates such that the memory device has only a single memory interface wit...

Identification Of People Using Multiple Types Of Inputs

Systems and methods for detecting people or speakers in an automated fashion are disclosed. A pool of features including more than one type of input (like audio input and video input) may be identified and used with a learning algorithm to generate a classifier that identifies people or speakers. The resulting class...

Bucket Based Searching

BUCKET-BASED SEARCHING ABSTRACT An item discovery module (IDM) is described that allows a user to find one or more desired items within a store of candidate items. In operation, the user enters a search selection, upon which the IDM determines a collection of matching items. The IDM groups the matching items into o...

Managing Family Information

MANAGING FAMILY INFORMATION ABSTRACT OF THE INVENTION Family information adaptable for groups with multiple members using multiple devices in multiple locations can be managed Extensible and customizable types of family information, such as notes, tasks, lists, and appointments for specific family activities may b...

Customizable Parameter User Interface

A customized form is provided for entering parameters associated with a query. A user may desire to modify a report resulting from a query to a database. To enter the parameters for modification, a customized form is displayed to the user. The customized form allows for entry of the parameters according to prompts t...

User Interface For Reading Email Conversations

Emails modeled as conversations are displayed in a user interface that enables users to read and interact with the emails within a conversation intuitively. Conversation breaks, such as those in an in-reply-to relationship between messages, are presented utilizing extra spaces between displayed message parts, excerp...

Xml Based Web Feed For Web Access Of Remote Resources

Techniques for XML (Extensible Markup Language) web feeds for web access of remote resources are described. In one embodiment, a method includes obtaining information regarding one or more available resources from one or more resource hosts, rendering the information regarding one or more available resources into an...

Techniques To Consume Content And Metadata

Content and metadata associated with the content may be provided to a number of users. The content may be displayed on a display device while the metadata may be transmitted to a remote device corresponding to a receiving user. The user may further request desired information or metadata pertaining to the content an...

Selection Of Targeted Advertisements

System, methods, and computer-storage media are provided for selecting advertisements specifically targeted to a first end user. Information is provided by a second end user that describes characteristics and interests of the first end user. The information provided by the second user is used to select advertisement...

Interpreting Ambiguous Inputs On A Touch Screen

A method for interpreting ambiguous click events in relation to click targets on a touch screen display disposed at respective click target locations includes detecting a touch at a touch location and determining whether the touch location corresponds to a click target location. The method also includes searching fo...

Inter Proximity Communication Within A Rendezvous Federation

INTER-PROXIMITY COMMUNICATION WITHIN A RENDEZVOUS FEDERATION ABSTRACT The present invention extends to methods, systems, and computer program products for facilitating inter-proximity communication within a rendezvous federation. Nodes maintain collateral ring set entry tables that include collateral rings and...

Archiving Data In A Virtual Application Environment

A computer system suitable for archiving data with a corresponding application program in a virtual application environment is presented. The computer system includes a processor, a memory, and storage. The computer system also includes an operating system, data to be archived, and an application program that corres...

Intelligent Autocompletion

Various embodiments utilize an auto-complete module to expose a website"s content structure. In at least some embodiments, a user can take an action within an application and, responsively, the auto-complete module can retrieve a site index file or site map and use the site index file or site map to display the webs...

Electronic Commerce Transactions Over A Peer To Peer Communications Channel

Technologies are provided for completing e-commerce transactions over a P2P communications channel. According to one method, a secure P2P communications channel is established between a buyer node and a seller node. A request to perform an e-commerce transaction is transmitted from the buyer node lo the seller node....

Independent Computation Environment And Provisioning Of Computing Device Functionality

Wireless-enabled mobile communication devices and network nodes are configured for participation in wireless, location-based e-commerce activities. Consumer:; using mobile communication devices in the vicinity of physical retail locations receive opportunities to engage in e-commerce, using their mobile communicatio...

Modification Of Codewords In Dictionary Used For Effecient Coding Of Digital Media Spectral Data

Coding of spectral data by representing certain portions of the spectral data as a scaled version of a code-vector, where the code-vector is chosen from either a fixed predetermined codebook or a codebook taken from a baseband. Various optional features are described for modifying the code-vectors in the codebook a...

Conflict Resolution

RESOLUTION Embodiments of a collaborative authoring environment enable a user to resolve editing conflicts arising when synchronizing a user copy of a data file with a master copy of the data file. Content updates may be synchronized separately from metadata updates. Metadata updates may be synchronized automatical...

Immunizing Html Browsers And Extensions From Known Vulnerabilities

An exemplary computer-implementable method (300) transforms or "immunizes" information to reduce or eliminate risk of exploitation of a known vulnerability of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed informati...

Efficient Formation Of Ad Hoc Networks

An ad hoc network identifier may be received, for example, at an ad hoc network convergence module. One or more ad hoc network parameters may be generated as a function of the ad hoc network identifier. Each of a group of computers attempting to form an ad hoc network identified by the ad hoc network identifier may ...

Gesture Related Feedback In Eletronic Entertainment System

Various embodiments related to providing user feedback in an electronic entertainment system are disclosed herein. For example, one disclosed embodiment provides a method of providing user feedback in a karaoke system, comprising inviting a microphone gesture input from a user, receiving the microphone gesture input...

Panning Content Utilizing A Drag Operation

Computer-readable media, computerized methods, and computer systems for intuitively invoking a panning action by applying a user-initiated input at the content region rendered at a touchscreen interface are provided. Initially, aspects of the user-initiated input include a location of actuation (e.g., touch point ...

Techniques To Provision And Manage A Digital Telephone To Authenticate With A Network

Techniques to manage digital telephones are described. An apparatus may comprise a digital telephone management component having a telephone interface module operative to receive security information in the form of a personal identification number (PIN) for an operator or device. The digital telephone management com...

Scheduling Opportunity Previewer

Various technologies and techniques are disclosed for previewing and managing scheduling opportunities. A scheduling opportunity is received. A context of one or more surrounding appointments to the scheduling opportunity is retrieved. The scheduling opportunity is displayed with the context of the surrounding appoi...

Translating Drm System Requirements

Various embodiments provide a mapping layer to translate DRM system requirements from one DRM system, such as a source system, to another DRM system, such as a target system. In at least some embodiments, DRM system requirement translation is performed using a signed data structure that maps DRM system requirements ...

Configurable Partitioning For Parallel Data

A data partitioning interface provides procedure headings to create data partitions for processing data elements in parallel, and for obtaining data elements to process, without specifying the organizational structure of a data partitioning. A data partitioning implementation associated with the data partitioning in...

Maintenance Of Exo File System Metadata On Removable Storage Device

A host computing device (114)/transient storage device (102) (TSD) interface eliminates the need for a full directory crawl of the storage volume on the TSD to maintain a metadata database (112). The metadata database (112) is incrementally updated instead of being completely regenerated on every connection between ...

"Method For Selecting A Font"

ABSTRACT The invention is generally directed to a method for selecting a font that uses a mark-up language document to group together multiple pre-existing fonts into a single font family or "virtual font." The mark-up language document includes rules regarding the conditions under which individual fonts within the...

Secure Configuration Of Transient Storage Devices

Extension fields (212) in a provisioning certificate (204) in the authentication silo (200) of a transient storage device (TSD)(100) are used to provide secure configuration options for TSDs while operating within the constraints of the current IEEE 1667 standard. Immutable values for configurable settings of the st...

Extended User Profile

A method of extending user profile (300). A user specific data related to an application is received (320) and stored for integration with a user profile. A template for the application is received (330) and stored. The template tailors the user specific data based on aesthetic preferences of the user to generate a ...

User Interface For Gestural Control

A UI (user interface) 120 for gestural control enhances the navigation experience for the user by preventing multiple gestures from being inadvertently invoked at the same time. This problem is overcome by establishing two or more categories of gestures. For instance, the first category of gestures may include gestu...

Library Description Of The User Interface For Federated Search Results

Methods and computer-readable media are provided for performing a federated search using library description file to locate multiple data sources. For a federated search, a library description can be used to describe a set of data sources searched, and may further be used describe how search results should be presen...

Media Foundation Source Reader

Techniques are provided to allow developers to use a unified application programming face to access multimedia data from different containers and in different formats FIG.2

Reconciliation And Remediation With Communication Archives

Techniques for reconciliation and remediation of messages sent by a server for storage in an archive are described. Some techniques may comprise receiving a message to be reconciled corresponding to a message sent by a server to be stored in an archive. The received message may be categorized for reconciliation, and...

Exposing Non Authoring Features Through Document Status Information In An Out Space User Interface

An out-space actuator is selected to access an out-space user interface (UI) for a document editor program. An out-space actuator associates with an in-space UI having a displayed document. When the out-space actuator is selected, out-space UI is displayed to include expanded feature selection surface. The out-space...

System And Method For Synchronizing Data Over Different Networks

The present system includes a bridge (or adapter) that connects two synchronization endpoints over two different networks. The bridge first receives information to be synchronized and generates metadata to form it into messages transported over the first network according to a first protocol. A gateway receives the ...

Communication Between A Document Editor In Space User Interface And A Document Editor Out Space User Interface

An out-space actuator is selected to access an out-space user interface (UI) for a document editor program. An out-space actuator associates with an in-space UI having a displayed document. When the out-space actuator is selected, out-space UI is displayed to include expanded feature selection surface. The out-space...

Analytical Map Models

Visual map items may each be constructed and placed in position using logic defined by a map view component corresponding to each visual item, where that logic may depend on one or more values populated into parameter(s) of the map view component. Some of those parameter values may correspond to known map model para...

Awarding Users For Discoveries Of Content Based On Future Popularity In A Social Network

A reputation system used in a social networking ser vice (325) provides for recognition for its members (334) in the form of badges (410. 418, 425) that can be displayed on the members" profile pages (405) as a way of indicating a particular status. In various illustrative examples, a "tastemaker" badge (425) may be...

"Extended Time Code For Multimedia Presentations"

NA

Computer Application Packages With Customizations

Applications operated within a virtual environment may be organized into a package containing various software components. Each software component or resource may have a specific name and other metadata, including a designator for overwriting or modifying the component. A policy may define how any changes to specifi...

Creation And Navigation Of Infinite Canvas Presentation

A system and method for creating and conducting presentations on a surface may include an authoring mode, a preprocessing mode and a presentation mode. During an authoring mode, a user may create a surface presentation. In response to a command to play the created presentation, the system enters the preprocessing mo...

Need Driven Advertising

An advertising system is provided that interacts with end-users and advertisers to facilitate the generation and delivery of advertisements that are specifically targeted to end-users" product interests and needs. An end-user interacts with the advertising system to provide a product request representing the end-use...

Data Center Programming Model

An exemplary method includes hosting a service at a data center, the service relying on at least one software component developed according to a programming model and the data center comprising a corresponding programming model abstraction layer that abstracts resources of the data center; receiving a request for th...

Secure Resource Name Resolution

Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modem networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be...

Secure Resource Name Resolution Using A Cache

Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modem networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be...

Web Page Privacy Risk Detection

WEB PAGE PRIVACY RISK DETECTION Various embodiments enable detection of third party content sources that may pose a privacy risk to a user. In at least some embodiments, webpages navigated to via a browser can be processed to identify third party content sources that provide content for the webpages. Data may be ...

Scrollable Area Multi Scale Viewing

Utilizing a scrollbar handle for both zooming and panning a display comprising items in a user interface may be accomplished by monitoring an input device's interaction with the scrollbar handle. If the scroll handle is dragged in a direction away from an orientation of the scroll handle in the scrollbar, a display ...

Social Virtual Avatar Modification

The techniques disclosed herein integrate a social aspect into avatar modification. Multiple users may access a virtual environment that allows users to modify the user's avatar. The users in the application may be any combination of remote and local players. The users' avatars may be associated with the same applic...

Skip Modes For Inter Layer Residual Video Coding And Decoding

Techniques and tools for skip modes in encoding and decoding of inter-layer residual video are described. For example, an encoder encodes multiple macroblocks of a picture of inter-layer residual video. For a current macroblock that is skipped, the encoder selects a skip mode from among multiple available skip modes...

Content Recommendations Based On Browsing Information

Architecture for dynamically tracking information about a first-time or inactive user to a website and expeditiously presenting targeted content back to the user to maintain the user interest in the website. A visceral connection is created with the user based on immediately relevant content and functionality, and w...

Portable Electronic Device With Relative Gesture Recognition Mode

A computer program executable on a portable electronic device having a touch screen sensor is provided. The computer program may include an input mode switching module configured to receive a mode switch user input to switch between a direct input mode and a relative gesture recognition mode. The computer program ma...

Temporally Separate Touch Input

[0030] A method of processing touch input includes recognizing a first touch input, and then, after conclusion of the first touch input, recognizing a second touch input temporally separate from the first touch input. The temporally separate combination of the first touch input and the second touch input is then tra...

Shared Hosting Using Host Name Affinity

The routing of requests in a shared hosting environment. The shared hosting environment includes a network farm of servers, each capable of processing the request corresponding to the host name. When a request is received, a router determines whether or not there is already a host name affinitization of subset of th...

Zooming Graphical User Interface

[0043] A method of presenting a hierarchically-organized collection of objects includes displaying a first-level set of first-level objects in a prominent scale; and while displaying the first-level set of first-level objects in the prominent scale, displaying one or more second-level sets of second-level objects i...

Data Schema Transformation Using Declarative Transformations

Embodiments of the present invention relate to systems, methods and computer storage media for transforming data defining a first data schema to data defining a second data schema by way of a declarative transformation. The transformation includes identifying data defining the first data schema. A declarative transf...

System And Method For Verifying Authenticity Of Cache Contents Across A Power Transition

Embodiments of the invention provide techniques for ensuring that the contents of a non-volatile memory device may be relied upon as accurately reflecting data stored on disk storage across a power transition such as a reboot. For example, some embodiments of the invention provide techniques for determining whether ...

Motion Activated Content Control For Media System

A media system is described including a graphical display that presents an iconic menu and a textual menu. The iconic menu includes a plurality of icons arranged in a two-dimensional collection, where each icon provides access to media content. The textual menu includes a structured textual list that provides access...

Integrated Haptic Control Apparatus And Touch Sensitive Display

The provision of a haptic input with an integrated touch screen input is disclosed. One disclosed embodiment provides a control apparatus for an electronic device. The control apparatus comprises a haptic input mechanism configured to provide haptic feedback responsive to a push input, and an integrated touch sensit...

Providing Functionality To Client Services By Implementing And Binding Contracts

Methods, systems, and computer-readable media for automating the expression of functional aspects of a target service to a client service via a vehicle referred to herein as a contract are provided. Generally, the methods are performed in the context of a distributed computing environment configured to underlie oper...

Painting User Controls

The described implementations relate to dynamically painting user-controls. One method dynamically determines a highlight color of a user-control under a cursor on a graphical user-interface. The Method also paints at least a portion of the user-control with the highlight color.

Unified Storage For Configuring Multiple Networking Technologies

A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity. The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising s...

Acoustic Pass Through For Handsets

An acoustic pass through is provided in telephone handsets for sounds transmitted from a hands free operation speaker laid out underneath the handset. One or more cutouts in a middle portion of the handset in various shapes such as rectangular, round, elliptical, and similar allows enhanced sound quality when the sp...

Tiltable User Interface

A programmable effects system for graphical user interfaces is disclosed. One embodiment comprises adjusting a graphical user interface in response to a tilt of a device. In this way, a graphical user interface may have viewable content not shown in a first view, where the viewable content may be displayed in a tilt...

Motion Adaptive User Interface Service

Motion adaptive user interface service is described. In embodiment(s), a user interface can be displayed on an integrated display of a device when an application is executed on the device. Context data associated with movement of the device can be received and used to determine an enhancement of the user interface f...

Simd Lapped Transform Based Digital Media Encoding/Decoding

A block transform-based digital media codec achieves faster performance by re-mapping components of the digital media data into vectors or parallel units on which many operations of the transforms can be performed on a parallel or single-instruction, multiple data (SIMD) basis. In the case of a one-dimensional lappe...

Video Conference Rate Matching

Video conference rate matching may be provided. A video conference server may receive video source streams from clients on a video conference. The server may analyze each client""s capabilities and choose a video stream to send to each client based on those capabilities. For example, a client capable of encoding and...

Rendering Rss Subscriptions On A Calendar

Rendering RSS subscriptions on a calendar may be provided. First, an RSS feed may be received by an RSS client. The RSS feed may contain a data item associated with an event date. A recipient computer running an electronic calendar program may display the received data item on the surface of an electronic calendar. ...

Providing Recent History With Search Results

A system, method, and medium are provided for presenting a user-interface to a user during a search session that includes information about the user""s search history during that search session. A search session is instantiated, and search queries, search results, user selections of search results, and other informa...

Video Conferencing Subscription Using Multiple Bit Rate Streams

Subscriptions in a video conference may be provided using multiple bit rate streams. A video conference server may receive video streams from each client in a video conference and may receive subscription requests from each client. The subscription requests may include requests to see video streams from specific oth...

Adapter For Bridging Different User Interface Command Systems

A user interface that may utilize two different command routing protocols may be provided. The two different command routing protocols may comprise a first command routing protocol and a second command routing protocol. The first command routing protocol may use a pull model. The second command routing protocol may ...

Data Visualization Interactivity Architecture

A data visualization interactivity architecture may be provided. The architecture may allow the creation of a data visualization, such as a chart, and may expose an interactive feature on the visualization. The architecture may provide integration with multiple rendering platforms. When a user selects the exposed fe...

Control Function Gestures

Techniques  involving  control  function  gestures  are  described.   In  an implementation, a control function is identified in response to gesture input at a touch screen of the remote control device. Execution of the identified control function is initiated a client device that is communicatively coupled to the ...

Extensible Activation Exploit Scanner

An extensible activation exploit scanner may have a modular structure, such that capabilities of the activation exploit scanner may be updated easily. The extensible activation exploit scanner may include an exploit data file, at least one detection module, at least one response module, and a base scanner. The expl...

Client Side Attack Resistant Phishing Detection

ABSTRACT CLIENT SIDE ATTACK RESISTANT PHISHING DETECTION A phishing detection client component and method is provided. The component can be employed as part of a system to detect and, optionally prevent phishing attacks. The phishing detection client component can provide password reuse event report(s), for exampl...

Enhanced Voicemail Usage Through Automatic Voicemail Preview

Textual preview of a voicemail is generated and provided through email or similar media to users along with the audio version. Transcription of the textual version, as well as additional capabilities such as actionable terms, playback-jump, switching between text and audio versions, direct or metadata based searchab...

Virtual Page Turn

One or more pages are displayed on a touch display. A page-turning gesture directed to a displayed page is recognized. Responsive to such recognition, a virtual page turn is displayed on the touch display. The virtual page turn actively follows the page-turning gesture. The virtual page turn curls a lifted portion o...

Hardware Encrypting Storage Device With Physically Separable Key Storage Device

Storage devices can provide for hardware encryption and decryption of data stored by them. The hardware cryptographic functions can be applied with reference to cryptographic information of a communicationally, and physically, separable key device. Disconnection of the separable key device can render encrypted data ...

Indexing And Searching Dynamically Changing Search Corpora

Tools and techniques for indexing and searching dynamically changing search corpora are provided. These tools may receive requests to upload documents over a network to an online document repository, and present a user interface to facilitate the upload. The user interface may include devices that are responsive to ...

Touch Sensitive Computing Device And Method

Touch sensitive computing systems and methods are provided. The touch sensitive computing device may include a touch sensitive display configured to receive a touch input. A gesture recognition module may be coupled with the touch sensitive display, and may be configured to receive the touch input. The gesture recog...

Permission Based Document Server

ABSTRACT Detailed herein is a technology which, among other things, identifies and provides an audience-appropriate version of a document, upon request. In one approach to this technology, a request for the document is received at a document-specific access point associated with that document. This document reques...

Bi Modal Multiscreen Interactivity

A touch-sensitive electronic display device including one or more touch-sensitive display screens and interface software. The touch-sensitive display screen(s) and interface software are configured to be responsive to touch inputs and, in the case of a multi-screen workspace, the interface software is operable to al...

Multiple Content Protection Systems In A File

Supporting a plurality of content protection systems in a single container file. The protection systems share an encryption method which is accessible from a sample encryption box in the file. Each of the protection systems stores, in a protection system header box, information for decrypting the content in accordan...

Name Challenge Enabled Zones

NAME CHALLENGE ENABLED ZONES ABSTRACT OF THE DISCLOSURE [0031] A method and system for implementing name challenge enabled zones is described herein. A DNS server receives an update from a client device. If the DNS server hosts an authoritative zone for the update, the DNS server determines whether there is a rec...

Two Tiered Text Recognition

ABSTRACT TWO TIERED TEXT RECOGNITION Systems and methods that exploit unique properties of a language script (e.g., condition joining rules for Arabic language) to enable a two tier text recognition. In such two tier system, one tier can recognize predetermined groups of linked letters :hat are connected based on j...

Conversation Rights Management

Conversation rights for multi-modal communications are managed and enforced in an enhanced communication system. Through physical and/or software components, rights are assigned to a communication session and related components upon user request. Permitted participants of the session are provided access tools such a...

Passive Security Enforcement

Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user"s interactions with the computing system. The technology may increase or decrease an authentication or authoriz...

Identifying Malware In A Boot Environment

Generally described, the present invention is directed at identifying malware. In one embodiment, a method is provided that performs a search for malware during the boot process. More specifically, the method causes a software module configured to scan for malware to be initialized at computer start up. Then, in res...

Displaying Multiple Row And Column Header Areas In A Summary Table

A data analysis program receives a selection of data fields defining multiple row header areas and/or multiple column header areas for display in a summary table. Data is read from a data source containing values for the data fields and transformed into summary level data for building the summary table. A display is...

Defining Simple And Complex Animations

A unified user interface ("UI") is provided that includes functionality for defining both simple and complex animations for an object. The unified UI includes a UI for defining a single animation for an object and a UI for defining a more complex animation. The UI for defining a single animation for an object includ...

Rdp Bitmap Hash Acceleration Using Simd Instructions

Systems, methods and computer readable media are disclosed for a vectorized tile differencing algorithm for a remote desktop protocol (RDP). A server executes a CBC-variant vectorized hash algorithm that is used to produce a big key that identifies the tile, and keeps track of these big keys. Where a serial version ...

Techniques For Variable Resolution Encoding An Decoding Of Digital Video

Techniques for variable resolution encoding and decoding of digital video arc described. An apparatus may comprise a video encoder to encode video information into a video stream with a base layer and an enhancement layer. The base layer may have a first level of spatial resolution and a first level of temporal reso...

Content Rendering On A Computer

Portions of content are transformed into portions of rendered content. While the portions of the content are being transformed into portions of the rendered content, each discrete portion of the rendered content can be provided to the application program after that portion is completed. Fig. 1 ...

Traffic Information Adaptive To A User's Travel

A system, method, and computer-readable medium for providing a traffic information service user with traffic information adaptive to the user"s travel are described. The user"s origin information, such as departure location and departure time, are identified. Upon identifying the user"s origin information, the user"...

Boot Negotiation Among Multiple Boot Capable Devices

A first device discovers the capabilities of a second device. The first device determines which of the first device and the second device is to execute a controlling boot image based at least in part on the capabilities of the first device and the second device. A first boot image is executed by the first device whe...

Recognition Architecture For Generating Asian Characters

Architecture for correcting incorrect recognition results in an Asian language speech recognition system. A spelling mode can be launched in response to receiving speech input, the spelling mode for correcting incorrect spelling of the recognition results or generating new words. Correction can be obtained using spe...

Hierarchically Organized Control Galleries

A computing system provides a graphical user interface having hierarchically- organized control galleries. The computing system displays the graphical user interface on a display device. The graphical user interface contains a document area and a control ribbon. The document area contains at least a portion of a doc...

Database Application Navigation

A database server application program is provided that is configured to provide a programmable interface into a database application by way of database services uniform resource locators (URLs). A database services URL utilized by the database application can be updated programmatically by program code executing ...

Media Content Retrieval System And Personal Virtual Channel

A system is disclosed for media content search and retrieval, and a virtual television channel capable of using that system. A first aspect of the present system relates to a media download control engine which enables a client device with limited capabilities to play media content which comes from a website in a fo...

Conserving Call Logic During Handoff

Conserving call logic during hand off may be provided. First, a call may be received at a first server. Next, the first server may determine that it cannot handle the call. Then the call may be transferred by the first server to a second server with enough information so that the second server can take up the call w...

Model Based Multi Tier Authentication

Authentication is widely used to protect consumer data and computing services, such as email, document storage, and online banking. Current authentication models, such as those employed by online identity providers, may have limited options and configurations for authentication schemes. Accordingly, as provided here...

Column Organization Of Content

Column organization of content is described. In an implementation, a mobile communications device configures a user interface to include a plurality of representations of content arranged according to a plurality of columns that permits navigation between first and second said columns upon detection of a gesture inp...

Portable Secure Computing Network

As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network connection. A proxy server is installed on a first computing device and shared encryption keys are generated for the first device ...

Managing Potentially Phishing Messages In A Non Web Mail Client Context

Computer-readable media and computerized methods for governing treatment of digital communications (e.g., emails and instant messages) upon identifying the communications as potentially phishing emails are provided. A service provider is employed to control behavior of an account that is assigned to an intended reci...

Load Balancing Across Layer 2 Domains

The present application relates to network configurations and specifically to scalable load balancing network configurations. One implementation includes an external client coupled to a scalable load balancing system. The scalable load balancing system includes a load balancing layer that is configured to encapsulat...

Spectrum Assignment For Networks Over White Spaces And Other Portions Of The Spectrum

Functionality is described by selecting a channel in an environment in which non-privileged entities have subordinate access rights to spectrum compared to privileged entities. The functionality operates by identifying spectrum that is available to all nodes involved in communication (where the nodes are associated ...

Making An Optic With A Cladding

Embodiments related to making an optic comprising a cladding are disclosed. One example embodiment comprises forming a wedge-shaped light guide having opposing first and second faces and comprising a material having a first refractive index. The embodiment further comprises applying a cladding layer to the first fac...

Real Time Retargeting Of Skeletal Data To Game Avatar

Techniques for generating an avatar model during the runtime of an application are herein disclosed. The avatar model can be generated from an image captured by a capture device. End-effectors can be positioned an inverse kinematics can be used to determine positions of other nodes in the avatar model. FIG.5 ...

"Activation System Architecture"

Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The...

Transport Pipeline Decryption For Content Scanning Agents

Transport pipeline decryption may be provided. Consistent with embodiments of the invention, a protected message may be received and decrypted. The decrypted message may be provided to pipeline agents, such as anti-virus, anti-spam, journaling, and/or policy enforcement agents. The message may then be re-encrypted a...

In Call Contact Information Display

Call control information regarding a phone call that a user of a mobile communications device is currently engaged in with an individual is displayed on a screen. A request to display in-call contact information is received, and in response to the request the in-call contact information regarding the individual is d...

Key Management In Secure Network Enclaves

A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associ...

Integrating Updates Into A Social Networking Service

Embodiments of the present invention relate to systems, methods, and computer readable media for providing to a first user of a first social-networking site information associated with a second user of a second social-networking site, where the second user is not registered at the first social-networking site. In so...

Mobile Device Which Automatically Determines Operating Mode

A mobile device such as a cell phone is used to remotely control an electronic appliance such as a television or personal computer. In a setup phase, the mobile device captures an image of the electronic appliance and identifies and stores scale-invariant features of the image. A user interface configuration such as...

Context Based Interaction Model For Mobile Devices

A context-aware mobile device such as a cell phone automatically determines appropriate user interface (UI) settings to implement at different times and/or locations. A behavior of the mobile device is tracked by determining locations visited and UI settings which are manually configured by the user. Patterns in the...

Secure And Private Backup Storage And Processing For Trusted Computing And Data Services

A digital escrow pattern is provided for backup data services including searchable encryption techniques for backup data, such as synthetic full backup data, stored at remote site or in a cloud service, distributing trust across multiple entities to avoid a single point of data compromise. In one embodiment, an oper...

Software Extension Analysis

Multiple structured extension definitions can be obtained, each structured extension definition corresponding to one or more categories, and each structured extension definition being written in a software extension language. Data representing one or more registrations maintained in a format native to a registration...

Mobile Communications Device User Interface

A mobile communications device user interface is described. In an implementation, a method is implemented by a mobile communications device that includes outputting a user interface having a portion that is configured to accept content. When an option is selected in relation to the portion to initiate a communicatio...

Controlling Ad Delivery To Mobile Clients

Systems and methods for controlling ad delivery to mobile clients while maintaining user privacy are herein provided. One exemplary method involves a location broker service. The method includes receiving, at an ad delivery service, a location use token from a mobile client, which may be a single use token. The meth...

Managed System Extensibility

One or more extension registrations are received for each of multiple software components installed on a computing device. The one or more extension registrations identify the software components as providers of functionality. A record of the one or more extension registrations for each of the multiple software comp...

Persistent Media Playback

Persistent media playback techniques are described. In an implementation, a media player is served via a network for display by a browser of a device. Web pages are served via the network for display by the browser of the device. Each of the web pages is configured for integration with the media player so that the m...

Optical Medium With Added Descriptor To Reduce Counterfeiting

Functionality is described for reducing the unauthorized reproduction of optical media, such as optical discs of various types. The functionality operates by adding a physical descriptor to an optical medium, forming reference descriptor information based on the descriptor, signing the reference descriptor informati...

Mobile Media Device User Interface

A mobile media device user interface is described. In one or more implementations, output of a plurality of audio content is monitored by a mobile media device. Each of the audio content was received via a respective one of a plurality of broadcast channels by the mobile media device. A user interface is displayed o...

Visual Representation Expression Based On Player Expression

Using facial recognition and gesture/body posture recognition techniques  a system can naturally convey the emotions and attitudes of a user via the user""s visual representation. Techniques may comprise customizing a visual representation of a user based on detectable characteristics  deducting a user""s temperamen...

Bringing A Visual Representation To Life Via Learned Input From The User

Data captured with respect to a human may be analyzed and applied to a visual representation of a user such that the visual representation begins to reflect the behavioral characteristics of the user. For example, a system may have a capture device that captures data about the user in the physical space. The system ...

Table Of Contents For Search Query Refinement

ABSTRACT TABLE OF CONTENTS FOR SEARCH QUERY REFINEMENT Computer-implemented methods and a computing system are provided for presenting a new user interface paradigm which allows users to explore facets related to a search query term while maintaining the original state of the search query term or staying within ...

Power Efficient Object Detection With Selective Polling

Detecting the absence of tagged objects near a computing device and attempting to locate the absent, tagged objects using other computing devices in a power-efficient manner. The computing device is monitored for triggering conditions. Upon occurrence of at least one of the triggering conditions, the computing devic...

Imager For Constructing Color And Depth Images

A dual-mode includes a light source configured to project a structured illumination from which visible light can be filtered. The dual-mode imager also includes a detector configured to capture both the structured illumination and visible light from the scene. A temporal or spatial filter is used to selectively bloc...

Low Latency Cacheable Media Streaming

A low latency streaming system provides a stateless protocol between a client and server with reduced latency. The server embeds incremental information in media fragments that eliminates the usage of a typical control channel. In addition, the server provides uniform media fragment responses to media fragment reque...

Assembling Streamed Content For On Demand Presentation

Assembling streamed content for on-demand presentation is described. In embodiments, a media asset can be requested from a content distributor, and cacheable segments of the media asset are streamed to the requesting client device. The cacheable segments are received in an initial quality display format for uninterr...

Content Based Image Search

Image descriptor identifiers are used for content-based search. A plurality of descriptors is determined for an image. The descriptors represent the content of the image at respective interest points identified in the image. The descriptors are mapped to respective descriptor identifiers. The image can thus be repre...

Multi Resolution Digital Large Format Camera With Multiple Detector Arrays

A large format digital camera has a primary camera system configured for collecting panchromatic image data and two or more secondary camera systems configured for collecting color image data. Each of the secondary camera systems has an optical system that has a longer focal length than the optical system of the pri...

Large Format Digital Camera With Multiple Optical Systems And Detector Arrays

A large format digital camera has a primary camera system configured for collecting panchromatic image data and a secondary camera system configured for collecting color image data. The secondary camera system has an optical system that has a longer focal length than the optical system of the primary camera system. ...

Configurable Connector For System Level Communication

A host device comprises a controller and connector. The host connector comprises fixed-function and multi-function pins. A first group of host connector pins comprises one or more of the fixed-function pins and a second group of pins comprises the remainder of fixed-function pins and multi-function pins. The host co...

Camera Navigation For Presentations

Techniques for managing a presentation of information in a gesture-based system, where gestures are derived from a user"s body position or motion in the physical space, may enable a user to use gestures to control the manner in which the information is presented or to otherwise interact with the gesture-based system...

Extending View Functionality Of Application

The viewing functionality of an application may be extended by use of an adapter. An application is instantiated and the application may provide a view box that contains a scrolling feature as part of its interface. The adapter uses the application "behind the scenes" to collect information in a way that is not visi...

Dynamic Contacts List Management

Contacts lists are dynamically managed in association with communication and collaboration applications and devices. Automated and user defined factors are determined based on information from various resources such as user profile contact information past communication information application / device types and com...

Cellular Service With Improved Service Availability

A cellular communication system in which overload of a base station is averted by offering users the option to communicate using a spectrum outside of the spectrum allocated for cellular communication. Incentives are offered to connect to the base station using the alternative spectrum which may not support communic...

Managing Power Provisioning In Distributed Computing

One or more computers manage power consumption in a plurality of computers by repeatedly evaluating power consumption of pluralities of computers such that any given plurality of computers is evaluated by aggregating indicia of power consumption of the individual computers in the given plurality. The evaluation iden...

Automated Story Generation

Automatic story production is implemented by the utilization of theme scripts with user assets to generate a quality finished product with minimum user input or direction. A user chooses a predesigned theme script to be applied to the user s assets to automatically create a story with a particular look and feel. Met...

Method And System For Reliable Protocol Tunneling Over Http

The embodiments described herein generally relate to methods and systems for tunneling arbitrary binary data between an HTTP endpoint and an arbitrary destination. Such tunneling of data is valuable in an environment for example in which a browser based client communicates in the HTTP protocol and desires to exchang...

Dynamic Configuration Of Connectors For System Level Communications

A host device comprises a configurable connector. The host device connector can be connected to a configurable connector of an accessory device. The host device can select connector functions to be enabled for connecting to the accessory device connector. The selection of connector functions can be based on accessor...

Automated Recovery And Escalation In Complex Distributed Applications

Alerts based on detected hardware and/or software problems in a complex distributed application environment are mapped to recovery actions for automatically resolving problems. Non mapped alerts are escalated to designated individuals or teams through a cyclical escalation method that includes a confirmation hand of...

Product Synthesis From Multiple Sources

Methods and systems for automatically synthesizing product information from multiple data sources into an on line catalog are disclosed and in particular for automatically synthesizing the product information based on attribute value pairs. Information for a product may be obtained via entity extraction feed ingesti...

"System And Method For Providing Feedback On Game Players And Enhancing Social Matchmaking"

A service that receives feedback from players in a game playing service. Tl service provides an aggregation of the feedback so that a reputation score can be determined by various players in the system. The service takes into account direct feedback from other players about positive and negative experiences w...

Real Time Hd Tv/Video Ip Streaming To A Game Console

Program code enabling the streaming of HD content in real-time to a game console is stored on a storage medium remote from the game console. The game console executes software that facilitates transfer of the program code from the remote storage medium to the game console. The program code ensures that sufficient ba...

Connecting Wireless Devices To Wireless Network

The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the ...

Claim Based Content Reputation Service

In some embodiments a database may store a plurality of content claims for previously evaluated data items with each of the plurality of content claims being associated in the database with a corresponding stored digital fingerprint of a previously evaluated data item. One or more servers may be configured to receiv...

Direct Wireless Client To Client Communication

A wireless station is connected to a wireless network through an access point and can establish a direct client-to-client connection to a second wireless station. The wireless station can communicate directly with the second wireless station without involving the access point. The wireless station communicates with ...

Remotely Controlling Playback Of Content Stored On A Device

A system, method, and computer-readable media are disclosed for remotely controlling playback of content stored on a device. The system, method, and computer-readable media can transmit state-based commands from a host unit to the device in order to control playback of the content. The host unit can control playback...

Unified Architecture For Remote Network Access

A unified architecture for enabling remote access to a network is provided. The network may comprise, as examples, a virtual private network (VPN) and/or a peer-to-peer network. In one embodiment, the architecture includes components installed on a client device/node and a gateway/supernode. Components implemented o...

Frequency Segmentation To Obtain Bands For Efficient Coding Of Digital Media

Frequency segmentation is important to the quality of encoding spectral data. Segmentation involves breaking the spectral data into units called sub-bands or vectors. Homogeneous segmentation may be suboptimal. Various features are described for providing spectral data intensity dependent segmentation. Finer segment...

Leader Arbitration For Provisioning Services

Single leader provisioning is enabled through a locking mechanism in a directory service environment. A service running in a domain is enabled to take leader role by writing to a shared file maintained at a relative identity (RID) master server. The service taking the leader role is further enabled to extend its rol...

Identifying Trending Content Items Using Content Item Histograms

Within a content item set particular content items may be identified as trending based on changes in a frequency of references to the content items. For example users of a social network may reference web resources by posting the uniform resource locators (URLs) thereof in messages and trending web resources may be ...

Alternative Semantics For Zoom Operations In A Zoomable Scene

A scene comprising a set of visual elements may allow a user to perform "zoom" operations in order to navigate the depth of the scene. The "zoom" semantic is often applied to simulate optical visual depth wherein the visual elements are presented with different visual dimensions and visual resolution to simulate phy...

Generation And Application Of A Sub Codebook Of An Error Control Coding Codebook

GGPGPGPThere is provided a method of encoding and decoding data using an error control code having a codebook . The codebook is a sub codebook of a codebook . Each codeword g in the sub codebook G has an autocorrelation amplitude that is different from and higher than each correlation amplitude between g and each of...

Presenting Availability Statuses Of Synchronized Objects

The objects of an on object set may be synchronized across many clients (e.g. various devices may synchronize files of a mirrored filesystem). However the synchronization of an object may be complicated and an object may not yet be synchronized in the object set of a client for many reasons such as an incomplete rec...

Unified Reconnection To Multiple Remote Servers

Techniques are disclosed for connecting a user to all of his resources (e.g. remote desktop or remote application) in a deployment of server farm(s). The user s client sends a message to the deployment requesting any disconnected resources for the user and/or any active resources communicating with a different clien...

"Decision Theoretic Web Crawling And Predicting Web Page Change"

1. A computer implemented system that facilitates web-crawling, comprising at least a processor, one or more memories with following components stored thereon: a managing component that performs a predictive analysis to predict when a web page will change, and determines when, and how to perform web-crawling; a serv...

Using A Flexible Rights Template To Obtain A Signed Rights Label (Srl) For Digital Content In A Rights Management System

Content is encrypted according to a content key (CK) to result in (CK(content)) and the content key (CK) is protected according to a public key for a license server (PU-RM). Rights data is retrieved from a rights template to be associated with the content, and rules for modifying the retrieved rights data are also r...

Asynchronous Channel For Displaying User Interface Elements.

A system is for use in printing data on a printer. A client interfaces with an applications program that has print capability. A print server in communication with the client controls a printing of data communicated to the print server by the client. A user interface manager communicates with the print server by an ...

"Routing In Peer To Peer Networks"

A method comprising receiving at one of a plurality of nodes in a peer-to-peer network, an indication of a change in membership by another said node in the peer-to-peer network, and broadcasting a report that describes the change, and for receipt by each said node referenced in a routing table included in the one sa...

"System And Methods For Novel Real Time Audio Visual Communication And Data Collaboration"

A system that facilitates real-time information exchange between users in a conference environment, comprising: at least two Data Clients that receive conference-related information and present it to respective users, each Data Client comprising a user interface with a Presentation Chute icon therein; and a Room S...

Hosted Application As A Designer In An Integrated Development Environment

Architecture that integrates an unmanaged application as a hosted application into a design environment in a coherent yet usable manner such that the developer can use the hosted application"s native functionality yet leverage rich productivity features provided by the IDE. The IDE includes a hosting component that ...

A Method And System For Recovering Password Protected Private Data Via A Communication Network Without Exposing The Private Data'

A system and method for securely roaming private data from a first client computer to a second client computer linked via a communication network. A user of the first client computer executes a home client application and designates private data for roaming. The home client application generates a first key in respo...

Systems And Methods For Providing An Enhanced Graphics Pipeline

An enhanced graphics pipeline is provided that enables common core hardware to perform as different components of the graphics pipeline, programmability of primitives including lines and triangles by a component in the pipeline, and a stream output before or simultaneously with the rendering a graphical display with...

Data Overlay, Self Organized Metadata Overlay And Application Level Multicasting.

A data overlay is built as a data structure on a logical space defined by a distributed hash table (DHT) in a peer-to-peer network. The data overlay includes a tree having tree nodes that each have a zone mapped to a corresponding DHT node in the logical space of the DHT. The logical space of the DHT is mapped to ma...

"Displaying A Security Element With A Browser Window"

The present invention provides a method and system for providing a security element that is directed at inhibiting malicious activity by displaying a browser window in such a way that the user can trust and know the source of the window. Additional information and ornamentation is displayed on the window to help ens...

"Dynamic Window Anatomy"

A computer readable medium storing a data structure defining a window for drawing on a desktop representation displayed on a display device, comprising: a first data field storing base content object properties for a base content object of the window; and a second data field storing content object properties for a...

Distributed Hosting Of Web Content Using Partial Replication.

The mechanisms described herein are directed at hosting content of a web site on multiple computing devices. A relative importance for each file associated with the web site is calculated. This relative importance is used to calculate several subsets of the content which are distributed to several devices within a...

"Method And Apparatus For Document Processing"

Modular content framework and document format methods and systems are described. The described framework and format define a set of building blocks for composing, packaging, distributing, and rendering document-centered content. These building blocks define a platform-independent framework for document formats that ...

"Interactive Exploded Views From 2 D Images"

A reproduction apparatus adapted to selectively reproduce data from a first recording medium having a program area collaterally storing program numbers and the passed-by addresses of each program in addition to information on the programs stored on it and a controlled area for controlling the start address of...

"Graphical User Interface For 3 Dimensional View Of A Data Collection Based On An Attribute Of The Data"

A three-dimensional (3D) view of a data collection based on an attribute is disclosed. A timeline is provided for displaying files and folders. The timeline may include a focal group that displays detailed information about its contents to me user. Remaining items on the timeline are displayed in less detail and may...
In an Item-based system, Images (e.g., JPEG, TIFF, bitmap, and so on) are treated as core platform objects ("Image Items" or, more simply, "Images") and exist in an "Image Schema" that provides an extensible representation of an Image in the system—that is, the characteristics of an Image and how that Image relates ...

"Web Service Application Protocol And Soap Processing Model"

Described is a web services application protocol (WSAP) comprising a SOAP-based protocol that defines a web service application model based on a set of common message operations. WSAP provides a foundation for defining web services in terms of how they interact with each other. In WSAP, the behaviors of a service ar...
Various embodiments of the present invention are directed to conflict handling for conflicts that occur in a peer-to peer synchronization system, where the ability to correctly and effciently handle conflicts minimizes data loss while retaining good usability and reduces the need for user intervention during synchro...

"Systems And Methods For Running A Legacy 32 Bit X86 Virtual Machine On A 64 Bit X86 Processor"

The present invention provides a virtualized computing system and methods for transitioning in real time between LONG SUPER-MODE and LEGACY SUPER-MODE in the x86-64 architecture. In doing so, a virtual machine, which relies on the traditional 32-bit modes, i.e., REAL MODE and PROTECTED MODE (V86 SUB-MODE, RING-0 SU...

"Email Manger"

An email manager for an inbox directs emails to various categories based on importance assigned by an email recipient and provides a user interface for presenting emails to the recipient in groups prioritized by importance. In one implementation importance is based in the sending source and in one implementation imp...

Unified Policy Over Heterogenous Device Types

A system and method are disclosed for enforcing a normalized set of policy based behaviors across two or more disparate client devices. The policy definition can be a common description of expected behavior while a client side policy engine interprets and implements platform specific details associated with the clie...

"Workflow Services Architecture"

An automated workflow services system can accommodate a wide variety of workflow scenarios. A composition service, a constraint service, and a tracking service can be provided to client programs. The composition service can support client-directed instantiation of actions for activity flows. Activity flows can be ba...

"Method For Providing Security To An Application"

The present invention provides an efficient application oriented security model. Prior to execution, an application is authenticated, and security information associated with the application is retrieved. The security information is than used to generate a token that is attached to the application. The security info...

Creating, Inserting, And Reusing Document Parts In An Electronic Document

A method, system, and computer-readable medium are provided for creating, inserting, and reusing document parts in an electronic document. According to a system, a word processing application program receives a selection of a document part category. In response to the selection of the document part category, a galle...

"Gain Constrained Noise Suppression"

A gain-constrained noise suppression for speech more precisely estimates noise, including during speech, to reduce musical noise artifacts introduced from noise suppression. The noise suppression operates by applying a spectral gain G(m, k) to each short-time spectrum value S(m, k) of a speech signal, where m is the...

"Ensuring That A Software Update May Be Installed Or Run Only On A Specific Device Or Run Only On A Specific Device Or Class Of Devices"

Described is a system and method in which a system and method in which a device manufacturer or software image provider controls which devices are allowed to install or to run a software image. An image keying mechanism uses UUID and package data associated with the device or class of devices to key an image. Becaus...

Creating File Systems Within A File In A Storage Technology Abstracted Manner

Described is a system and method used in manufacturing computer devices, in which a single manufacturing image file contains an internal partition and file system layout into which individual operating system component packages are written. The image file is independent of any particular storage technology. To gener...

Method For Providing A Simulated Off State In A Computing Device

1. A method of providing a simulated off condition in a computing device, said method comprising: receiving a signal to power off the computing device; notifying system components of a low power request; and reducing power consumption of said system components to a low power state such that said computing device ...

Common Scrambling

A method, comprising; analyzing a transport stream; and preparing the transport stream for processing that bypasses encrypted portions of the transport stream.

"System And Method For Managing And Communicating Software Updates"

A system and method for facilitating the selection and implementation of software updates while minimizing the bandwidth and processing resources required te select and implement the software updates. In one embodiment, an update service controls aceess to software ......

"Mechanism For Obtaining And Applying Constraints To Constructs Within An Interactive Environment"

The present mechanism obtains constraints within an interactive environment, associates these constraints.with constructs, and then applies these constraints to the constructs when encountering the constructs. The constraints may be saved in metadata associated with the respective construct. The constraints may spec...

Selection Of Foreground Characteristics Based On Background

A text colorization system is described herein that automatically sets foreground text color based on one or more background colors over which the text is displayed. The text colorization system identifies a background color neighboring each pixel of a string of text. For each pixel region the system selects a color...

"Strategies For Pausing And Resuming The Presentation Of Programs"

An operation center stores a plurality of programs, sone of which are prerecorded, and some of which are in the process of being recorded. Pause and resumption functionality allows the user to pause the presentation of such programs using different pause, modes and to later resume the presentation of the programs. I...

Efficient Virtual Application Update

Efficient virtual application updating is enabled. An old version of a virtual application can be compared to a new version of the virtual application and updated as a function thereof. A file unchanged from the old version to the new version can be hard linked from the new version to the old version. For a changed ...

Strategies For Consuming Resource Items Based On A Resource Item List

Strategies are described for creating a resource item list, for transferring the resource item list from one user to another user or to another destination, and for retrieving resource items from an operation center based on resource descriptors specified in the resource item list. The resource item list can include...

"System And Method For Unified Navigation"

A navigation structure is generated at runtime based upon the hierarchy of a site. The navigation structure includes the ability to author specific links throughout the structure. These specific links or child objects allow the navigation structure to be customized while maintaining site organizatoin accordance to...

"System For Object Persistence In A Database Store"

A new persistence format for storing objects of a user defined type in a database store enables information about the structure of the type to be communicated to the store. This information enables a number of store optimizations, including direct structural access to members of the type. Specifically, metadata is e...

"Incremental Anti Spam Lookup And Update Service"

The present invention provides a unique system and method that facilitates incrementally updating spam filters in near real time or real time. Incremental updates can be generated in part by difference learning. Difference learning involves training a new spam filter based on new data and then looking for the differ...

"Secure Certificate Enrollment Of Device Over A Cellular Network"

A method and system authenticates and securely enrolls an untrusted device over a cellular network. In operation, a mobile device transmits an identifier (such as the phone number of the mobile device) via a communication transport over a first network (which may be untrusted or partially untrusted) network (such as...

"Systems And Method For Fragment Based Serialization"

A method and system for fragment-based serialization places one or more object members in fragments. Fragments may comprise a header and a payload. A header can provide useful information about the fragment, such as an indication of fragment type and an indication of fragment length. A payload may comprise one or mo...

"A System For Providing Web Services To Clients In A Network And A Method Thereof"

A system and method for automating the web service selection based on reputation information, to help negotiate a contractual web service binding between a client and a server. Reputation information may be schematized into behavioral attributes such as web service responsiveness, web service latency, web service u...

"Rules Framework For Definition And Execution Of End User Rules Logic"

A rules-based software architecture (100) that provides the infrastructure for the definition and execution of end-user rules logic. This enables end-user automation of data in a unified storage platform using simple IF-THEN rules. The architecture includes a monitoring component (102) that tracks items associated w...

"Data Input Panel Character Conversion"

An in-place data input panel provides a user with access to a list of alternate characters to which displayed characters may be converted. The data input panel provides an indicator, such as an indicator bar, corresponding to segmentation of the characters. A user can change the segmentation of the characters by exp...

"Methods And Systems For Editing Text"

User interfaces for editing text in pen-based computing systems include: (a) a display portion that displays text; and (b) a correction interface that displays an editable text portion corresponding to at least a portion of the text. The correction interface accepts input via a stylus to enable changes to the editab...

"System And Method For Recovery Units In Databases"

The creation of multiple recoverable units within a database allows a database partition to be reconstructed during maintenance and disaster recovery operations. A method of creating a recovery unit includes partitioning a database into at least two recovery units. A primary catalog of metadata relating to the logic...

Method For Acquiring A Publisher Use License Offline In A Digital Rights Management (Drm) System

A publishing using publishes digital content and issue to itself a corresponding digital publisher license to allow itself to render the published digital content. The publishing user is supplied with a publishing certificate from a digital rights management(DRM)server, where the publishing certificate allows the pu...

Multichannel Connections In File System Sessions

A multi connection information system is described herein that uses multiple connections to connect to a resource in a single file system session in a way that is controllable from protocols above a transport layer. The system also allows a single connection to be shared by multiple sessions. Sessions can be bound t...

"Personalized Folders"

The present systems and methods disclose a system for personalizing computer functionality. End-users are provided with tools to easily write rich and complex preferences, for example, by using a plurality simple IF-THEN prepositional logic. The preferences are then transformed into queries and executed efficiently ...

Method And Device For Adapting An Exponential Exponential Probability Model To A Data

A method and apparatus are provided for adapting an exponential probability model. In a first stage, a general-purpose background model is built from background data by determining a set of model parameters for the probability model based on a set of background data. The background model parameters are then used to ...

"Server Architecture For Network Resource Information Routing"

A media server in a Universal Plug and Play (UPnP) network includes a resource sharing service to govern the distribution of media resource information to rendering devices. The media server includes: a media service module operating in a clamped down user context (e.g., a local service user context) and configured ...

"System And Method For Encapsulation Of Representative Sample Of Media Object"

A system and related techniques relate to the retrieval of a media object list with associated properties from a media device such as a digital video camcorder, audio player or other source or device. According to embodiments the retrieved list or set of media objects and their attributes or properties, for example ...

"Automatic Tv Signal And Tuner Setup"

A system and methods perform an automatic TV signal/tuner setup in a tuner device (e.g., a PC, a personal video recorder, a set-top box, etc.) that has one or more tuners. The setup identifies the number of tuners in the device, whether the tuners are analog or digital, and what broadcast standard each tuner support...

"Embedding A Session Dession Description Message In A Real Time Control Protocol (Rtcp) Message"

Embedded within at least some Real-Time Control Protocol (RTCP) messages sent from a media content source to a recipient is a session description message (186) that describes a media presentation (186) being streamed to the recipient (102). The session description message (186) can be associated, for example, with o...

"Fast Startup For Streaming Media"

Fast startup for streaming media includes one or both of a technique for predictive start and a technique for switching delivery channel(s) during streaming. Predictive start allows a media content source to predict which media stream(s) are desired by the requesting client device and begin streaming those predicted...

"System And Methods For Synchronizing Computer Systems Through An Intermediary File System Share Of Device"

The invention is directed to systems and methods for the synchronization of two clients both utilizing a common storage platform (e.g., the new storage platform of the related inventions) to synchronize through an intermediary that is not using the same common storage platforrn {e.g., instead using a legacy storage ...

"Customized Epg Display With Visual Cues"

A TV viewer selects viewing interests and a corresponding highlighting from a user interface. An enhanced Electronic Programming Guide (EPG) display is output and includes TV shows, channels and time slots within a programming range. TV shows having characteristics that match the TV viewer’s selected viewing interes...

"Adartive Updates In Motion Compensated Temporal Filtering"

Techniques and tools are described for scalable video coding and decoding. For example, a video encoder and decoder perform adaptive operation in lifting-based motion-compensated temporal filtering, and inverse motion-compensated temporal filtering respectively. The encoder, in a prediction stage, computes a motion-...

"Method And Apparatus For Protecting Regions Of An Electronic Document"

A method and apparatus for protecting regions of an electronic document are provided. According to the method, the entire electronic document is protected. The selection of a region within the electronic document is received along with identity of one or more users authorized to freely edit the selected region. The ...

"Mechanism For Exposing Shadow Copies In A Networked Environment"

Described is a mechanism for exposing a volume shadow copy of a shared volume over a network to a remote client. A shared volume is accessed at a client computing system having a root. A volume shadow copy (or "snapshot") of the volume is identified as a child resource of the shared volume. The child resource repres...

"Adaptive Junk Message Filtering System"

The invention relates to a system lor filtering messages - the system includes a seed filter having associated therewith a false positive rate and a false negative rate. A new filter is also provided tor filtering the messages, the new filter is evaluated according to the false positive rate and the false negative r...

"Rtp Payload Format"

A data stream is encrypted to form encryption units that are packetized into RTP packets. Each RTP packet includes an RTP packet header, one more payloads of a common data stream, and a RTP payload format header for each payload and including, for the corresponding encryption units, a boundary for the payload. The p...

"Transaction Consistent Copy On Write Databases"

A database view of a database is created which provides a transaction-consistent view of an existing database at a previous time. Each database view contains all the information needed to, along with the primary database; determine the contents of the primary database at a previous time. The database view consists o...

Generating An Optimized Restore Plan

A restore advisor may generate and apply a recovery plan to restore a database to a specified point in time. A restore/recovery scenario may be specified; resources, and backups available may be specified and one or more optimized restore plans may be generated. One or more alternate plans may be requested. The plan...

"System And Method For Providing Secure Network Access"

Secure network access is provided by connecting a secure network provisioning device to a security authority, acquiring one or more network profiles, configuring one or more network interfaces of the secure network provisioning device with data corresponding to attributes of the acquired network profiles, switching ...

"Systems And Methods For Processing Collateral Content Associated With An Electronic Message"

Collateral content editor functionality may be provided to an electronic message application such that an electronic message interface includes an integrated collateral content editor interface for creating formatted and editable collateral content in–line within the body of an electronic message. The collateral con...

"A System And Method For Receiver Driven Streaming In A Peer To Peer Network"

A "PeerStreamer" provides receiver-driven peer-to-peer (P2P) media streaming for loosely coupled P2P networks. Peers in the network perform only simple operations, may cache all or part of the streaming media, do not collaborate with other peers, may be unreliable, and may drop offline or come online during any give...

"Communication Of Information Via A Side Band Channel,And Use Of Same To Verify Positional Relationship"

The present invention provides for trusted side-band communications between components in a computer system, so that use of the system bus may be avoided. Two components may be connected by means other than a bus (e.g., an infrared port, a wire an unused in, etc.), whereby these components may communicate without th...

"System And Methods For Joining The Correct Wireless Network"

A system and methods for joining the correct wireless network are provided. The invention allows a device connecting to an unsecure wireless network to choose the correct network from many available wireless networks which are in range. A piece of code is executed on one of the PCs already on the network, then the d...

"Vision Based Document Segmentation"

Vision-based document segmentation identifies one or more portions of semantic content of a document. The one or more portions are identified by identifying a plurality of visual blocks in the document and detecting one or more separators between the visual blocks of the plurality of visual blocks. A content structu...

"Device Service Provider Interface"

The subject invention provides a system and/or a method that facilitates interacting with a device component to provide uniform communication, discovery, and management. A device service provider interface (DSPI) component can provide a uniform manner to communicate and/or manage a radio frequency identification (RF...

"Architecture, Programming Model And Api's"

The subject invention provides a system and/or a method that facilitates employing a model based at least upon a framework, wherein the model can be utilized to build an RFID application. A receiver component can receive data, wherein a model component can create a model based at least in part upon the received data...

"Rfid Server Internals Design"

The subject invention provides a system and/or a method that facilitates implementing an RFID process by providing creation and/or execution of the RFID process as it relates to a provider(s) and the associated devices related to such provider(s). A receiver component can receive information relating to at least one...

Interactions With Contextual And Task Based Computing Environments

Concepts and technologies are described herein for interacting with contextual and task focused computing environments. Tasks associated with applications are described by task data. Tasks and/or batches of tasks relevant to activities occurring at a client are identified and a UI for presenting the tasks is generat...

Parallel Loop Antennas For A Mobile Electronic Device

A mobile electronic device, such as a smart personal object includes an antenna system for emitting and receiving signals. The antenna system includes at least two antennas electrically connected in parallel to define an equivalent circuit having a reduced inductance with a substantially unaffected induced voltage f...

"A System To Facilitate Extending Data Within An Rfid Network"

The subject invention provides a system and/or a method that facilitates extending data within an RFID network to a business application. An interface can receive real-time RFID data from a process with at least one device collection within the RFID network. An integration component can seamlessly expose such real-t...

"Method, System, And Apparatus For Providing Alert Synthesis In A Data Protection System"

A method for diagnosing problems with protection of a data source and recovery of the same. The method includes diagnosing a copy of data located at the storage location and diagnosing a temporal version of the copy of data. Based on the diagnosis it is determined whether an error or a warning was detected. If eithe...

System And Method For Generating An Orchestrated Advertising Campaign"

A system and related techniques host and serve selective, orchestrated advertising campaigns and other content to users depending on contributing advertisers" campaign strategies as well as use interests, prior history or experiences. According to embodiments, users may navigate to a Web or other network site which ...

"Organizing Resources Into Collections To Facilitate More Efficient And Reliable Resource Access"

The present invention extends to methods, systems, and computer program products for organizing resources into collections to facilitate more efficient and reliable resource access. Namespace managers communicate with one another to form a federation namespace infrastructure. The infrastructure can efficiently route...

"Redirection Of Streaming Content"

Redirection of streaming content is described. In an implementation, a method includes receiving a request at a client from another client, wherein the request is to redirect on-demand content being streamed from a head end to the other client and includes a bookmark that specifies a point in time during an output o...

Thin Film Inductor With Integrated Gaps

A thin film inductor according to one embodiment includes one or more arms; one or more conductors passing through each arm; a first ferromagnetic yoke wrapping partially around the one or more conductors in a first of the one or more arms the first ferromagnetic yoke comprising a magnetic top section a magnetic bot...

"Forming Intent Based Clusters And Employing Same By Search"

A method is provided for analyzing a plurality of search sessions to identify intent-based clusters therein. Each session comprises at least one received query from a user and a corresponding set of returned search results, and each set of search results includes or refers to at least one piece of content. Each clus...

"Maintaining Graphical Presentations Based On User Customizations"

A method and system for rendering graphics based on user customizations in a computer graphics application are disclosed. The customizations relate to various properties of one or more graphical elements in the graphic. Such properties include positioning, size, formatting and other visual attributes associated with...

"Interaction Of Static And Dynamic Data Sets"

A data organization system that utilizes associations, pointers and/or links in connection with novel container types is provided. A "list" is a container of items, like a folder, but is different in that a file or other data component can be accessed via multiple lists (whereas an item must appear in exactly one fo...

"Testing And Tuning Of Automatic Speech Recognition Systems Using Synthetic Inputs Generated From Its Acoustic Models"

A system and method of testing and tuning a speech recognition system by providing pronunciations to the speech recognizer. First a text document is provided to the system and converted into a sequence of phonemes representative of the words in the text. The phonemes are then converted to model units, such as Hidden...

"Synchronization For Smart Clients"

A Smart Client solution for an enterprise application (e.g., a Customer Relationship Management system) includes a base application (e.g., Microsoft Outlook), and add-in software that interacts with the base application. The add-in software allows the base application to be used to access data and functions of the e...

"System And Method For Determining Target Failback And Target Priority For A Distributed File System"

A system and method for organizing and sorting targets received in a referral response and for realizing a target fail-back and a target priority policy in a distributed file system is provided. In one embodiment, a sorting method includes receiving a referral response in the form of a list of targets that are sorte...

"Method And System For Merging Security Policies"

A method and system for combining and enforcing security policies is provided. The security system is provided with security policies that have process set criteria and associated rules. The security system combines the security policies by generating a rule list of the security policies and associated process set c...

"Efficient And Flexible Business Modeling Based Upon Structured Business Capabilities"

The present invention extends to efficient and flexible business modeling based upon structured business capabilities. A computer system receives a plurality of business modeling attributes representing different layers of a business. The computer system extracts business capability attributes from among the receive...

"Traffic Forecasting Employing Modeling And Analysis Of Probabilistic Interdependencies And Contextual Data"

Systems and methods are described for constructing predictive models, based on statistical machine learning, that can make forecasts about traffic flows and congestions, based on an abstraction of a traffic system into a set of random variables, including variables that represent the amount of time until there will ...

"Realizing Legally Binding Business Contracts Through Service Management Models"

Methods and apparatus for managing business interactions between opposing parties. Business interactions are mapped to service contracts. The service contracts are mapped to machine readable code. The machine readable code is defined by business transaction patterns and service interaction patterns. The machine read...

"Universal Serial Bus Device"

A Universal Serial Bus (USB) device may comprise a controller including a USB interface and a USB connector in communication with the USB interface. The USB device may also comprise a decision component for receiving a credential, and in response to a valid credential, for providing access to an operation of the USB...

"Configuring Network Settings Of Thin Client Devices Using Portable Storage Media"

A computer-readable portable media device is used for transferring network settings and other configuration data to a thin client network device to simply the task of configuring the thin client device for network connectivity and other functions. A configuration program on a personal computer assists a user in crea...

"Simplified Paxos"

A simplified fault tolerant algorithm is presented for operating a distributed computing system in a fault tolerant manner. A system comprising three computing devices need only have two devices agree to perform any proposed function. Thus, when soliciting a vote for a proposed function, a leader device can also sen...

"Generic Spelling Mnemonics"

[0034]    A system and method for creating a mnemonics Language Model for use with a speech recognition software application, wherein the method includes generating an n-gram Language Model containing a predefined large body of characters, wherein the n-gram Language Model includes at least one character from the pr...

"Rendezvousing Resource Requests With Corresponding Resources"

The present invention extends to methods, systems, and computer program products for rendezvousing resource requests with corresponding resources. Doubly linked sorted lists are traversed using modulo arithmetic in both directions. Sorted lists can be partitioned based on a multiple proximity metrics. Node routing t...

"Multilevel Device Capabilities Hierarchy"

Methods and systems for describing device capabilities are described. An exemplary schema is presented and constitutes the communication language between applications and devices. The schema is built on a framework that uses schema keywords to express the full set of user configurable capabilities for a particular d...

"Dynamic Summary Module"

A content page is configured by a user and located on a network. Changes made to the content page are automatically communicated with notifications to a group of contacts for the user. Only contacts with permission to view the content page, or the changed content, will receive the notification and have permission to...

"A Method For Generating High Dynamic Range Video And System Thereof"

A system and process for generating High Dynamic Range (HDR) video is presented which involves first capturing a video image sequence while varying the exposure so as to alternate between frames having a shorter and longer exposure. The exposure for each frame is set prior to it being captured as a function of the p...

A Computer Implemented Method To Manage Access To A Plurality Of Shared Storage Units

A system and method are described to programmatically manage access between one or more nodes (12) and a plurality of associated devices (16, 18, 20, 22), such as shared storage units. Each node (12) is programmed to include a data structure (40, 46), which identifies whether an associated device (16, 18, 20, 22) is...

"Reliably Transferring Queued Application Messages"

The present invention extends to methods, systems, and computer program products for reliably and securely transferring queued application messages. Application messages are (e.g.,. binary or text) encoded and then encapsulated in transfer messages, enqueue messages, and dequeue responses such that composable pro...

"Integrated Electronic Mail And Instant Messaging Application"

An application providing a common interface allowing access and login to a electronic mail system and instant messaging system. The application allows responding to an email using an instant message, replying to an instant message using an email, sending and receiving both email and instant messages from one applica...

"Personalization Of User Accessibility Options"

A computing environment can dynamically respond to user preferences and personal abilities by enabling computer users to configure their computing experience by implicitly gathering information about the users" needs. The system can detect users" issues during the natural course of interaction with the system and of...

"A System And Process For Controlling The Coding Bit Rate Of Streaming Media Data"

A system and process for controlling the coding bit rate of streaming media data is presented. This coding bit rate control involves dynamically adjusting the coding bit rate to control client buffer duration to prevent the buffer from underflowing, while keeping the average coding bit rate close to the average tran...

"Interface Infrastructure For Creating And Interacting With Web Services"

A web services namespace pertains to an infrastructure for enabling creation of a wide variety of applications. The infrastructure provides a foundation for building message-based applications of various scale and complexity. The infrastructure or framework provides APIs for basic messaging, secure messaging, reliab...

"Method And Apparatus For Secure Internet Protocol [Ipsec] Offloading With Integrated Host Protocol Stack Management"

The invention provides mechanisms for transferring processor control of secure Internet Protocol (IPSec) security association (SA) functions between a host and a target processing devices of a computerized system, such as processors in a host CPU and a NIC. In one aspect of the invention, the computation associated ...

"Management And Use Of Data In A Computer Generated Document"

NAMethods and systems provide for breaking a computer-generated document into a number of components where the components have explicit relationships with each other. A relationship representation is generated for the components of the document. A user may then navigate the relationships between the components to qu...

Extensible File System

An extensible file system format for portable storage media is provided.  The extensible file system format includes the specification of primary and secondary directory entry types that may be custom defined. The primary and secondary directory entry types can be further classified as critical and benign directory ...

"Analysis Alternates In Context Trees"

A system, method, data structure, and application programming interface is described that stores alternate recognition results in an ink tree lattice.

"System And Methods For Exposing Processor Topology For Virtual Machines"

The present invention is directed to making a guest operating system aware of the topology of the subset of host resources currently assigned to it At virtual machine boot time a Static Resource Affinity Table (SRAT) will be used by the virtualizer to group guest physical memory and guest virtual processors into vir...

"Extensible Architecture For Auxiliary Displays"

Described is a system and method by which an auxiliary computing device having an auxiliary display platform that displays information corresponding to data that originated on the main computer system may be extended by a device manufacturer. Extended hardware is added to the device, such as a radio receiver and/or ...

"Prescribed Navigation Using Topology Metadata And Navigation Path"

The subject invention provides a system and/or method that facilitates prescribing a navigation within an application utilizing a topology and a navigation path. The topology is created based upon received metadata and is a network of node objects and link objects. The navigation path is a sequential list over the t...

"A Computing System For Processing An Operation Comprising A Graphics Work"

Systems and methods for applying virtual machines to graphics hardware are provided. In various embodiments of the invention, while supervisory code runs on the CPU, the actual graphics work items are run directly on the graphics hardware and the supervisory code is structured as a graphics virtual machine monitor. ...

"Accelerated Channel Change In Rate Limited Environments"

Accelerated channel change (ACC) strategies are described for supplying a client module with media information by transitioning between a first delivery of media information provided by first delivery functionality and a second delivery of media information provided by second delivery functionality without exceeding...

"System And Methods For Securely Booting A Computer With A Trusted Processing Module"

In a computer with a trusted platform module (TPM), an expected hash value of a boot component may be placed into a platform configuration register (PCR), which allows a TPM to unseal a secret. The secret may then be used to decrypt the boot component. The hash of the decrypted boot component may then be calculated ...

"Reversible 2 Dimensional Pre /Post Filtering For Lapped Biorthogonal Transform"

An efficient lapped transform useable in digital media codecs is realized using a reversible 2-dimensional overlap operator for pre/post filtering that is applied on a staggered grid relative to a core transform. The 2-dimensional lapped operator is based on a separably applied 1-dimensional reversible lapped operat...

Improved Device Location Detection

One or more techniques and/or systems are disclosed for improving location awareness of a device. A device position can be determined (e.g. via GPS or location service) and this position can be used to identify a user experience that may be in an area around device such as within a desired position threshold. A near...

Grouping Personal Accounts To Tailor A Web Service

This document describes grouping personal accounts to tailor a web service. By grouping personal accounts a service provider may tailor a web service to multiple people based on information about those people.

"System And Method For Managing Computer Monitor Configurations"

Described is a method and system a system and method for dynamically and intelligently configuring a computer system"s video-related settings upon connection of a monitor, and/or reconfiguring upon disconnection. A monitor configuration may include one or more display mechanisms, their video settings, relative posit...

"Dispatching Network Connections In User Mode"

A listener operating in user-mode can dispatch control of a client connection to a listener without exposing system memory or other sensitive services or components. For example, a client component requests access to a network component through connection with a user-mode listener. Based on information contained in ...

"Referencing Objects In A Virtual Environment"

The present invention is directed generally toward referencing objects in a virtual environment. One aspect of the invention is directed toward a computer-implemented method for referencing an object in a virtual environment that includes receiving a command from a user to designate an object and designating the obj...

"System And Method For Reconciling Image Metadata"

System and methods are herein disclosed for reconciling image metadata in an image the between different metadata schemas, both in the utilization of said metadata by an application or device, as well as proactively reconciling conflicts when detected in said image file.  Several embodiments are directed to logicall...

"Flexible Licensing Architecture In Content Rights Management Systems"

A license is issued to a user as decryption and authorization portions. The decryption portion is accessible only by such user and has a decryption key (KD) for decrypting corresponding encrypted digital content and validating information including an identification of a root trust authority. The authorization porti...

"Client Side Presence Documentation"

Client-side presence documentation is implemented in an instant messaging architecture. In a described implementation, respective presence documents are stored locally at respective client devices. Accordingly, presence information can be shared and disseminated in accordance with a peer to peer paradigm. In another...

"Method And System Integrating Multiple Identies, Idenntity Mechanisms And Identity Mechanisms And Identity Providers In A Single User Paradigm"

Exemplary embodiments disclosed herein may include a method and system for integrating multiple identities and identity providers, including, receiving the security policy of a service provider, determining the attributes requested by the service provider, obtaining authenticated attributes requested by the service ...

"Coding Digital Media Content"

A digital media content (e.g., image, video, audio, etc.) encoder/decoder employs a spatially varying parameter to condition the application of an overlap pre-process and post-process to adjacent transform block edges for the spatial-domain lapped . This conditional application of Che lapped transform to sub-blocks ...

"System And Method For Establishing That A Server And A Correspondent Have Compatible Secure Email"

A discovery secret is transmitted from the source domain to the correspondent domain. The discovery secret includes a data element specific to the correspondent domain and. The discovery secret includes a source domain address to which the correspondent domain is permitted send a message in order to determine that a...

"Video Coding And Decoding"

Various techniques and tools for coding and decoding interlaced video are described, including (1) hybrid motion vector prediction for interlaced forward-predicted fields, (2) using motion vector block patterns, (3) selecting between dominant and non-dominant polarities for motion vector predictors, (4) joint codin...

"Reliable Request Response Messaging Over A Request Response Transport"

A reliable request-response mechanism allows a requesting computer system and a responding computer system in an established end-to-end connection to send and receive messages in a manner that the responding computer system processes a request as intended by the requesting computer system, such that all the mes...

"Trusted Third Party Authentication For Web Services"

The present invention extends to trusted third party authentication for Web services. Web services trust and delegate user authentication responsibility to a trusted third party that acts as an identity provider for the trusting Web services. The trusted third party authenticates users through common authentica...

"Determinig An Actul Amount Of Time A Processor Consumes In Executing A Portion Of Code"

Systems and methods are provided that determine the actual amount of time a processor consumes in executing a code portion. The actual execution time of a code portion may be accurately determined by taking into consideration context switches and/or overhead time corresponding to the code portion. Determining the ac...

Setting Permissions For Links Forwarded In Electronic Messages

A permission manager detects when the message including the link is forwarded and sends a notification to the author indicating that the message was forwarded to another recipient. A notification may also be sent to the recipient who received the forwarded message indicating that the author has been notified that th...

"A Unified Composition Engine For Providing Graphics Output In A Graphics Processing System"

The present invention is directed to a system and method lor a unified composition engine that in general, combines prevniusly separate composition services. The unified composition engine provides a composition service used both in-process in conjunction with applicaiioii programming interfaces (API s) and on the d...

"Extensible Content Identification And Indexing"

Innovative techniques for identifying and distinguishing content, such as commercials, can be used with means for marking key frames within the commercials to facilitate replacement of commercials and other programming segments in such a way as to provide improved focus and relevance for targeted advertising based o...

"Peripheral Device Driver Maintenance Scheme For Networked Peripheral Device Client"

A network peripheral device driver maintenance framework and corresponding method is disclosed. The framework includes a driver version identification level comprising a set of driver version descriptions. Each driver version comprises a set of component versions that make upon each particular driver version. A driv...

"System And Method For Providing Multi Version Compatible File Format"

The present invention can provide an extensible file format compatible with previous, current, and future versions of an application program. The present invention can comprise including file version watermarks in an original data file of an application program. The file version watermarks can indicate various prope...

"Enhanced Telephony Computer User Interface Allowing User Interaction And Control Of A Telephone Using A Personal Computer"

An enhanced telephony (ET) computer user interface that seamlessly integrates features of personal computer (PC) and a telephone into a coherent user interface. The user is provided with a rich variety of functionality that leverages the fact that the PC has considerably more processing power and greater access to v...

System With Composite Statistical And Rules Based Grammar Model For Speech Recognition And Natural Language Understanding.

The present invention thus uses a composite statistical model and rules-based grammar language model to preform both the speech recognition task and the natural language understanding task.

"Combining Use Of A Stepwise Markup Language And An Object Oriented Development Tool"

The present invention provides a system and method for combining VoiceXML with an speech application development tool such as SALT. In one aspect of the present invention, a VoiceXML module includes VoiceXML executable instructions. A SALT module includes speech application language tas to execute instructions ass...

"Virtual Connectivity Subscribe Notify Service"

A middle layer network protocol enhancement, virtual connectivity (VC) makes the network attachment point changes of local and remote peers transparent to applications that use network services. A virtual connectivity module local to each peer translates communication connection parameters from apparent to real and ...

"Distributed Query Engine Pipline Method And System"

A distributed query engine pipeline architecture comprises cascaded analysis engines that accept an input query and each identifies a portion of the input query that it can pass on to an execution engine. Each state rewrites the input query to remove the portion identified and replaces it with a placeholder. The rew...

"Assingning Textual Ads Based On Article History"

A method of selecting textual advertisements for display on a web page based on user history. In the method, a user accessing a web site is identified. Keywords in articles displayed on web pages viewed by the user are identified and stored in a user profile. The advertisements displayed on a current user selected w...

"System And Methods For Interfacing With Computer Devices"

The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands; combining the functionality a...

"Semantic Object Synchronous Understanding Implemented With Speech Application Language Tags"

A speech understanding system includes a language model comprising a combination of an N-gram language model and a context-free grammar language model. The language model stores informaion related to words and semantic information to be recognized. A module is adapted to receive input from a user and capture the inp...

Selective Preauthentication To Anticipated Primary Wireless Access Points

A wireless device that adaptively makes the determination of whether or not to pre-authenticate. If the wireless device is running an application that is sensitive to latency (also referred to herein as a low latency application), then pre-authentication is performed and latency is reduced during the switch between ...

"Managing Data With Backup Server Indexing"

Indexing functionality can be shifted to one or more backup servers in a backup system. In one implementation, a backup server can receive one or more data backups from one or more production servers. The backup server can then build or create one or more indexes at the backup server, which correspond to the co...

Multi Mode Multimedia Device And Computing System

A computing system that includes a main housing, a display, and a keyboard. The display is coupled to the upper surface of the main housing, an pivots about an axis that is approximately parallel to and towards the front surface of the main housing. In device mode, the keyboard is largely hidden within or under...

'Multi User Multi Input Application For Education "

A multi-user multi-input application for education is described. In one aspect, a user interface (UI) presenting pedagogical tasks of varied type and multiple cursors are presented on a single display. Each cursor is assigned to a particular user of multiple users. Actions associated with cursor control event data a...

'Solving Table Locking Problems Associated With Concurrent Processing"

Stored pages in an electronic database are re-ordered such that the data that is being requested by multiple processes is re-ordered to be spread over several different pages such that a lock on a first page will no longer lock processes from data on the locked page.

"Protected Contact Data In An Electronic Directory "

A sever application allows an administrator of a server to selectively designate contact data of a particular individual to be encrypted prior to storage in a shared electronic directory. The server application encrypts any designated content and stores the encrypted content in the shared electronic directory. The s...

"Multicurrency Display"

A computer-implemented method of providing information to a user is disclosed. The method includes providing a user interface that includes a data element containing a first numeric value. An input is received from the user and represents a selection of the data element. The input is responded to by disp...

"Business System Interface"

A business system interface for accessing data from a Line-of-Business (LOB) system from within an information worker productivity (IWP) application is provided. The business system interface includes an embedded business system user interface contained within a user interface of the IWP application. Also included, ...

"Generic User Interface Command Architecture"

Certain aspects of a generic user interface command architecture allow an application to host commands for presentation on a computing device. The commands can be written by the same designer or author as the application, or alternatively by other parties (e.g., by a third-party developer). Other aspects of the gene...

"System And For Dynamically Generating A Selectable Search Execution"

A system and related techniques accept user-inputted search terms to perform a search for files within a file system hierarchy. A user searches a current level of a file system (120) by entering a search term in a search term input box (112) of a user interface (104). A search box (114) is dynamically created and ma...

Health Based Access To Network Resources

A protection system is described herein that dynamically determines whether a computer system can access a particular resource based on a combination of a dynamic health state of the computer system and a dynamic reputation of the resource. When a user attempts to access a resource, the protection system intercepts ...

Web Front End Throttling

A server computer includes a performance monitor module and a throttling logic module. The performance monitor module includes performance monitors that monitor system parameters of the server computer. The throttling logic module determines whether a system parameter monitored by a performance monitor exceeds a pre...

Suspension And/Or Throttling Of Processes For Connected Standby

One or more techniques and/or systems are provided for assigning power management classifications to a process transitioning a computing environment into a connected standby state based upon power management classifications assigned to processes and transitioning the computing environment from the connected standby ...

"Method, System, And Apparatus For Maintaining User Privacy In A Knowledge Interchange System"

The most efficient water irrigation systems today for gardens and/or fields typically use dripping systems that release drops of water at certain distance intervals for example for about 30-60 minutes per day (for example every 30-100 cm of the pipe there is dropper that releases typically 2 litters of water per hou...

"Innovation In Coding And Decoding Macroblock And Motion Information For Interlaced And Progressive Video"

In one aspect, an encoder/decoder receives information (1905) for four field motion vectors for a macroblock in an interlaced frame-coded, forward-predicted picture and processes the macroblock using the four field motion vectors. In another aspect, a decoder decodes skipped macroblocks of an interlaced frame. Skipp...

Application Consistent Snapshots Of A Shared Volume

The present invention extends to methods systems and computer program products for creating a snapshot of a shared volume that is application consistent across various nodes of a cluster. The invention enables a snapshot of a volume to be initiated on one node which causes all applications in the cluster that use th...

"Entity Domains"

Strategies are described for organizing the runtime components of an application into an entity domain framework. The entity domain framework includes one or more entity domains arranged in a hierarchical fashion. Each entity domain further groups one or more components together in a hierarchical fashion. Each entit...

"Real Time Inking"

A system and process for ensuring the smooth flow of electronic ink (1203) is described. Dynamic rendering (1201) is give priority over other event handlers. Priority may be the use of one or more queues (1205, 1206) to order when events occur and may be performing dynamic rendering (1201) prior to other steps ...

"System And Method For Controlling Ranking Of Pages Returned By A Search Engine"

A system and method are provided for implementing a search engine to output search results scored for a particular user. The method includes receiving a set of input user search terms and accessing a set of input user preferences. The method additionally includes obtaining scored search results based on the set of s...

"A Method For Accelerated Video Decoding And System Thereof"

An accelerated video decoding system utilizes a graphics processing unit to perform motion compensation, image reconstruction, and color space conversion processes, while utilizing a central processing unit to perform other decoding processes.

Standard Gestures

Systems, methods and computer readable media are disclosed for grouping complementary sets of standard gestures into gesture libraries. The gestures may be complementary in that they are frequently used together in a context or in that their parameters are interrelated. Where a parameter of a gesture is set with a f...

"Image Processing Using Linear Light Values And Other Image Processing Improvements"

Strategies are described for processing image information in a linear form to reduce the amount of artifacts (compared to processing the data in nonlinear form). Exemplary types of processing operations can include, scaling, compositing, alpha-blending, edge detection, and so forth. In a more specific implementation...

"Out Of Band Keep Alive Mechanism For Clients Associated With Network Address Translation Systems"

Architecture for maintaining connection state of network address translation (NAT) devices by employing an out-of-band (OOB) technique externally to application connections without imposing additional requirements on the underlying native application(s). The OOB solution can be applied to arbitrary connections witho...

Data Management System

The subject invention provides a unique system and method that facilitates management and navigation of various data objects by making use of a unique time-line based navigation tool. In particular, objects can organized into a plurality of bands based on their respective subject matter. Each band can be created to ...

Device Dependent On Demand Compiling And Deployment Of Mobile Applications

To accommodate different types and versions of execution environments on mobile devices, requests for applications from a programmable device, such as a smart phone or other mobile device include status dat*' about the characteristics of the device. Information about the display, memory, storage, ar-d/or script engi...

Search Augmented Menu And Configuration For Computer Applications

Providing for search to facilitate discovery or access to configuration functions of a computer application is described herein. By way of example metadata can be appended to configuration functions of the computer application. A matrix correlating subsets of metadata with related configuration functions can facilit...

"Systems And Methods For Synchronization Of Items"

Various embodiments of the present invention are directed to systems and methods for synchronizing mixed elements (MEs) comprising structure data and unstructured filestreams between peer computer systems in a hardware/software interface system environment that does not permit snapshotting of large unstructured ME f...

Multi Condition Filtering Of An Interactive Summary Table

Technologies are described herein for allowing a user of an interactive summary table to specify multi-condition data filters to modify the data displayed in the summary table. A user interface is displayed to the user that allows the user to specify a multi- condition data filter. The specification of the multi-con...

"Multi Planar Three Dimensional User Interface"

A 10-Koot media user interface is herein described. A computer user interface may be designed for primary use as a 10-Foot user interface, where a user controls the compute1' using a remote control device, instead of as a traditional 2-Foot user interface where the ase-controls the computer using keyboard and mouse ...

"A Method For Improved Vertical Handoff"

A system and method for improved vertical handoff between different types of wireless network. Network allocation vector occupation and packet collision probability are used as quality of service measures, enabling vertical handoffs to be delayed until actually beneficial to quality of service. Improved wireless net...

"Server Assisted And Peer To Peer Synchronization"

Systems and methods for synchronizing data between endpoints using elements of centralized and decentralized synchronization systems and communication topologies are disclosed. Such systems and methods may in some cases synchronize some subset of data with a centralized endpoint while another subset of data is synch...

"File Conversion In Restricted Process"

Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed wi...

Cloud Edge Topologies

The description relates to cloud edge topologies. Some aspects relate to cloud edge applications and resource usage in various cloud edge topologies. Another aspect of the present cloud edge topologies can relate to the specification of cloud edge applications using a temporal language. A further aspect can involve ...

"Organizing Electronic Mail Messages Into Conversations"

The present invention extends to methods, systems, data structures, and computer program products for organizing electronic mail messages into conversations. Electronic mail conversation items store attribute values representing attributes of corresponding electronic mail conversations and included electronic mail m...

"System For Receiving And Responding To Knowledge Interchange Queries"

A method, system, and apparatus are provided for receiving and responding to knowledge interchange ("KI") queries KI queries are search queries directed to database of KI profiles A KI profile identifies the interests of a user, the individuals with which a user has communicated, and the topics on which communicatio...

Mechanism To Convey Discovery Information In A Wireless Network

MECHANISM TO CONVEY DISCOVERY INFORMATION IN A WIRELESS NETWORK ABSTRACT Discovery of services between devices is provided prior to establishing a connection between devices, including wireless-enabled devices or devices that are communicatively coupled to wireless access points or other wireless communication dev...

Transitioning Between An Editing View And A Backstage View Of An Electronic Document

Transitioning between an editing view and a backstage view of an electronic document may be provided. A user interface may be displayed on a computer which includes an editing view of the electronic document. The computer may then receive an input in the editing view for transitioning from the editing view to the ba...

Facilitating System Service Request Interactions For Hardware Protected Applications

Described herein are implementations for providing a platform adaptation layer that enables applications to execute inside a user mode hardware protected isolation container while utilizing host platform resources that reside outside of the isolation container. The platform adaptation layer facilitates a system serv...

Context Sensitive Searches And Functionality For Instant Messaging Applications

In the context of an instant messaging application, a conversation is analyzed and contextually or textually relevant keywords and/or phrases are identified. Keywords or phrases are highlighted in a visually-identifiable manner for selection by an individual participating in the conversation. Once selected by an ind...

Intelligent Tiers Of Backup Data

The claimed subject matter relates to systems and/or methodologies that facilitate intelligent distribution of backup information across storage locations in network-based backup architectures. A virtual layering of backup information across storage locations in the backup architecture can be implemented. Statistica...

Detecting Touch On A Curved Surface

Embodiments are disclosed herein that are related to input devices with curved multi-touch surfaces. For example, in one disclosed embodiment, a method of making a multi-touch input device having a curved touch-sensitive surface comprises forming on a substrate an array of sensor elements defining a plurality of pix...

"Location Based Call Control"

An architecture is presented that automatically detects a location of a user and forwards messages to a pre-configured number associated with the detected location. A location system is provided that comprises a location component and a routing component. The location component publishes presence information of a mo...

"Selectively Utilizing A Plurality Of Disparate Solid State Storage Locations"

A method for selectively utilizing a plurality of disparate solid state storage locations is disclosed. The technology initially receives class types for a plurality of disparate solid state storage locations. The characteristics of the received data are determined. The received data is then allocated to one of the ...

"Context Sensitive Caching On Removable Storage"

A method and apparatus is described for receiving and storing data from a first host device and performing actions or events on a second host device based on the stored data. Also, a priority factor value may be determined for the stored data such that actions or events performed on the second host device may be bas...

Smooth, Stateless Client Media Streaming

An adaptive streaming system is described herein that provides a stateless connection between the client and server for streaming media playback in which the data is formatted in a manner that allows the client to make decisions and react more quickly to changing network conditions. The client requests uniform chunk...

Distributed Load Balancer

Systems and methods that distribute load balancing functionalities in a data center. A network of demultiplexers and load balancer servers enable a calculated scaling and growth operation, wherein capacity of load balancing operation can be adjusted by changing the number of load balancer servers. Accordingly, load ...

Detecting Touch On A Curved Surface

Embodiments are disclosed herein that are related to input devices with curved multi-touch surfaces. One disclosed embodiment comprises a touch-sensitive input device having a curved geometric feature comprising a touch sensor, the touch sensor comprising an array of sensor elements integrated into the curved geomet...

"Systems And Methods For Providing Synchronization Services For Units Of Information Anageable By A Hardware/Software Interface System"

Several embodiments of the present invention employ synchronization adapters for synchronizing information between "WinFS" and non-"WinFS" data sources. Examples of adapters include an adapter that synchronizes address book information between a "WinFS" contacts folder and a non-WinFS mailbox. In these instances, ad...

"Method And System For Creating And Laying Out A Graphic Within An Application Program."

A method, apparatus, and computer-readable medium are provided for creating and laying out a graphic within a drawing application program. The method includes receiving a data model defining a set of data and data relationships to be represented in the graphic, receiving a graphic definition describing the mapping o...

"An Extensible Framework For Designing Workflows And A Rad Style Rehostable, Ink Enabled, Customizable Workflow Designer"

A user interface for building a componentized workflow model. Each step of the workflow is modeled as an activity that has metadata to describe design time aspects, compile time aspects, and runtime aspects of the workflow step. A user selects and arranges the activities to create the workflow via the user interface...

"Signaling And Use Of Chroma Sample Positioning Information"

Rules for the signaling and interpretation of chroma position are described. One rule, called the short rule, defines fifteen discrete chroma centering positions and corresponding four-bit syntax element. Another rule, called the extended rule, defines 81 discrete chroma centering positions and corresponding seven-b...

"Publishing The Status Of And Updating Firmware Components"

A read-only management object is created to contain information rela10g| firmware components that can be updated. This information includes a component identifier, a component version and a user-friendly name for the component. The information also includes a state identifier that indicates a state of a device ...

Ad Targeting Based On User Behavior

In accordance with embodiments of the present invention, systems and methods for providing customized advertising content are provided. When a user is browsing a webpage, client script code embedded in the webpage monitors the user"s mouse and keyboard activity, for example, the time it takes the user to click on a ...

Filtering Of Data Layered On Mapping Applicaitons

ABSTRACT FILTERING OF DATA LAYERED ON MAPPING APPLICA I IONS Provided is a mapping application that displays detailed data information as a function of multiple sets of layered data. When portions of at least two sets of layered data overlap, a set opcraiion is applied to the overlapping portions to create a new se...

Composing Message Processing Pipelines

The present invention extends to methods, systems, and computer program products for composing message processing pipelines. Embodiments utilize intra-pipeline communication links to physically and/or temporally decouple pipeline stages, configure branching message flows, and bridge protocols. The use of intra-pipel...

Sharing And Transferring Message Content Between Users

Messaging content that is associated with a user is selected for sharing and transferring with one or more other recipients. A user may select all/portion of the messaging content to transfer. For example a user may select a single folder from their mailbox their entire mailbox one or more conversation threads one o...

Audio Presentation Of Condensed Spatial Contextual Information

Aggregated data associated with a geographic area may be obtained. The aggregated data may be dynamically distilled to obtain a presentation set of data based on a dynamically changing geographic location associated with the geographic area. A transmission of a stream of personalized audio data that is based on the ...

Virtual Keyboard With Slider Buttons

A computing system includes a touch display and a virtual keyboard visually presented by the touch display. The virtual keyboard includes one or more slider buttons, and each slider button includes a plurality of touch-selectable items. The computing system further includes a touch-detection module configured to rec...

Maintaining Undo And Redo Capability Across Metadata Merges

A method is presented for preserving metadata during an undo operation at a client computer. A first section of a document is modified on a word processing application on the client computer by performing one or more user actions in the first section of the document. While modifying the first section of the document...

"Containment Of Worms."

A containment system may include generating and/or sending an alert as the basis for safely sharing knowledge about detected worms. An alert may contain information that proves that a given program has a vulnerability. The alert may be self-certifying such that its authenticity may be independently verified by a com...

Cross Slide Gesture To Select And Rearrange

Cross slide gestures for touch displays are described. In at least some embodiments cross slide gestures can be used on content that pans or scrolls in one direction to enable additional actions such as content selection drag and drop operations and the like. In one or more embodiments a cross slide gesture can be p...

Search Based System Management

Search based system management may be provided. A management interface comprising a search input element and a result list element may be displayed. A keyword may be received via the search input element and a plurality of matching configuration properties associated with the received keyword may be identified. At l...

Employing User Context In Connection With Backup Or Restore Of Data

The claimed subject matter relates to architectures for facilitating network- accessible or local backup or restore features in a manner that leverages event-oriented contextual information associated with one or more users of the data to be backed up or restored. In particular, a first restore-based architecture ca...

Unified Interface For Configuring Multiple Networking Technologies

Network and connection provisioning framework for configuring and provisioning aspects of network connectivity (e.g., multiple networks, media types, and/or connections). The framework may comprise a unified configuration interface enabling an administrator to configure different types of network connectivity. A sin...

Multiple Bit Rate Video Encoding Using Variable Bit Rate And Dynamic Resolution For Adaptive Video Streaming

A video encoding system encodes video streams for multiple bit rate video streaming using an approach that permits the encoded bit rate to vary subject to a peak bit rate and average bit rate constraints for higher quality streams, while a bottom bit rate stream is encoded to achieve a constant chunk rate. The video...

"Secure Cross Platform Auditing"

A method and apparatus is described for recording or auditing events. In one example, a device is connected to a first host device and may receive data from the first host device. The first host device may further be connected in a network of devices. The device may be disconnected from the first host device and may...

"Synchronizing Files Among A Plurality Of Partner Computing Devices"

The present technique provides a combined file space for files from multiple partner computing devices. An individual cache policy associated with each partner computing device determines the manner in which the files in the combined file space are filtered for the respective partner computing device. Files data tha...

"Method And System For Identity Recognition"

A method of sending an identity information document comprising: selecting identity information from a self-identity information store for inclusion in the identity information document, wherein the selected identity information comprises a subset of identity information relating to the principal in the self-identi...

"Importation Of Automatically Generated Content"

The present invention is directed to a system (500) for automatically recording information indicative of actions of an author in completing steps in an overall task performed on a user interface (205). Recording systems (200) are used to record the steps taken to perform the task on different computers (502, 504) h...

Platform Extensibility Framework

A platform extensibility framework may be provided. A visualization platform may register feature extensions and receive requests to create objects. The objects may be created according to drawing instructions provided by the visualization platform, an application requesting the object's creation, and/or at least on...

On Demand Tab Rehydration

Various embodiments proactively monitor and efficiently manage resource usage of individual tabs. In at least some embodiments one or more tabs can be dehydrated in accordance with various operational parameters and rehydrated when a user actually activates a particular tab. In at least some embodiments rehydration ...

User Interface Having Zoom Functionality

A user interface having zoom functionality is described. In an implementation, a user interface is displayed having representations of a plurality of content. Each of the representations is formed using a respective piture-in-picture stream of respective content. When an input is received to select a particular one ...

"Metric Based Events For Social Networks"

Events occurring with respect to metrics are defined. When an event occurs with respect to a metric, a notification of the event is generated in a social network, such as an enterprise social network. The notification might include the name of a user associated with the event and the name of the event. Comments may ...

"Video Recording Conflict Management And User Interface"

The present invention generally relates to conflict management resolution. Typically systems for resolving conflicts between television programs with coinciding broadcast schedules use preferences, a confusing and limited display, or a combination thereof. The present invention, on thee other hand, provides for dete...

"Extensible Architecture For Untrusted Medium Device Configuration Via Trusted Medium"

An extensible architecture for untrusied medium (e.g., wireless) device configuration via trusted medium. The architecture can be employed to associate a device that-an uotrusted medium {e.g.. wireless connection). Association is effected using a trusted medium, for example, a wired connection. The architecture can...

Data Classification Pipeline Including Automatic Classification Rules

Described is a technology in which data items (e.g., files) are processed through an extensible data processing pipeline, including a classification pipeline, to facilitate management of the data items based upon their classifications. A discovery module locates data items to process. An independent classification p...

Language Independent Operating System Interface

Various embodiments provide an ability to describe independent of a programming language one or more interfaces associated with an operating system. Alternately or additionally a compiler associated with a specific programming language can be configured to map the independent interface description(s) to the specific...

Providing Content Items Selected Based On Context

Systems methods and computer storage media having computer executable instructions embodied thereon that provide content items selected based on context are provided. Contextual indicators associated with a user are identified and utilized to determine one or more content items that the user is likely to desire to a...

Compensating For Anticipated Movement Of A Device

Unified Support For Solid State Storage

In a method for providing unified support for solid state storage, a solid state storage class drive is provided to enable uniform operating system access to plurality of dissimilar solid state storage devices. A common functionality of the plurality of dissimilar solid state storage devices is abstracted via a soli...

Creating Host Level Application Consistent Backups Of Virtual Machines

ABSTRACT CREATING HOST-LEVEL APPLICATION-CONSISTENT BACKUPS OF VIRTUAL MACHINES A host server hosting one or more virtual machines can back up host volumes and the one or more virtual machines installed thereon in an application-consistent manner. In one implementation, a host-level requestor instructs a host-leve...

Visual Target Tracking

A method of tracking a target includes receiving an observed depth image of the target from a source and obtaining a posed model of the target. The model is rasterized into a synthesized depth image, and the pose of the model is adjusted based, at least in part, on differences between the observed depth image and th...

Multi Threaded Business Programming Library

A business programming library for use by an enterprise resource planning system provides a run-time environment and a library of API services for accessing common data types and business methods, accessing table and form meta-data, and database administration and retrieval/modification. The library provides the abi...

Fast Merge Support For Legacy Documents

A method is presented for merging document metadata at a client computer. A document obtained from a server computer is opened by a user at the client computer. If the document does not include paragraph identifiers, a paragraph identifier is assigned to each paragraph in the document. When the document is opened by...

Adaptive Quantization For Enhancement Layer Video Coding

Techniques and tools for encoding enhancement layer video with quantization that varies spatially and/or between color channels are presented, along with corresponding decoding techniques and tools. For example, an encoding tool determines whether quantization varies spatially over a picture, and the tool also deter...

"When Free Messaging"

The present invention relates to systems and methods that mitigate the intrusiveness of communications between message senders and receivers while facilitating more courteous, seamless, and timely interactions. In one aspect, instant messaging and other forms of communications, such as push-to-talk voice communicati...

Dual Module Portable Devices

A dual module portable device may be provided. A motion of a first module of the dual module portable device may be detected. Based at least in part on the detected motion, a position of the first module may be determined relative to the second module of the portable device. Once the relative position of the first m...

"Framework To Model Cross Cutting Behavioral Concerns In The Workflow Domain"

Selecting and applying a behavioral component to a portion of a componentized workflow. The behavioral component defines error and exception handling, among other concerns, to the portion of the workflow selected by a user. During execution of the workflow, the behavioral components executes responsive to output fro...

Method For Planar Implementation Of P/8 Gate In Chiral Topological Superconductors

Disclosed herein is a topologically protected p/8 gate which becomes universal when combined with the gates available through quasi particle braiding and planar quasi particle interferometry. A twisted interferometer and a planar p/8 gate in CTS implemented with the help of the twisted interferometer are disclosed. ...

Dynamic Placement Of Replica Data

The claimed subject matter relates to systems and/or methodologies that facilitate distributed storage of data. A distributed file system can be implemented on storage nodes such that the system places multiple copies of data (e.g., replicas) on a variety of disparate storage nodes to guarantee availability of the d...

Advertising Framework For Wireless Networks

An advertising framework for transmitting advertisements from wireless access points to client devices that need not be connected to the wireless access point. The client device can display the advertisements on a user interface of the client device. Such advertisements may be transmitted, for example, as part of a ...

Secure Software Product Identifier For Product Validation And Activation

Systems methods and apparatus for generating and validating product keys. In some embodiments a product key includes security information and identification information identifying at least one copy of a software product. The identifying information may be used to access validation information from at least one sour...

"Computational Complexity And Precision Control In Transform Based Digital Media Codec"

A digital media encoder/decoder includes signaling of various modes relating to computation complexity and precision at decoding. The encoder may send a syntax element indicating arithmetic precision (e.g., using 16 or 32-bit operations) of the transform operations performed at decoding. The encoder also may signal ...

Remote Access To Private Network Resources From Outside The Network

In some embodiments of the invention, techniques may make private identifiers for private network resources usable to establish connections to those private network resources from computing devices connected to an outside network. For example, when a computing device is connected to an outside network and attempting...

Processing Image Information Having Color Content

Strategies are described for processing image information using a data structure which conveys color information. The color information describes color-related formatting applied to the image information. The data structure can be passed down a video processing pipeline, where each functional component in the pipeli...

Computing Device With Configurable Antenna

A computing device with a configurable antenna. The antenna is configured through a switching circuit operating under software control. Operating characteristics of the antenna are configured based on connections between conducting segments established by the switching circuit, allowing the nominal frequency, bandwi...

"Method And Computer Readable Medium For Providing Spreadsheet Driven Key Pereormance Indiactors"

A method, system, apparatus, and computer-readable medium for providing spreadsheet-driven key performance indicators are disclosed. According to the method, a spreadsheet-driven key performance indicator is created that includes a location of a spreadsheet, a location of a cell within the spreadsheet to be utilized...

"Dynamically Rendering Visualizations Of Data Sets"

Computerized methods and systems for dynamically rendering visual representations of data sets are provided. Upon receiving a request for a particular data set (for instance, in response to receiving a search request), a data set is identified and a minimum portion thereof is retrieved that is necessary to render a ...

"Method For Accessing Web Data From Web Pages”

An application programming interface (API) layer is implemented on a computing device. The API layer allows a local application(s) executing on the computing device to access web data in a data store layer, and further allows a remote application(s) that is executing on some other computing device to access the web ...

A Ststem For Representing A Document And Method Thereof

Modular content framework and document format methods and systems are described. The described framework and format define a set of building blocks for composing, packaging, distributing, and rendering document-centered content. These building blocks define a platform-independent framework for document formats that ...

User Indicator Signifying A Secure Mode

Computer-readable media, computerized methods, and computer systems for alerting a user that an operating system has entered a secure mode is provided. Initially, inputs are received at an operating system residing in a default mode. Typically, the default mode allows applications running on the operating system to ...

Efficient File Hash Identifier Computation

Described is maintaining cached hash values for files in association with state data for each file that represents the state of that file"s contents at the time of hashing. For example, in a journaling file system, the state data may comprise the update sequence number of the file in the journal and a journal identi...

Spreadsheet Collaboration Between Rich And Browser Clients

Techniques for collaborating on a spreadsheet file by client computers in real time are disclosed herein. In particular, a revision manager module is preferably provided with a host machine which receives updates from the client computers, processes such updates, and then applies them to the spreadsheet file. Additi...

Input Pointer Delay

Various embodiments enable repetitive gestures such as multiple serial gestures to be implemented efficiently so as to enhance the user experience. In at least some embodiments a first gesture associated with an object is detected. The first gesture is associated with a first action. Responsive to detecting the firs...

Management Of External Hardware Appliances In A Distributed Operating System

Embodiments are provided to manage external hardware appliances from a distributed operating system interface in a computer network using a driver model to communicate with device drivers associated with the external hardware appliances. In one embodiment, a request to manage an external hardware appliance in the co...

"Centralized Service For Awakening A Computing Device"

Various technologies and techniques are disclosed for providing and interacting with a centralized wake service. A server-side wake service is provided that is operable to allow applications to subscribe to the wake service. The wake service receives a wake request directed to a particular computing device from a pa...

Cryptographic Key Containers On A Usb Token

A Universal Serial Bus (USB) compatible storage device is utilized as a security token for storage of cryptographic keys. A cryptographic subsystem of a processor accesses cryptographic keys in containers on the USB compatible storage device. Accessing includes storing and/or retrieving. The processor does not inclu...

Altering The Appearance Of A Digital Image Using A Shape

Technologies are described herein for altering the appearance of a digital image using a shape. A mask edit mode of operation is provided in which an application program displays a mask shape superimposed on a digital image. The application program also provides user interface controls for altering the size, positio...

Differential File And System Restores From Peers And The Cloud

Provided herein are systems and methodologies for highly efficient restoration in a network-based backup system. As described herein, differential-based analysis can be utilized such that a new complete differential is calculated based on signatures and/or other information relating to a given item to be restored pr...

Programming Model For Synchronizing Browser Caches Across Devices And Web Services

A computer user may use a computing environment comprising a set of computers that respectively feature a web browser having a browser cache containing many types of data objects, including application resources and user-generated data files. However, the contents of a browser cache significantly contribute to the c...

"Creating, Displaying, And Editing A Sub Process Within A Process Diagram"

Technologies are described herein for creating, displaying, and editing a sub-process within a process diagram. A diagramming application provides for the grouping of existing process operations of a process diagram into a sub-process. The sub-process is displayed within the process diagram as a container that may b...

Remote Access Between Upnp Devices

Universal Plug and Play (UPnP) technology may be used over the Internet or other wide area communications networks. In one illustrative example, a first UPnP-enabled device is to provide a UPnP service such as streaming media to various users over the Internet. The first UPnP-enabled device provides an on-line ident...

A Method For Facilitating A Multimedia Conference Event

Techniques to manage media content for a multimedia conference event are described. A media content manager component is operative to generate a visual composition for a multimedia conference event. The media content manager component may comprise a video decoder module operative to decode multiple media streams for...

"Implementation Of Concurrent Programs In Object Oriented Languages"

The present invention adds support for concurrency to a mainstream object-oriented language. Language extensions are provided that can enable program to be developed that can either be run in one address space, distributed across several process on a signal computer, or distributed across a local-area or wide-area n...

Document Length As A Static Relevance Feature For Ranking Search Results

Embodiments are configured to provide information based on a user query. In an embodiment, a system includes a search component having a ranking component that can be used to rank search results as part of a query response. In one embodiment, the ranking component includes a ranking algorithm that can use the length...

Sharable Distributed Dictionary For Applications

Architecture for providing and processing a dictionary in a universal format such as XML, for example. The dictionary can be authored while in the universal format, designated for use with multiple compatible applications, and compiled on-the-fly using a dictionary compiler. The dictionary can be shared and/or distr...

Media Timeline Interaction

Media timeline interaction may be provided. An electronic presentation may comprise a media object. A user may select the media object within a presentation application and use an on-object user interface in conjunction with the application's user interface to modify the media object. The user may also display the m...

Integration Of Pre Meeting And Post Meeting Experience Into A Meeting Lifecycle

Architecture that synchronizes meeting information (e.g., documents, agenda, action items, notes, attendees, join information, etc.) across the different stages of a meeting lifecycle. The architecture provides client-side synchronization across meeting lifecycle services that can include a scheduling server, conten...

Arranging Display Areas Utilizing Enhanced Window States

Computer-readable media, computerized methods, and user interfaces (UIs) for manipulating display areas on a GUI workspace by transitioning the display areas from an original state to one of a set of enhanced window states are provided. Initially, an indication to resize a display area is received at an operating sy...

"Techniques To Share Information Between Application Programs"

Techniques to share information between application programs are described. An apparatus may comprise a first appHcation program to create notes for an operator, and a second application program to display a target item. The apparatus may further include a note interface module to associate the note with the target ...

"Application Based Copy And Paste Operations"

Various embodiments provide application- or browser-based, copy and paste operations. In one or more embodiments, a web browser supports copy and paste functionality thus enabling the user to easily move data from one location to another. The browser-based solution can thus relieve websites from having to include co...

"Systems And Methods For Providing A System Lever User Interface In A Multimedia Console"

Systems and methods for providing a system level user interface that can be invoked at any time during operation of a multimedia console are provided, enabling a user to interact with system level user data and/or initiate secondary behaviors or functionality not normally possible to achieve when the multimedia...

"Data Driven Actions For Network Forms"

Systems and/or methods are described that enable a data-driven action associated with altering a data instance of a network form without altering and/or having access to the data instance. These systems and/or methods, in one embodiment, render a result of a data-driven action for a network form without transforming...

"Interface For Consistent Program Interaction With Auxiliary Computing Devices"

Described is a system and method including an auxiliary display platform having an interface (API) set that provides a way for client applications running on a main computer system to interact with various types of auxiliary displays, irrespective of differences between various device implementations. Interaction i...

Volume Adjustment Based On Listener Position

Volume adjustment based on listener position is disclosed. A position of one or more speakers is identified, and a position of a listener is tracked. For each of the one or more speakers, a changing distance between that speaker and the listener is assessed. A volume of that speaker is automatically adjusted in real...

"Strategies For Monitoring The Consumption Of Resources"

Strategies are described for monitoring resources (e.g., media resource) in a system that includes multiple processing mechanisms (e.g., set-top boxes) and multiple associated presentation devices (e.g., television sets). The strategies involve assigning one of the processing mechanisms the role of master processing...

"Method And System For Controlling Access Privieges For Trusted Network Nodes"

A system and method for controlling access to a computer provides for loose security within a local network while retaining strong security against external access to the network  In one embodiment, a user has access to trusted nodes in a secured group within an unmanaged network, without being required to choose, e...

Photographic Flicker Detection And Compensation

One disclosed embodiment includes detecting flicker in a photographic setting by introducing a camera into the setting so that light is incident upon the camera. A plurality of samples are captured from a light detector circuit of the camera, each of which is dependent upon intensity of light incident upon the camer...

Communication Channel Between Web Application And Process Outside Browser

One or more techniques and/or systems are disclosed herein for relaying a request to a process running on a computing device from a web client and receiving a response from the process. A bridge message client disposed in a web application, running in a browser on a computer, opens a local connection to a process ru...

Flyways In Data Centers

Described is a technology by which additional network communications capacity is provided to an oversubscribed base network where needed, through the use of dynamically provisioned communications links referred to as fly ways. A controller detects a need for additional network communications capacity between two ne...

"End Loaded Battery Carriage"

A battery carriage is provided, including first and second dual-contact assemblies. The first dual contact assembly is disposed on a body portion of the battery carriage and the second dual contact assembly is disposed on a separable portion of the battery carriage. Each dual contact assembly includes a positive con...

Skip Macroblock Coding

A computer-implemented method (1000, 1100, 1800) of processing one or more video images having plural units, wherein binary symbols indicate whether the plural units are skipped or not. According to the method, a coding mode is selected (1010, 1110) from a group of plural available coding modes. The binary symbols a...

Scalable Clustering

A scalable clustering system is described. In an embodiment the clustering system is operable for extremely large scale applications where millions of items having tens of millions of features are clustered. In an embodiment the clustering system uses a probabilistic cluster model which models uncertainty in the dat...

Providing Selected Data Through A Locked Display

Providing content and/or functionality through a display of a locked computing device. Configuration data defined by a user or application vendor identifies the content and/or functionality to be made available. Upon receipt of the content, the computing device modifies the received content based on the configuratio...

A System And Method For Managing Access To A Plurality Of Storage Units

A system and method are described to programmatically manage access between one or more nodes (12) and a plurality of associated devices (16, 18, 20, 22), such as shared storage units. Each node (12) is programmed to include a data structure (40, 46), which identifies whether an associated device (16, 18, 20...

Process Mode Independent Single Implementation Driver Model

Methods, systems, and computer program products that, by defining a common interface, allow for a single implementation of operations common to' both kernel mode and user mode processing, relative to a hardware adapter. Corresponding kernel mode and user mode implementations of the operations are provided. F...

Systems And Methods For Securing Video Card Output

The various methods and systems described herein are directed to3 supplying a secure channel for software executing on a host computer. The4 methods and systems address and provide solutions for an attack model in which5 rogue software executing on the host computer attempts t...

Method To Configure A Bluetooth Logical Link Control And Adaptation Protocol Channel

A technique to simplify L2CAP channel/configuration for a node is presented. The method enables a node to determine how involved it is in the L2CAP channel connection creation and management process. There are three levels of participation that the node may specify. The three levels are no involvement at all...

Reducing Buffer Requirements In A Messaging System

Methods, systems, and computer program products that reduce buffer requirements in a messaging system so that the messaging system can send or receive relatively larger messages using a given buffer size. Message handlers are provided, each identifying a corresponding processing operation to perform on a mes...

Enrolling/Sub Enrolling A Digital Rights Management (Drm) Server Into A Drm Architecture

NA

"Access To Audio Output Via Capture Service"

ABSTRACTACCESS TO AUDIO OUTPUT VIA CAPTURE SERVICEAn operating system has an audio system service that can capture all of thestreaming audio destined for an output device and make it available for processing.An application can perform the processing upon the captured streaming audio. ...

Packetization Of Fgs/Pfgs Video Bitstreams

A video encoding system performs packetization of FGS/PFGS encodedvideo bitstreams by selecting encoded bitstream segments for packetization basedon an estimated total contribution-to distortion^ reduction associated, with eachencoded bitstream segment. The selected bitstream segments are t...

Systems And Methods For Creating Virtual Network Topology

An architecture and methodology provides for automatic creation of arbitrary virtual network topologies form a physical computing system. The architecture and methodology allows automated and remote installation of multiple distributed applications on the same physical computing system without having to...

A Method For Joining A Personal Vlan In A System For Segregating Traffic Amongst A Plurality Of Stations

A method for segregating network traffic amongst a plurality of end stations incommunication with a network device comprising receiving from a first end station insaid plurality of end stations a request to crate a new personal VLAN at said networkdevice, wherein at least said first end sta...

Declarative Sequenced Report Parameterization

User values and selections are collected and provided to a report server that customizes a generically defined report pursuant to the user values and selections. An ordered set of report parameters is declared in the definition of a report and then this parameter definition is used to drive user prompting an...

"Web Based Speech Processing"

A method of interacting with aclient/server architecture with a 2.5G mobile phonehaving a data channel for transmitting data and avoice channel for transmitting speech. The methodincludes receiving a web page from a web serverpursuant to an application through the...

"Command Based Group Sms With Mobile Message Receiver And Server"

1. A command-based group text messaging system comprising:an initiating mobile communication device that creates a message forsubsequent broadcast to a recipient group; anda communication server that analyzes the message received from theinitiating mobile communication device a...

"Fault Detection And Diagnosis"

1. A method for detection and diagnosis of faults in a network comprising:detecting a discrepancy in operation of a network by:supplying data that describes the network to a network simulation (210) so that the network simulation provides an estimation of network performance (504); and

"Method For Power Management Of A Network"

A method for power management of a network including a plurality of computing devices, comprising:identifying an order of flows between one or more computing devices within a prescribed time period; andreducing a number of wakeups for at least one computing device by increasing a number of adjace...

"Universal Computing Device"

The universal input device provides a common user interface for a variety of different computing platforms including printed documents. Using the present system, one may use the universal input device to control various computing devices as well as capture handwritten electronic ink and have the electronic i...

"Update Distribution System Architecture And Method For Distributing Software"

A software update distribution system for distributing a software update over a communication network for distribution to client computers, comprising: a root update service node; and at least one child update service node; wherein the root update service node and the at least one child update service node a...

"System And Method For Securing A Coumputer System Connected To A Network From Attacks"

The present invention relates to a computer system and computer implemented method for securing computing devices connected to a network from attacks.

"Extensible Wireless Framework"

An extensible wireless framework for connecting to a wireless network is provided. The extensible wireless framework includes a network roaming service with a registration component and a network service component. The registration component registers extensible service modules and extensible drivers for pro...

"Method And System For Communicating With Identification Tags"

NA

Key Framing Of Animation Object And Attribute

A method of keyframing an object, comprising:identifying at least one property and a time for the object; creating a first compound key frame at the time; receiving a second time for the object; and creating a second compound key frame at the second time.

Predictive Lossless Coding Of Images And Video

Predictive lossless coding provides effective lossless image compression of both photographic and graphics content in image and video media. Predictive lossless coding can operate on a macroblock basis for compatibility with existing image and video codecs. Predictive lossless coding chooses and applies one ...

"Location Based Licensing"

The present invention provides a method and system for location-based digital rights management. Digital rights for protected content are restricted to a specific location or region by specifying the approved location of the consuming device within the license. This allows the content owner to specify the geographic...

Protection Of A Computing Device From Computer Exploits Delivered Over A Networked Environment

A network security module, interposed between a computing device and a network such that all network activities between the computing device and the network pass through the network security module, for protecting the computing device from an identified security threat on the network, the network security mo...

"Specialized Media Presentation Via An Electronic Program Guide (Epg)"

A device comprising:a search effectuator that effectuates a search responsive to selection of a link that is included as part of an electronic program guide (EPG);a search results scrubber that scrubs search results, which are in a first format, from the effectuated search to produce scrubbed sea...

Header Object Protection For A Data Stream

A header object (210) for a data file (200) is comprised of sub-objects (220, 230, 240, 250) which specify properties of the data stream and contains information needed to properly verify and interpret the information within the data object (290). In order to allow the protection of any set of sub-objects(22...

Advanced Navigation Techniques For Portable Devices

NA

Method For Linking Elements Of A Document To Corresponding Fields, Queries, And/Or Procedures In A Database

Methods and systems are provided for mapping and linking elements in a document to corresponding fields or queries in a database. A document is annotated with structural elements of a markup language, such as Extensible Markup Language (XML), in order to map portions of the document to the corresponding data...

"Computer Having Heat Sink For Noiseless Cooling"

A computer system uses a large heat sink to provide noiseless cooling, thereby avoiding the need for a conventional cooling fan that can be very noisy. The heat sink forms a part of a chassis that contains the motherboard and hard drive of the computer. The motherboard and hard drive are mounted in the chass...

System And Method For Checking And Resolving Publication Design Problems

A publishing program can provide continuous and real-time feedback on possible design problems while a document is being edited or created. The feedback can include displaying a user interface that has a real-time list of any design problems that may be a result of the current edits or creations in a documen...

Converting Text

Converting text may be provided. A user selectable element may be used to select text. The selected text may include a first text within an electronic document and a second text within an image. The second text within the image may be converted to character information by receiving the image. The image may have imag...

Processing Receipt Received In Set Of Communications

Receipts may be received at a location that a customer normally uses to receive electronic correspondence, such as an e-mail address, an instant messaging address, etc. Among the items that are sent to that location, those items that contain a receipt may be identified. The identified receipts, or information extrac...

Mining Phrase Pairs From An Unstructured Resource

A mining system applies queries to retrieve result items from an unstructured resource. The unstructured resource may correspond to a repository of network-accessible resource items. The result items that are retrieved may correspond to text segments (e.g., sentence fragments) associated with resource items. The min...

Social Browsing

A method described herein includes acts of extracting at least one entity from an arbitrary web page being viewed by an individual on a computing device and comparing the at least one entity with social network data of the individual, wherein the social network data comprises a plurality of messages generated by mem...

Enhanced Product Functionality Based On User Identification

A product key for a software product is obtained and an activation service is accessed by a device to activate the software product with the product key. A digital license associated with the software product is received from the activation service, and the digital license is bound to a set of user-identifying crede...

Lock Resolution For Distributed Durable Instances

The present invention extends to methods, systems, and computer program products for resolving lock conflicts. For a state persistence system, embodiments of the invention can employ a logical lock clock for each persisted state storage location. Lock times can be incorporated into bookkeeping performed by a command...

Memory Cache Data Center

A data center system includes a memory cache coupled to a data center controller. The memory cache includes volatile memory and stores data that is persisted in a database in a different data center system that is located remotely from the data center system rather than in the first data center system. The data cent...

User Role Based Customizable Semantic Search

User role based customizable searches where crawled documents may be evaluated against user roles or attributes during crawl time are provided. Metadata retrieved from searched documents may also be evaluated against the user roles and/or attributes such that customized search results ranking documents based on thei...

Shared Face Training Data

ABSTRACT SHARED FACE TRAINING DATA Face data sharing techniques are described. In an implementation, face data for a training image that includes a tag is discovered in memory on a computing system. The face data is for a training image that includes a tag associated with a face. The face data is replicated in a lo...

Determination Of Pairings On A Curve Using Aggregated Inversions

One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the mathematical pairings for the curve are aggregated (e.g. into a single inversion in respective levels of a binary tree represe...

Interactive Email

A system and method are disclosed for providing an extensible email having rich interactive browser capabilities. The system includes a service provider for receiving extensible emails from a third party platform and presenting the emails to a user s computing device. The extensible email includes URL metadata which...

Systems And Methods For Managing Drivers In A Computing System

Managed code, including applications, runtime, and driver, have a priori knowledgeof the client's exact hardware configuration, just as the JIT compiler has a priori knowledgeof the microprocessor type on the target computer system. At compile time, the compilerknows the effective version v...

Communicating Message Over Transient Connections In A Peer To Peer Network

[105] Systems and methods useful in communicating messages over a peer-to-peer network, optionally over transient connections to participants in a collaborative session (e.g., an "electronic whiteboard" session), are described. Examples of such systems and methods may include establishing a session for data...

"A Method And A System For Intermediate Representation For Multiple Exception Handling Models"

As described herein, an intermediate representation of a source code file may be used to explicitly express exception handling control flow prior to generating object code for the source code. As further described herein, a single uniform set of instructions of the intermediate representation may be used for express...

"Method And System For A Digital Device Menu Editor"

A method of creating a menu for a handheld digital device in a development environment includes selecting a target device which has an associated operating system available to the development environment. An editor is called for creation of the menu. The editor uses the constraints of the associated target device op...

Discovery Of Secure Network Enclaves

A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associ...

Catalog Based Software Component Management

Multiple software component identifiers are maintained in a catalog of an operating system running on a device. Each of these software component identifiers corresponds to one of multiple software components installed on the device. The catalog is accessed in response to a request regarding one of the multiple softw...

Health Reporting From Non Volatile Block Storage Device To Processing Device

Methods and devices are provided for adapting an I/O pattern  with respect to a processing device using a non-volatile block storage device based on feedback from the non-volatile block storage device. The feedback may include information indicating a status of the non-volatile block storage device. In response to...

Information Aggregation Service

Information aggregation techniques are described. In an implementation  a communication is received that includes an indication of a source of information associated with a non-member of the social network. Information associated with the non-member is aggregated from the source. The aggregation may be performed ...

Trademarks

Device

[Class : 9] Computer Programs For Developing Other Computer Programs; Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications; Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs; Computer Programs For Running Development Programs And Application Programs In A Common Development En...

Excel

[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Electronic Spreadsheets And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Electronic Spreadsheets; Providing Technical Information In The Field Of Computer Software And Cloud Computing.

Avatar Famestar

[Class : 9] Downloadable Software For Video Game Services.[Class : 42] Providing An Online Portal For Video Game&Nbsp;Services And&Nbsp;Social Networking

A (Device)

[Class : 9] Computer Database Management Software[Class : 42] Cloud Computing Featuring Software For Use In Database Management And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Database Management; Providing Technical Information In The Field Of Computer Software And Cloud Computing.

Instaload

[Class : 9] Battery Receptacles Featuring Dual Contact Assemblies To Allow Battery Installation Without Regard To Batter Polarity

Nuads

[Class : 35] Advertising Services, Namely, Promoting And Marketing The Goods And Services Of Others Through Online Interactive Video Games By Enabling Consumers To Interact With Third Party Advertising Content Through Voice Or Body Gestures Via Computer Game Console And Sensor Devices.

Aldhabi

[Class : 9] Computer Software For Generating Displaying And Printing Fonts

Talko

[Class : 42] Consulting, Design, And Development Services Related Thereto In The Field Of Software For Facilitating Communications And Information Storage And Sharing Among People, Groups, Software Programs And Devices; Software As A Service (Saas) Services, Namely, Hosting Software For Use By Others For Facilitating Communications And Information Storage And Sharing Among P...

Messaging (Device)

[Class : 9] Computer Software For Text And Multimedia Messaging.[Class : 38] Text And Multimedia Messaging Services.

Store (Device)

[Class : 38] Electronic Transmission Of Data Via The Internet And Other Computer And Electronic Communication Networks.[Class : 9] Operating System Software; Computer Software Enabling Users To Purchase, Download, Manage Software Applications For Mobile Devices, Portable Hand Held Devices, And Other Computing And Electronic Communication Devices.[Class : 35] Online Retail St...

Winoz (Label)

[Class : 9] Mobile Phones; Television Receivers; Monitors For Computers; Lap Top Computers; Computers; Digital Versatile Disc Players; Portable Hard Disk Drives; Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images; Computer Application Software For Mobile Phones; Audio Receivers; Colour Printers; Tablet Personal Computers; Settop Boxes; Mouses For Comput...

Windows To Go

[Class : 9] Computer Operating System Software

Music (Device)

[Class : 9] Computer Software For Downloading And Listening To Music And Other Audio Content.

Wedge

[Class : 9] Computer Peripherals

Logo

[Class : 9] Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically.[Class : 39] Electronic Storage Of Files And Documents For Others.[Class : 42] Providing Temporary Use Of Non Downloadable Software For Receiving, Displaying, Storing, Organizi...

Skype

[Class : 9] Computer Software, Namely Software For The Transmission, Recording, Reproduction, Display, Organization, Management, Manipulation And Review Of Messages, Text, Images, Files, Audio, Video And Audio Visual Content And Other Data For The Facilitation Of Communications Between Two Or Multiple Users Via Computer Networks, Communication Networks And The Global Informa...

P (Logo)

[Class : 9] Computer Software, Namely, Programs For Creating Presentations, Graphics And Videos.[Class : 42] Cloud Computing Featuring Software For Use In Presentation Graphics And Accessing Remotely Stored Data For Such Applications: Providing Temporary Use Of On Line Non Downloadable Software And Applications For Presentation Graphics: Providing Technical Information In Th...

Games (Device)

[Class : 9] Computer Software Enabling Access To Online Games.[Class : 41] Online Gaming Site, Providing Information About Games.

Skype

[Class : 9] Application Programming Interface (Api) For Computer Software Which Facilitates Online Services For Social Networking, Building Social Networking Applications And For Allowing Data Retrieval, Upload, Download, Access And Management; Computer Software To Enable Uploading, Downloading, Accessing, Posting, Displaying, Tagging, Blogging, Streaming, Linking, Sharing O...

Logo

[Class : 9] Computer Programs; Computer Software And Computer Programs For Use In Database Management, Electronic Spreadsheets, Designing, Creating, Editing And Publishing Documents, Note Taking, Email, Calendaring, Scheduling, Contact Information Storage And Management, Accounting, Customer Relationship Management, Project Management, Presentation Graphics, Desktop Publishi...

Bloodforge

[Class : 9] Computer Game Software

Infopath

[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Designing, Creating, Editing And Completing Electronic Forms And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Designing, Creating Editing And Completing Electronic Forms; Providing Technical Information In Th...

Sports (Device Of Cup)

[Class : 9] Computer Software For Viewing Information And Content About Sports.

Powerpoint

[Class : 9] Computer Software, Computer Programs, Particularly For The Preparation And Delivery Of Presentations Employing Graphics, Visual Aids, And Subject Outlines For Viewing Audiences

N (Device)

[Class : 9] Computer Software For Use In Note Taking, Namely, Computer Software For Recording, Organizing, Editing And Transmitting Audio And Visual Information And Images In Electronic Form; Computer Software For Viewing And Editing Meeting Agendas And To Do Lists; Computer Software For Reminding Users Of Dates And Events; Computer Software For Accessing Shared Documents O...

Xbox Smartglass

[Class : 9] Software For Allowing Communication And Interaction Between Phones, Mobile Devices, Televisions, Video Game Consoles, Media Players, Computers, Digital Media Hubs, And Audiovisual Devices.

Gunpowder

[Class : 9] Game Software.[Class : 41] Providing An Online Video Game.

Cleartype

[Class : 9] Computer Software For Use In Displaying Fonts On Computer Screens And Other Display Devices; Computer Programs For Use In Creating Programs To Display Fonts; Computer Programs, Namely Font Programs; Computer Software For Enhanced Pixel Rendering; Display Screens Optimized For Enhanced Pixel Rendering And Resolution.

Video (Device)

[Class : 9] Computer Software For Downloading And Viewing Video Content.

Device Of Squar

[Class : 35] Retail Store Services And Online Retail Services Featuring Computers, Computer Hardware, Software, Computer Games, Computer Peripherals, Portable Music Players And Accessories, Personal Digital Assistants, Cell Phones And Accessories, Video Game Consoles And Accessories, Webcams, Books, Clothing, Back Packs, Messenger Bags, Computer Bags And Novelty Items.

Maps (Device)

[Class : 9] Computer Software For Mapping And Directions.

Quantum Break

[Class : 9] Game Software.[Class : 41] Entertainment Services, Namely, Providing Online Video Games.

Windows

[Class : 9] Wireless Communication Devices,Namely ,Mobile Phones,Cellular Telephones,Personal Digital Assistants,And Hand Held Computers;Computer Software For Wireless Telecommunications For Use With Wireless Devices;Computer Operating System Software For Wireless Devices;Computer Operating System Software For Wireless Communication Device[Class : 38] Telecommunications Serv...

Crimson Dragon

[Class : 9] Game Software[Class : 41] Entertainment Services, Namely, Providing Online Video Games.

Fusion Sentient

[Class : 9] Computer Game Software[Class : 41] Entertainment Services,Namely ,Providing An On Line Computer Game.

Haunt

[Class : 9] Computer Game Software.[Class : 41] Entertainment Services, Namely, Providing An On Line Computer Game.

V (Device)

[Class : 9] Computer Software Program For Creating Drawings And Graphics

Powerpoint

[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Presentation Graphics And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Presentation Graphics; Providing Technical Information In The Field Of Computer Software And Cloud Computing

X (Device)

[Class : 9] Computer Software, Namely, Spreadsheet Software; Computer Programs For Creating Charts And Graphs From Electronic Spreadsheets[Class : 42] Cloud Computing Featuring Software For Use In Electronic Spreadsheets And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Electronic Sprea...

Leap Experience Pioneers

[Class : 9] Game Software.

Youthspark

[Class : 36] Providing Grants For Youth In The Fields Of Education, Training, Employment, And Entrepreneurship[Class : 41] Providing Information For Youths In The Fields Of Youth Education, Employment Training And Entrepreneurship Training; Providing Training Programs Relating To Opportunities For Youth In The Fields Of Education, Employment, And Entrepreneurship.

Windows Phone

[Class : 9] Wireless Communications Devices, Namely, Mobile Phones, Cellular Telephones, Personal Digital Assistants, And Hand Held Computers; Computer Software For Use With Wireless Communication Devices.[Class : 38] Telecommunications Services, Namely, Offering Personal Communications Services Via Wireless Networks.

Good Science

[Class : 9] Computer Programs, Namely Game Software For Use On Computer And Video Game Players

Hdinsight

[Class : 9] Computer Software: Computer Server Software; Computer Database Software.[Class : 42] Computer Services: Cloud Computing Services; Providing Information About Computers, Computer Software And Computer Servers: Online Computer And Computer Software Support And Troubleshooting Services: Services Related To Computer Server Software And Database Software.

Wintab

[Class : 9] Cameras; Portable Communications Apparatus; Set Top Boxes; Smart Phones; Notebook Computers; Digital Colour Printers; Computers; Television Receivers; Personal Portable Terminal Devices For Recording, Organizing, Transmitting, Manipulating, Reviewing And Receiving Text, Data, Images And Audio Files Relating To Health And Wellness; Wearable Smart Phones In The For...

Crimson Alliance

[Class : 9] Computer Game Software[Class : 41] Entertainment Services ,Namely ,Providing And On Line Computer Game.

Lifecam Director

[Class : 9] Computer Hardware, Namely, Computer Peripherals; Webcams.

Remix (Device)

[Class : 9] Feature Of Non Downloadable Software Application Tool For Use On Smart Phones And Tablets To Edit An Electronic Document[Class : 42] Non Downloadable Software Application Tool Used To Edit Electronic Documents On A Website"

State Of Decay

[Class : 9] Computer Game Software.[Class : 41] Entertainment Services, Namely, Providing, An On Line Computer Game.

Device

[Class : 9] Software For Creating And Managing Computer Template[Class : 42] Cloud Computing Featuring Software For Use In Designing, Creating, Editing And Completing Electronic Forms And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Designing, Creating Editing And Completing Electronic...

Galactic Reign

[Class : 9] Video Game Software[Class : 41] Providing A Website Through Which People Locate Information About Video Games; Entertainment Services, Namely, Providing Online Video Games.

Surface

[Class : 9] Computer Hardware; Computer Display And Input System Comprised Of A Projector, Camera And Computer Software For Displaying Images And Detecting Objects, User Gestures And Commands

Microsoft Office

[Class : 42] Web Site Hosting Services, Software Leasing Services, Consulting Services In The Fields Of Computers, Consulting Services In The Fields Of Computer Software, Consulting Services In The Fields Of Security And Authentication, Consulting Services In The Fields Of Telecommunications, Consulting Services In The Fields Of Electronics, Consulting Services In The Fields...

Webgrease

[Class : 9] Computer Software For Use In The Optimization Of Web Sites And Web Based Applications.

Halo Reach

[Class : 9] Computer Game Software

Device Mark

[Class : 42] Computer Services For Computer Networks And Global Communication Networks, Namely, User Identification, Registration And Authorization Services; Automating Login Procedures To Access Web Sites Or Internal Computer Networks; Encrypting And Securely Maintaining Personal And Financial Information And Data For Use In Electronic Commerce Transactions; Maintaining And...

Devhood

[Class : 9] Computer Software, Computer Programs, Namely Utility Programs And Programs To Assist Developers In The Creation And Modification Of Other Computer Programs.

Microsoft Enhanced (Label)

[Class : 42] Providing On Line Magazines In A Wide Variety Of Fields, Namely, News, Sports, Entertainments, Television, Video Games, Computer , Technology, And The Internet, Via Cable And Satellite Networks,Wireless Networks, Computer Network And Global Communication Networks, Computer And Technical Consulting And Support Services, Namely, Troubleshooting And Computer Hardwa...

Bitlocker To Go

[Class : 9] Operating System Software; Computer Utility Programs; Computer Software For Encryption; Computer Software For Restricting & Access To Data And Computer Programs Stored On External Data Storage Media;

Camera (Device)

[Class : 9] Computer Software For Accessing And Managing Camera Functions.

Microsoft

[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signaling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images, Magnetic Data Carries, Recording Discs, Automatic Vending Machines And Mechanisms For Coin Operated ...

Logo

[Class : 16] Publications, Namely, User Manuals, Instruction Guides, Referenc Guides, Newsletters, Magazines, Books About Computer Systems And Computer Programmes , Magazines And Newletters Distributed Over Computer Networks And Global Communications Network, Pens , Pencils Markers, Stationery,S Tationery Type Portfolios, Clipboards, Desk Sets,,Pen And Pencil Holders, Mounte...

Lifecam Cinema

[Class : 9] Computer Hardware And Peripherals; Webcams; Computer Software For Use As An Interface Between Webcams And Computers

Expo

[Class : 9] Computer Software[Class : 42] Online Computer Services

Cloud Window Or Wallpaper (Logo)

[Class : 39] Electronic Storage Of File And Documents For Other.[Class : 42] Non Dowloadable Software For Receiving, Displaying, Storing, Organzing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Image And Data Stored Electronically.

Label

[Class : 9] Computer Utility Software; Computer Software For The Detection And Removal Of Computer Viruses And Threats; Computer Software For Managing And Filtering Electronic Communications; Computer Software For Protecting And Securing Computer Network And Applications; Computer Software For Encrypting And Authenticating Data; Computer Software For Detecting And Repairing ...

Lifecam Show

[Class : 9] Computer Hardware And Peripherals; Webcams; Computer Software For Use As An Interface Between Webcams And Computers.

Device With Logo

[Class : 9] Computer Programs For Developing Other Computer Programs Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications; Computer Programs For Assisiting Developers In Creating Program Code For Use In Multiple Application Programs; Computer Programs For Running Development Programs And Applicatioin Programs In A Common Development E...

Music Central

[Class : 9] Scientific Nautical, Surveying Electric Photographic Cinematographic; Optical Weighing Measuring Signaling Checking (Supervision) Life Saving And Teaching Apparatus And Instruments Apparatus For Recording Transmission Or Reproduction Of Sound Or Images, Magnetic Data Carriers Recording Discs Automatic Vending Machines And Mechanisms For A Coinoperated Apparatus, ...

Device With Leptop

[Class : 9] Tablet Computers And Peripherals Therefor; Computer Operating System Software; Operating System Programs; Graphical User Interface Software

Applocker

[Class : 9] Operating System Programs; Computer Software For Controlling The Installation And Execution Of Software On Individual Computers In A Computer Network.

Xbox

[Class : 9] Video Game Players; Electronic Devices For Accessing Global Computer And Communication Networks; Computer Hardware And Peripherals; Keyboards, Joysticks, Pointing Devices; Computer Software For Playing Video Games And For Accessing And Browsing Global Computer And Communication Networks; Computer Software For Compressing And Decompressing Data And Video Images, W...

Biztalk

[Class : 9] Computer Software For Enabling Data Communication Between Application Programs And Documents, Computer Software For Use In Developing Application Programs And Documents Capable Of Exchanging Data With Other Application Pograms And Documents; Computer Operating System Programs And Utility Programs For Data Exchange.

Groove Launch Icon (2007)

[Class : 9] Computer Software Used To Facilitate And Coordinate Synchronous And Asynchronous Communications And Collaboration Among Users, Third Party Software Programs, Computer Servers Or Processors.

Onecare

[Class : 42] Computer Virus Protection Services; Computer Security Services, Namely, Restricting Access To And By Computers And Computer Networks To And Of Undesired Web Sites, Media, Individuals And Facilities; Technical Support Services, Namely, Troubleshooting Of Computer Hardware And Software Problems; Maintenance Of Computer Software And Hardware; Monitoring The Compute...

Microsoft Equipt

[Class : 9] Computer Software, Namely, Software For Information Management, Creating Spreadsheets, Tables, Graphs, And Charts, And For Organizing And Analyzing Data; Computer Software For Word Processing; Computer Software For Creation And Display Of Presentations Including Text And Graphics; Computer Software For Use In Note Taking, Namely, Computer Software For Recording, ...

L (Logo)

[Class : 9] Computer Software For Enabling And Managing Simultaneous, Multiple Modes Of Communication Over Local Area Networks And The Internet Via Instant Messaging. Voice Over Internet Protocol (Voip), Video Conferencing, Audio Conferencing, Application Sharing, Computer Desktop Sharing, File Transfer, Sensing And Providing User Presence Information, And Telephony.[Class :...

Inprivate

[Class : 9] Computer Programs For Accessing And Using The Internet And The World Wide Web; Computer Programs For Disabling The History And File Caching Features Of A Web Browser; Computer Software For Notifying A User Of A Web Browser When Others Are Tracking Web Use And For Controlling The Information Others Can Access About Such Use

Flag Design (2012)

[Class : 9] Computer Operating System Programs: Operating System Software For Mobile Phones: Mobile Phones; Internet Browser Software: Computer Software For Managing And Controlling Servers For Backup, Storage And Organization Of Files And Data; Computer Programs For Operating And Managing Network Servers; Computer Network Operating Software And Utilities: Computer Software ...

Lift London (Device)

[Class : 9] Game Software

Sidewalk

[Class : 16] Paper, Cardboard And Goods Made From These Materials, Not Included In Other Classes, Bookbinding Materials, Printed Matter, Publications, Namely, Books, Newsletters, Magazines, Brochures And Pamphlets Concerning Cities, City Services Events And Business Located In And Around Cities, Including Maps, Schedules Information And Reviews On Sports, Entertainment, Educ...

Microsoft (Logo)

[Class : 9] Computer Software And Computer Hardware.[Class : 16] Paper Goods And Printed Matters (Including Tutorial Books, Periodicals, Various Publications).[Class : 25] Clothing.[Class : 28] Toys And Games.[Class : 35] Business And Advertsing Services.[Class : 36] Financial Services.[Class : 38] Telecommunication Services.[Class : 39] Transportation And Storage.[Class : 4...

Device

[Class : 9] Computer Operating System Software; Operating System Programs

Hohm

[Class : 42] Providing Information To Consumers Over Computer Networks, Wireless Networks And The Internet In The Fields Of Energy Usage And Consumption, Energy Conservation

Microsoft Citynext

[Class : 42] Computer Services And Consulting Services Related To Integration Of Private And Public Computing Environments To Facilitate Engagement And Interaction Between Local Governments And Citizens And Businesses In Connection With Resources, Energy, Water, Waste, Buildings, Infrastructure And Planning, Public Safety And Justice, Travel And Tourism, Recreation And Cultu...

A

[Class : 9] Computer Database Management Software.

Halo Wars

[Class : 28] Toys And Games, Namely, Action Figures And Accessories Therefor; Balloons; Bathtub Toys; Toy Building Blocks; Dolls And Accessories Therefor; Doll Clothing; Board Games; Card Games; Play Cosmetics For Children; Costume Masks; Miniature Die Cast Vehicles; Toy Airplanes And Helicopters; Battery Operated Remote Controlled Toy Vehicles; Flying Discs; Inflatable Viny...

Office (Device)

[Class : 9] Computer Programs; Computer Software And Computer Programs For Use In Database Management, Electronic Spreadsheets, Designing, Creating, Editing And Publishing Documents, Note Taking, Email, Calendaring, Scheduling, Contact Information Storage And Management, Accounting, Customer Relationship Management, Project Management, Presentation Graphics, Desktop Publishi...

Devhood

[Class : 16] Publications, Namely Newsletters, Pamphlets, Magazines, Books, Instruction Manuals, Usert Guides And Reference Guides In The Field Of Computers, Software, And The Development Of Computer Systems And Software.

Device Of Music.

[Class : 9] "Computer Software, Namely Operating System Program";

Cleartype

[Class : 9] Computer Software For Use In Displaying Fonts On Computer Screens And Display Devices, Computer Programs For Use In Creating Programs To Display Fonts, Computer Programs, Namely Font Programs.

Kinectimals

[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players In Class 9[Class : 41] Providing An On Line Magazine And Web Site Featuring Information In The Field Of Computer Games, Science Fiction, Games And Entertainment: Providing Information On Line Relating To Computer Games And Computer Enhancements For Games: Entertainment Serv...

Astuto

[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing An On Line Magazine And Web Site Featuring Information In The Field Of Computer Games, Science Fiction, Games And Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Pr...

Device

[Class : 9] Computer Programs For Providing Enhanced Electronic Mail And Scheduling Capabilities, For Use By Individual Computer Users, Namely, Computer Programs For Managing, Viewing, And Editing Files, Documents, Electronic Mail Messages And Private Network And Global Computer Network Communications; Computer Programs For Meeting And Event Scheduling, Managing Group Calend...

Steadystate

[Class : 9] Computer Operating System Software; Computer Utility Programs; Computer Software For The Administration Of Computers Used By Multiple Users; Computer Software For Restricting User Access And Authorizations On Computers Used By Multiple Users; And Computer Software For Automating Updates To Software Programs And Computer Virus And Security Information.

Dynamics

[Class : 9] Computer Software And Related Manuals Sold As A Unit.

M & Stand For Microsoft...

[Class : 35] Advertising And Marketing Services, Namely, Promoting The Goods And Services Of Others By Placing Advertisements And Promotional Displays In An Electronic Site Accessed Through Computer Networks And By Delivery Advertisements And Promotional Materials To Others Via Electronic Mail.[Class : 38] Electronic Mail Services.

Motocross Madness

[Class : 9] Game Software[Class : 41] Entertainment Services, Namely, Providing Online Video Games

Tm Application Id 2049568 Device

[Class : 35] Advertising And Marketing Services, Namely, Promoting The Goods And Services Of Others By Placing Advertisements And Promotional Displays In An Electronic Site Accessed Through Computer Networks And By Delivery Advertisements And Promotional Materials To Others Via Electronic Mail.[Class : 38] Electronic Mail Service

Access Launch Icon (2007) With...

[Class : 9] General Purpose Computer Database Management Software.

Turn 10

[Class : 41] Providing An On Line Magazine And Web Site Featuring Information In The Field Of Computer Games, Science Fiction, Games And Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing An On Line Computer Game ;[Class : 9] Computer Programs, Namely, Game Software For Use On...

Imagine Cup And Design [Device]

[Class : 41] Educational Services And Entertainment, Namely, Sponsoring Competitions And Providing Incentives To Students To Demonstrate Excellence Through The Issuance Of Awards, All In The Field Of Computers, Computer Programming And Web Design, Graphic Design And Animation, And Film And Video Production.

Lync

[Class : 9] Computer Software For Simultaneous, Multiple Modes Of Communication Over Local Area Networks And The Internet Via Instant Messaging. Voice Over Internet Protocol (Vo Ip"), Video Conferencing, Audio Conferencing, Application Sharing, Computer Desktop Sharing, File Transfer, Sensing And Providing User Presence Information, And Telephony.

Flag(device Mark)

[Class : 42] Computer Services Creating And Distributing Media For Use On Computer Network, Wireless Networks And Global Communication Networks; Web Site Hosting Services; Software Leasing Services; Consulting Services In The Fields Of Computers, Software, Electronics, Telecommunications, Security And Authentication; Providing Information On A Wide Variety Of Topics Over Com...

Pinpoint

[Class : 35] Promoting The Goods And Services Of Other Via An Online Marketplace Website Providing Information About Vendors And Their Goods And Services.

Lift London

[Class : 9] Game Software

Flag Design (Color)

[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking [Supervision],Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images, Magnetic Data Carriers. Recording Discs; Automatic Vending Machines And Mechanisms For Coinoperated ...

Xbox

[Class : 41] Entertainment Services, Providing Interactive Multiplayer Game Services For Games Played Over Computer Networks And Global Communications Networks, Electronic Message And Chat Services For Use In Connection With Interactive Games Played Over Computer Network And Global Communications Networks, Providing Computer Games And Video Games That Can Be Accessed, Played...

Logo

[Class : 35] Retail Store Services And Online Retail Services Featuring Computers, Computer Hardware, Software, Computer Games, Computer Peripherals, Portable Music Players And Accessories, Personal Digital Assistants, Cell Phones And Accessories, Video Game Consoles And Accessories, Webcams, Books, Clothing, Back Packs, Messenger Bags, Computer Bags And Novelty Items

Microsoft Gw Basic

[Class : 16] Computer Hardware And Software Manuals; Computer Documentation Namely Reference, User, Instructional And General Utilities; Manuals And Data Sheets For Computer Hardware And Software Manufacturers, Producers And Users.

Sift

[Class : 9] Operating System Software For Mobile Phones; Computer Search Engine Software; Computer Programs For Searching Email, Text Messages, Address And Contact Information.

Forzavista

[Class : 9] A Feature Of Interactive Video Game Software Which Allows Players To Obtain Statistical Information Of Internal And External Features Of A Vehicle And To Virtually Navigate And Operate Those Vehicles.

With Device

[Class : 35] Promoting The Goods And Services Of Others By Means Of A Preferred Customer Program Featuring Training, Certification, And Sales, Marketing And Technical Support In The Fields Of Business, Sales, Marketing, And Cloud Computing: Business Information Services, Namely, Providing Business Assessment Tools To Others: Providing Information In The Fields Of Busines...

Microsoft Expression

[Class : 9] Computer Software For Drawing And Illustrating, Computer Software For Graphic Design And Editing, Web Site Design, Computer User Interface Design, Design Of Multimedia Presentations, Animation And Film, Computer Software Development Tools And Web Site Development Software.

Soapbox

[Class : 41] Entertainment Services, Namely, Website Providing Online User Reviews And Ratings For Videos Offered For Download Via The Internet.[Class : 38] Streaming Of Video Material On The Internet.

Digital Locker Design (Color)

[Class : 9] Computer Software For Downloading And Installing Other Software On A Personal Computer, And For Creating Back Up Copies Of The Downloaded Software.[Class : 35] Online Retail Store Services In The Field Of Software;[Class : 39] Electronic Storage Of Files And Documents For Others; Electronic Storage Of Documents And Files, Archival Copies Of Software, Software P...

Device Of Flower

[Class : 9] Computer Software For Browsing And Searching Photographs, For Viewing Photographs In Three Dimensional Models, For Creating Photographic Tours, And For Annotating Photographs And Photograph Collections[Class : 41] Online Photo Editing, Viewing And Animation Production Services; Online Photo Viewing And Sharing Services For Others Featuring Browsing, Editing And T...

Superfetch

[Class : 9] Operating System Software; Computer Utility Programs; Computer Software For Memory Managememt.

Excel

[Class : 9] Computer Software, Nbamely, Spreadsheet Software; And Computer Programs For Creating Charts And Graphs From Electronic Spreadsheets;

P (Device)

[Class : 9] Desktop Publishing Software

O

[Class : 9] Computer Programs For Providing Enhanced Electronic Mail And Scheduling Capabilities, For Use By Individual Computer Users, Namely, Computer Programs For Managing, Viewing, And Editing Files, Documents, Electronic Mail Messages And Private Network And Global Computer Network Communications; Computer Programs For Meeting And Event Scheduling, Manag...

W

[Class : 9] Word Processing Software; Computer Programs For Creating, Editing, Sharing, Storing, And Printing Documents Comprised Of Text And Graphics And Utility Programs For Use Therewith

Logo

[Class : 9] Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Game Consoles, Game Controllers, And Software For Operating Game Controllers; Electronic Devices, Namely Computer Hardware For Accessing Global Computer And Communication Networks; Computer Hardware And Computer Peripherals; Cameras; Computer Software For Playing V...

Visual Studio

[Class : 9] Computer Software, Computer Pgograms For Developkng Other Computer Pograms, Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications, Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs, Computer Programs For Running Development Programs And Applications Programs In A Co...

Windows Onecare

[Class : 9] Computer Software For Providing, Network And Personal Computer Security, Anti Virus Protection, Intrusion Detection And Prevention, Computer System And Software Maintenance, Software Updates And Computer Backup And Restoration Included In Class 9.[Class : 42] Computer Virus Protection Services, Computer Security Service, Namely, Restricting Access To And By Compu...

Onenote Launch Icon (2007)

[Class : 9] Computer Software For Use In Not Taking, Namely, Computer Software For Recording, Organizing, Editing And Transmitting Audio And Visual Information And Images In Electronic Form; Computer Software For Viewing And Editing Meeting Agendas And To Do Lists; Computer Software For Reminding Users Of Dates And Events; Computer Software For Accessing Shared Documents (No...

Windows Xp

[Class : 16] Publications, Namely, User Manuals, Instruction Guides, Reference Guides, Newsletters, Magazines, Books About Computer Systems And Computer Programs, Magazines And Newsletters Distributed Over Computer Networks And Global Communication Networks, Pens, Pencils, Markers, Stationery, Stationery Type Portfolios, Clipboards, Desk Sets, Pen And Pencil Holders, Mount...

Device

[Class : 9] Computer Hardware; Computer Operating System Software; Operating System Programs; Graphical User Interface Software.

Windows Xp

[Class : 9] Computer Software, Namely, Operating System Programs And Utilities, Word Processing Programs, Address Book Programs, Calculator Programs, Terminal Emulation Programs, Programs For Downloading And Playing Audio And Video, Programs For Managing Computer Power Supplies, Programs For Use In Transmitting Data Between Computers And Other Electronic Devices, Computer Ma...

Expression Blend

[Class : 9] Computer, Software For Drawing And Illustating, Computer Software For Graphic Design And Editing Web Site Design, Computer User Interface Design, Design Of Multimedia Presentations Animation And Film, Computer Software Development Tools,And Web Site Development Software

Device

[Class : 9] Computers; Computer Peripherals; Computer Monitors; Personal Digital Assistants; Hands Held Computer; Set Top Boxes For Television; Cellular Phones; Encoded Smart Cards Containing Memory; Computer Servers; Computers And Software For Use In Transmitting And Receiving Data Over Wireless Networks; Computer Operating Systems And Computer Programs For Use Therewith, N...

Tm Application Id 1883652 Device

[Class : 9] Computer Software For Providing Access To The Internet; Computer Software For Providing A Graphical User Interface To Access Commands And Website Links[Class : 35] Providing Online Information In The Field Of Business; Online Telephone Directory Services; Online Business Directory Services; Providing Online Consumer Information Concerning Automobiles; Provid...

Where Do You Want To...

[Class : 16] Magazines, Newspapers, Newsletters, User Guides, User Manuals And Bboks Relating To Computer And Computer Software

Windows Nt

[Class : 9] Computer Programs Pre Recorded On Disks, Diskettes, Cartridges, Optical Disks, Computer Chips And Compact Disk Read Only Memories; Computers; Computer Components; Computer Peripherals; Information Stored In Or On Electronic, Magnetic, Optical Or Other Media; Holograms, Display Devices For Controlling Menu Selections And Images On A Display Screen.

Device Mark In Color

[Class : 38] Telecommunications Services; Services Offered Over Wireless Networks; Electronic Mail Services; Instant Messaging Services; Providing Information In The Field Of Telecommunications; Providing Multiple User Access To A Global Computer Information Network; Providing Online Chat Rooms And Electronic Bulletin Boards For Transmission Of Messages Among Users In The Fi...

Sidewalk

[Class : 9] Scientific, Nautical, Surveying, Electric Photographic,Cinematographic, Optical Weithing Measuing, Signalling, Cheking, (Supervision) Life Saving And Teching Apparatus And Instruments, Appratus For Recording Transmission Or Reproducation Of Sound Of Images, Magnetic Data Carriers, Recording Discs, Autometic Vending Machines And Machinsims For Coin Operated Appa...

L (With Device)

[Class : 9] Computer Software For Simultaneous, Multiple Modes Of Communication Over Local Area Networks And The Internet Via Instant Messaging. Voice Over Internet Protocol (Voip), Video Conferencing, Audio Conferencing, Application Sharing, Computer Desktop Sharing, File Transfer, Sensing And Providing User Presence Information, And Telephony.

Killer Instinct

[Class : 9] Video Game Software.[Class : 41] Entertainment Services, Namely, Providing An On Line Video Game.

Visio

[Class : 9] Computer Programs Recorded.

Lococycle

[Class : 9] Game Software.[Class : 41] Providing A Website Featuring Information In The Field Of Games And Home Entertainment; Entertainment Services, Namely, Providing Online Video Games.

Onenote

[Class : 9] Computer Software For Recording, Organizing Editing And Transmitting Information In Typed, Handwritten And Voice Format, Computer Software For Viewing And Editing Calendars, Meeting Agendas, To Do Lists And Slide Presentations, Computer Software For Reminding Users Of Dates And Events, Computer Software For Accessing Web Messaging And Shared Documents, Computer S...

Logo

[Class : 9] Computer Programs For Use On Network Servers And For Administering Computer Networks, Namely Operating System Programs, Network Management Tools And Utility Programs For Use By Network Administrators, Systems Management Tools For Managing Personal Computer Hardware & Software Over The Network, Communication Programs For Linking A Network To Another Computer Syste...

Silverlight

[Class : 9] Computer Software For Browsing The Internet And Private Networks, And For Enhancing The Abilities Of Web Browser Software; Computer Software For Viewing And Listening To Video, Animation And Audio; Computer Software For Creating And Authoring Of Web Based Applications, Video, Animation And Audio

Photodna

[Class : 9] Computer, Software For Analyzing And Comparing Images; Computer Software For Identifying Individuals Using Images.[Class : 42] Online Non Downloadable Computer Software For Analyzing And Comparing Images; Online Non Downloadable Computer Software For Identifying Individuals Using Images.

Dreamspark

[Class : 42] Providing Online Information Concerning The Design, Development And Implementation Of Software; Providing A Website For Students To Download Computer Software, Website And Game Development Tools And Obtain Technical Support Information Concerning Computer Software, Computer Systems And Computer Software, Website And Game Application Development, Deployment And M...

Logo (Label)

[Class : 16] Paper, Cardboard And Goods Made From These Materials, Not Included In Other Classes, Printed Matter, Books, Documentation For Computer Programs, Computers, Computer Components, Computer Peripherals And Display Devices For Controlling Menu Selections And Images On A Display Screen, User Manuals, Reference Manuals And Technical Manuals, Data Sheets, Reference Card...

Hotmail

[Class : 9] Computer Software In Class 9.

.Net

[Class : 16] Publication, Namely Books, Newsletters, Magazines, And User Manuals; Magazines And Newsletters Distrributed Over Computer Networks And Global Communication Networks'

Bing

[Class : 35] Advertising Services Including Dissemination Of Advertising For Others Via The Internet, Business Services Including Providing Links To The Websites Of Others, Providing Consumer And Product Information.[Class : 38] Telecommunication Services, Including Receipt And Delivery Of Information, Messages, Documents, Images And Other Data By Electronic Transmission.[Cl...

Sideshow

[Class : 9] Operating Systems Software; Computer Utility Programs; Computer Software Platforms For Developing And Operating Remote Display Devices; Computer Software Development Tools; Computer Peripherals; Laptop Computers Including Auxiliary Displays; Wireless Computer Peripherals; Wireless Telephones;

Habu

[Class : 9] Computer Mice For Computer Games';

Monsters Love Candy

[Class : 41] Entertainment Services, Namely, Providing Online Video Games.[Class : 9] Game Software.

Access

[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Database Management And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Database Management; Providing Technical Information In The Field Of Computer Software And Cloud Computing

The Hive With Device

[Class : 41] Education Services, Namely, Online Tutorials In The Field Of Computers, Computer Software And Computer Systems; Providing Online Information In The Fields Of Home Entertainment, Games, Digital Photography, Digital Music, Home Finance [Class : 38] Providing On Line Forums And Chat Rooms For The Transmission Of Messages Among Computer Users Concerning Computer Ha...

Device Mark

[Class : 9] Operating System Software, Computer Utility Programs; Graphical User Interface Software; Computer Software For Use In The Creation, Delivery, Playing And Viewing Of Video, Music, Graphics, Photos, Audio, Text Other Media, Computer Programs And Other Data

Aero

[Class : 9] Operating System Software; Computer Utility Programs; Graphical User Interface Software; Computer Software For Use In Searching And Organizing Programs, Files And Data Stored On A Computer System Or Network";

Net

[Class : 28] Handheld Units For Playing Video Or Computer Games, And Operating Systems Software For Use Therewith; Stand Along Video Output Game Machines And Operating Systems Software For Use Therewith; And Tyos, Games, Video Games And Sporting Goods'

With Devices

[Class : 16] Publications, Namely, Brochures And Information Sheets In The Fields Of Business, Sales, Marketing, Computer Software And Computer Systems.[Class : 35] Promoting The Goods And Services Of Others By Means Of A Preferred Customer Program Featuring Training, Certification, And Sales, Marketing And Technical Support; Organizing And Conducting Trade Shows And Exhibit...

Encarta

[Class : 9] Computer Programs And Data In The Form Of A Multi Media Encyclopedia And Instruction Manuals Therefor Sold As A Unit.

Photosynth

[Class : 42] Providing Online Non Downloadable Software For Browsing And Searching Photographs, For Viewing Photographs In Three Dimensional Models, For Creating Photographic Tours, And For Annotating Photographs And Phogograph Collections";[Class : 41] Online Photo Editing, Viewing And Animation Production Services; Online Photo Viewing And Sharing Services For Others, Feat...

Misc Geom (Device)

[Class : 9] Computerprograms, Namely Computer Software For Recognizing, Analyzing, And Understanding Written Or Spoken Languages; Speech To Text Conversion, Text To Speech Conversion And Speaking Commands To The Computer

Microsoft

[Class : 25] Clothing Including Shirts, T Shirts, Sweatshirts, Turtlenecks, Vests, Shorts, Pants, Jogging Surs, Sweat Pants, Hats, Jackets, Suspenders, Flight Jackets, Tennis Shoes, Shoe Strings, Sweatbands, Coats, Sweaters, Polo Shirts, Rugby Shirts, Wrist Bands, Scarves, Ties And Visors, Footwear And Headgear.

Device Stage

[Class : 9] Operting System Programs; Computer Software For Viewing, Accessing And Controlling Mobile Phones, Personal Digital Assistants (Pdas), Portable Media Players, Cameras, Printers, Scanners And Other Devices Connected To A Computer.[Class : 35] Advertising And Advertisement Services, Namely Promoting The Goods And Services Of Others Through Advertsisements To Compute...

Backstage

[Class : 9] Computer Software, Namely A Business Productivity Program Feature Providing A Dashboard For Management, Navigation, Access, Storage, And Sharing Of Documents And Files

Azure

[Class : 9] Computer Operating System Software; Network Operating Software; Computer Software Development Tools; Website Development Software; Computer Software That Provides Webbased Access To Applications And Services Through A Web Operating System Or Portal Interface; Computer Software For Developing And Operating Cloud Computer Networks And Applications; Computer Softwar...

Live Mesh

[Class : 9] Operating System Software For Storing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Computer Software For Computer System And Web Based Application Development, Deployment, And Management; Computer Software Platforms For Storing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Computer Software For Receiving,...

Flexgo

[Class : 9] Computers; Computer Peripherals; Hand Held Computers; Mobile Computers; Personal Digital Assistants; Computer Operating System Software; And A Full Line Of Computer Application Software

Wreckateer

[Class : 41] Providing A Website Through Which People Locate Information About Video Games; Entertainment Services, Namely, Providing Online Video Games.[Class : 9] Video Game Software.

Tm Application Id 621361 Device

[Class : 9] Computers, Office Equipments, Business Machines And Electrical And Electronic Equipment Including Computes And Computer Programs Contained Therein, Namely, Answering Machines, Voicemail Equipment And Systems, Vending Machines, Parking Meters, Audio Conferencing Equipment And Systems, Data Conferencing Equipment And Systems, Attendant Console Equipment And Systems...

X

[Class : 9] Computer Software, Namely, Spreadsheet Software; And Computer Programs For Creating Charts And Graphs From Electronic Spreadsheets";

Device Mark

[Class : 38] "Telecommunication Services; Services Offered Over Wireless Networks; Electronic Mail Services; Instant Messaging Services; Providing Information In The Field Of Telecommunications; Providing Multiple User Access To A Global Computer Information Network; Providing Online Chat Rooms And Electronic Bulletin Boards For Transmission Of Messages Among Users In The Fi...

Microsoft Office

[Class : 9] Computer Software, Namely, Software For Information Management, Creating Spreadsheets, Tables, Graphs, And Charts, And For Organizing And Analyzing Data; Computer Software For Word Processing; Computer Software For Creation And Display Of Presentation Including Text And Graphics; Computer Software For Electronic Mail And Instant Messaging Services, Calendar And M...

Xamarin

[Class : 9] Computer Software Platforms And Programming Tools For Applications For Mobile Devices[Class : 42] Computer Software Design, Development, Engineering, Debugging, Technical Support, Maintenance, Updating, And Management Services; Computer Services, Namely, Providing Online Services To Support Mobile Applications, Including Problem Reporting, Mobile Analytics, Data ...

P

[Class : 9] Project Management And Resource Management Software

Esp

[Class : 9] Computer Software Platforms For Computer Modeling, Digital Simulation, Animation And Visualization Applications; And Computer Software Development Tools.

Mouse Mischief

[Class : 9] Computer Software Development Tools For Enabling Multiple Users To Use A Single Computer

(Device Of Scenery)

[Class : 9] "Operating System Software".

Internet Explorer (Device)

[Class : 9] Computer Software For Browsing The Global Computer Network And Secure Private Networks.

Microsoft Dynamics

[Class : 35] Advertising Services; Business Services; Business Consulting Services[Class : 16] Publications, Namely, User Manuals, Instruction Guides, Reference Guides, Newsletters, Magazines, Books, All About Computers, Computer Software, Computer Systems, Business, Business Management And Accounting[Class : 9] Computer Software, Namely A Full Line Of Computer Software For ...

Business Process Shaper

[Class : 9] Computer Software For Use By Business Enterprises To Manage Their Financial Business And Customer Information Computer Software For Supply Side Management Customer Relationship And Accounting

Bigpark

[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players; Downloadable Electronic Games And Content For Use In Electronic Games Via The Internet And Wireless Devices

343 Industries

[Class : 9] Computer Programs, Namely, Game Software For Use In Computers And Video Game Players;

Black Tusk Studios (Logo)

[Class : 9] Game Software.

Windows Live

[Class : 9] Computer Software; Computer Search Engine Software; Computer Programs For Accessing Computer Networks, Wireless Networks And The Internet; Computers And Computer Peripherals; Cable And Satellite Television Boxes And Accessories Therefor For Providing And Utilizing On Screen Electronic Schedules For Broadcast, Cable And Satellite Program Listings And Entertainment...

Media Center

[Class : 9] Operating System Software, Computer Software For Use With Audio And Video Devices, Computers, Computer Hardware, Computer Peripherals, Television Set Top Boxes, Remote Controllers For Audio Devices, Video Devices And Personal Computers; Computer Software For Viewing, Searching And Playing Prerecorded Audio And Internet Radio, Computer Software For Viewing, Sear...

Label

[Class : 9] Operating System Software.

Purble Place

[Class : 9] Computer Programs, Namely, Game Software For Use In Comuters And Video Game Players;

Truecolor With Device

[Class : 9] Webcam Hardware And Computer Software For Analyzing Scenes And Automatically Providing Exposure Settings To Improve Image Quality.

Readydrive

[Class : 9] Hard Drives For Computers; Computer Memory Hardware; Computer Software For Controlling Personal Computer Power Supplies And Hard Drives For Use Therewith; Operating System Software; And Computer Utility Programs;

Kinect

[Class : 9] Computer Software, Computer Hardware, And Computer Peripherals.

Cleartracks

[Class : 9] Computer Programs For Accessing And Using The World Wide Web; Computer Programs For Deleting Search History After Accessing Websites .

Mediaroom

[Class : 38] Broadcasting Services, Providing Video And Television Programming Over Broadband, Cable, Satellite And Wireless Networks; And Video On Demand Services Via Broadband Networks. [Class : 41] Entertainment Service; Providing Information Concerning Television And Video Programming; Providing Online User Guides Featuring Information On Television And Video Programs...

Skydrive

[Class : 42] "Non Downloadable Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically"[Class : 9] "Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Im...

Readyboost

[Class : 9] Computer Memory Hardware; Computer Peripherals; Computer Software For Controlling Computer Memory Hardware; Operating Systems Software; And Computer Utility Programs.

Outlook

[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Email, Calendaring, Contacts Management And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Email, Calendaring, And Contacts Management; Providing Technical Information In The Field Of Computer Software And Clou...

Word Launch Icon

[Class : 9] Word Processing Software; Computer Programs For Creating, Editing And Printing Documents Comprised Of Text And Graphics And Utility Programs For Use Theirwith.

Bizspark

[Class : 42] Providing Online Information Concerning The Design, Development And Implementation Of Software; Providing A Website For Small And Medium Sized Business To Download Computer Software, Website And Software Development Tools; And Providing A Website For Small And Medium Sized Business To Obtain Technical Support Information Concerning Computer Software, Computer Sy...

Chess Titans

[Class : 9] Computer Programs, Namely, Game Software For Use In Comuters And Video Game Players;

Chromeffects

[Class : 9] Computer Programs, Namely, Operating System Programs And Utilities; Browser Programs For Accessing Information Stored On Computer Networks And Golbal Communication Networks; Computer Programs Providing Enhanced Multimedia And Graphics Displays; Computer Programs For Receiving Graphics And Display Information Over Computer Networks And Global Communication Network...

Skydrive (Device)

[Class : 9] Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically.[Class : 42] Electronic Storage Of Files And Documents For Others.[Class : 42] Providing Temporary Use Of Non Downloadable Software For Receiving, Displaying, Storing, Organizi...

Archt

[Class : 9] Computer Software And Computer Programs

Blue Dragon With Device

[Class : 9] Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Game Consoles, Game Controllers, And Software For Operating Game Controllers; Electronic Devices, Namely Computer Hardware For Accessing Global Computer And Communication Networks; Computer Hardware And Computer Peripherals; Cameras; Computer Software For Playing V...

Device Mark (Logo)

[Class : 9] Operating System Software, Computer Software For Controlling The Operation Of Audio And Video Devices, Namely, For Recording Playback Storing And Sorting Using Such Devices, Computers, Computer Hardware, Computer Peripherals Television Set Top Boxes, Remote Controllers For Audio Devices, Video Devices And Personal Computers, Computer Software For Viewing Searchin...

Live Mesh

[Class : 39] Physical Storage Of Electronically Stored Files And Documents.

Adera

[Class : 9] Computer Game Software[Class : 41] Entertainment Services,Namely,Providing An On Line Computer Game.

Office

[Class : 9] Photographic And Cinematographic Apparatus And Instruments, Animated Cartoons; Apparatus For Recording, Editing, Transmission Or Reproduction Of Sound Or Images (Including Television Programs): Compact Disc Players, Computer Game Programs, Computer Software And Programs, Audio And Video Compact Disc, Tapes And Cassettes, Dvd Players, Films, Exposed, Juke Boxes Fo...

Logo

[Class : 9] House Mark For A Full Line Of Computer Software.[Class : 42] House Mark For A Full Line Of Online Non Downloadable Software.

Lightswitch

[Class : 9] Computer Programs For Developing Other Computer Programs: Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications; Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs: Computer Programs For Running Development Programs And Application Programs In A Common Developm...

Sharepoint

[Class : 9] "Computer Software; Network Software; Workgroup And Project Management Software; Software For Designing, Creating, Maintaining And Accessing Customized Internal Network Sites And Global Communication Network Sites; Computer Authoring Software For Use On Internal Computer Network And Global Communication Networks, Namely, Software For Creating, Editing And Deliver...

Windows Powered

[Class : 9] Computers, Computer Peripheral Devices Handheld Computers, Dvd Players, Set Top Boxes For Television , Pages, Cellular Phones, Smart Cards, Servers, Operating Systems Programs Therefor And A Full Line Of Computer Applications, Programs For Use Therewith, Computer Programs For Managing Communications And Data Exchange Devices, Electronic Equipments For Playing Gam...

Microsoft Mediaroom

[Class : 9] Computer Software For Delivery Of Broadcast Quality Video And Television Programming Over Broadband, Cable, Satellite And Wireless Networks; Computer Software For Providing Video On Demand Services; Downloadable Films And Tv Programs Provided Via Video On Demand; Computer Software For Transmitting Personal Photos, Video And Music Over Broadband, Cable, Satellite ...

Pixelsense

[Class : 9] Computer Hardware And Computer Software.

Surface

[Class : 9] Computers; Tablet Computers; Laptop Computers; Mobile Computers; Reader For E Books And Other Electronic Publications; Computer Peripherals; Wireless Computer Peripherals; Mobile Communications Modules For Use With Tablet Computers; Headphones; Audio Speakers; Computer Keyboards; Electronic Musical Keyboards; Computer Mouse; Webcams; Digital Pens; Power Cords; B...

Xrank

[Class : 42] Computer Services, Namely, Providing Search Engines For Obtaining Data On A Global Computer Network; And Computer Services, Namely, Search Engine Services For Assessing The Frequency Of Search Terms On The Internet And The Popularity Of Search Topics Among Internet Users.

Entourage

[Class : 9] Computer Programs For Sharing, Managing Viewing And Editing Files, Documents Electronic Mail Messages And Internal Network And Global Communications Network Communication Group Calendars Computers Programs For Task Managements Delegations And Reporting Computer Progress For Recording Notes. Computer Programs For Transferring Data To And From Databases And To From...

Your Potential. Our Passion.

[Class : 16] Publications, Namely, Strategy Guides, User Manuals, Comic Books, Series Of Fiction And Nonfiction Books, Magazines And Newsletters All In The Fields Of Computers, Computer Hardware, Computer Peripherals, Computer Software, Computer Networks, The Internet, Interactive Television, Computer Games, Video Games, Science Fiction, Games, Entertainment Science, Social ...

Logo

[Class : 42] Technical Support And Technical Consultation Services In The Field Of Software Development For Video Game And Computer Game Software; And Providing Online Information In The Field Of Software Development And Technical Support For Video Game And Computer Game Software';[Class : 41] Educational Services, Namely, Conducting Seminars, Conferences And Workshops In Th...

Reclusa

[Class : 9] Computer Keyboards

X (Logo)

[Class : 9] Computer Utility Software; Computer Software For The Detection And Removal Of Computer Viruses And Threats; Computer Software For Managing And Filtering Electronic Communications; Computer Software For Protecting And Securing Computer Networks And Applications; Computer Software For Encrypting And Authenticating Data; Computer Software For Detecting And Repairing...

Autovista

[Class : 9] A Feature Of Interactive Video Game Software Which Allows Players To Obtain Statistical Information Of Internal And External Features Of A Vehicle And To Virtually Navigate And Operate Those Vehicles.

Logo

[Class : 9] Computer Software, Namely, Operating System Programs And Utilities, Word Processing Programs, Address Book Programs, Calculator Programs, Terminal Emulation Programs, Programs For Downloading And Playing Audio And Video, Programs For Managing Computer Power Supplies, Programs For Use In Transmitting Data Between Computers And Other Electronic Devices, Computer Ma...

Windows Powershell

[Class : 9] Operating System Software And Utilities; Computer Software For Administratioin Of Computer Networks; And Computer Software Development Tools For Use By Computer Network Administrators.

Windows

[Class : 9] Computer Programs, Computers, Computer Components, Computer Peripherals, Information Stored In Or On Electronic, Magnetic, Optical And Other Media Holograms, Display Devices For Controlling Menu Selections And Images On A Display Screen.

Device Mark

[Class : 9] Software, Namely, Operating System Software; Server Software; Network Operating And Management Software; Utility Programs; Software Development Programs; Computer Software Development Tools; Web Site Development Software; Security And Authentication Software; Software That Provides Web Based Access To Applications And Services Through A Web Operating System Or Po...

Expression

[Class : 9] Computer Software For Drawing And Illustrating, Computer Software For Graphic Design And Editing, Web Site Design, Computer User Interface Design, Design Of Multimedia Presentations, Animation And Film, Computer Software Development Tools, And Web Site Development Software.

Logo

[Class : 9] Computer Operating System Software; Operating System Programs; Graphical User Interface Software.

Skydrive

[Class : 39] Electronic Storage Of Files And Documents For Othes.

Msn

[Class : 9] Computer Programs For Accessing Computer Networks And Global Communication Network, Computers And Computer Peripherals Handheld And Portable Computers And Communication Devices Personal Digital Assistants (Pdas), Global Communication Network Appliances, Television, Television Set Top Boxes, Cable Television Controller, Remote Control Devices For Television, Elect...

Popfly

[Class : 9] Computer Software That Searches, Analyzes And Compiles Information From More Than One Source Into An Iterated Display, Computer Software For Building And Development Websites And Web Software Components, Web Site Hosting Computer Software[Class : 42] Computer Software Development And Programming Services, Web Site Hosting Services For Others, Computer Services, N...

Where Do You Want To...

[Class : 9] Computer Software, Computer Hardware, Computer Peripherals Including Computer Screen Cursor Control Devices, Computer Keyboards, Joysticks And Keypad Control Devices For Use With Computer Video Games.

People Ready

[Class : 42] Computer Services; Technical Support Services, Providing Information On Various Topics Via The Internet; Providing Online Chat Rooms And Electronic Bulletin Boards For Transmission Of Messages Among Users; Providing Information In The Fields Of Computers, Computer Software And Computer Systems; Consultation Services In The Fields Of Selection, Implementation And...

Plays Forsure Lebel

[Class : 9] 'Computer Software Specifically Designed For Creating, Delivering, Playing And Viewing Of Video, Graphic, Audio And Music ; Operating System Software; Computer Software For Controlling The Operation Of Audio And Video Devices, Namely ,For Recording, Playback, Storing And Sorting Using Such Devices; Computer Software For Processing Digital Music Files; Computer So...

Intellimirror

[Class : 9] Sceintific, Nautical Surveying Electric , Cienematographic, Photographic, Optical Weighing Measuring Signaling,Cheking (Supervision) Life Saving Teaching Apparatus And Instruments Apparatus For Recording Transmission Or Reproduction Of Sound Or Im,Ages Magnetic Data Carries, Recorsing Discs, Automatic Vending Machineand Machinisms For Coin Opreated Apparatus Cash...

Swivel

[Class : 9] Operating System For Mobile Phones (Cell Phones).

Oneapp

[Class : 9] Computer Software For Allowing Mobile Device Users To Send Messages, Make Payments And Access And Play Music,Games And Videos On Mobile Devices;Computer Software Platforms For Developing Mobile Applications;Computer Software,Namely,Software Development Tools For The Creation Of Mobile Applications;Computer Software For Running Retail Store Site For Purchase And D...

Logo

[Class : 9] Computer Software For Synchronizing Files And Data Stored On Different Computers; Computer Software For Remotely Accessing Other Computers.

Healthvault

[Class : 9] Computer Software For Use By Healthcare Providers; Computer Software For Collecting, Storing, Editing, Organizing, Modifying, Reviewing, Analyzing, Transmitting And Sharing Of Data And Information In The Fields Of Healthcare, Social Care, Medicine And Prescribing Of Medicines Including Patient Records, Clinical Care Information, Facilities Information, Health Pro...

Internet Explorer

[Class : 9] Browsers, Namely, Software For Browsing The Global Computer Network And Secure Private Networks, And Software Programs To Connect Computers To The Global Computer Network And To Secure Private Networks.

Wordament

[Class : 9] Computer Application Software For Mobile Phones, Handheld Computers, Laptops And Desktop Computers, Namely, Software For A Word Finding Game.

Skype

[Class : 9] Application Programming Interface (Api) For Computer Software Which Facilitates Online Services For Social Networking, Building Social Networking Applications And For Allowing Data Retrieval, Upload, Download, Access And Management; Computer Software To Enable Uploading, Downloading, Accessing, Posting, Displaying, Tagging, Blogging, Streaming, Linking, Sharing O...

Logo

[Class : 9] Computers And Computer Peripherals Featuring Near Field Communication ("Nfc) Connectivity; Computer Software For Providing Near Field Communication (Nfc) Connectivity.

Device Of Butterfly Design

[Class : 36] Providing Information Concerning Real Estate, Real Estate Financing, Real Estate Agents And The Purchase, Sale And Rental Of Real Estate, All Via Computer Networks And Global Communication Networks, Providing Information Over Computer Networks And Global Communication Networks In The Fields Of Finance, Investment, Money And Banking, Retirement Planning And Wills...

Device

[Class : 9] Software Capable Of Causing Transmission Of A Message From A Message Originator To Multiple Predefined Recipients Across A Wired And/Or Wireless Network.

Butterfly Deaign (Label)

[Class : 9] Computer Programs For Accessing Computer Networks And Global Communication Networks; Computers And Computer Peripherals Handheld And Portable Computers And Communication Devices; Personal Digital Assistants (Pdas); Global Communication Network Appliances; Televisions; Television Set Top Boxes; Cable Television Controllers; Remote Control Devices For Televisions; ...

Winfx

[Class : 9] Computer Software Platform And Development Tools, Namely Programming, Models, Class Libraries And Utilities For Writing And Running Applications Written With Managed Code.

Device Of Stroks

[Class : 9] Operating System Software; Graphical User Interface Software.

Outlook

[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical Weighing, Measuring, Signaling, Checking (Supervision), Life Saving And Teaching Apparatus, And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Mages, Magnetic Data Carriers, Recording Discs. Automatic Vending Machines And Mechanisms For Coin Operat...

Iskoola Pota

[Class : 9] Computer Programs For Generating Character Fonts.

Microsoft

[Class : 9] Computer Programmes Prerecorded On Tapes, Disks, Diskettes, Cartridges, Cassettes, And Within Ready Only Memories, Computer Programmes And Related User Manuals And Instructional Guides Sold As A Unit.

V

[Class : 9] Computer Software Program For Creating Drawings And Graphics.

Microsoft Power Sense

[Class : 9] Scientific, Nautical, Surveying, Photographic, Cinematographic, Optical, Weighing, Measuring, Signaling, Checking, (Supervision), Life Saving And Teaching Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating, Or Controlling Electricity, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images, Magnetic Data ...

Dreamscene

[Class : 9] Operating System Software; Computer Software For Displaying Video And Three Dimensional Images As Background On A Computer Screen

Websitespark

[Class : 42] Providing Online Information The Design,! Development And Implementation Of Software; Providing A Website For Designers, Developers And Hosts Of Sites On Computer Networks To Download Computer Software, Website And Software Development Tools; And Providing A Website For Designers, Developers And Hosts Of Sites On Computer Networks To Obtain Technical Support...

.Net

[Class : 9] Software, Namely; Operating System Software ; Server Software; Network Management Software; Utility Programs; Software Development Programs; Security And Authentication Software; Copmputer Programs For Operating Computer Peripherals, Handheld Computers, Personal Digital Assistants, Radio Pagers, Cellular Phones, Tlevision And Cable Set Top Boxes,Game Consoles, Di...

N

[Class : 9] Computer Software For Use In Note Taking, Namely, Computer Software For Recording, Organizing, Editing And Transmitting Audio And Visual Information And Images In Electronic Form; Computer Software For Viewing And Editing Meeting Agendas And To Do Lists; Computer Software For Reminding Users Of Dates And Events; Computer Software For Accessing Sha...

Live Mesh

[Class : 42] Non Downloadable Computer Software In The Fields Of Storing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Nondownloadable Computer Software In The Fields Developing Online Systems And Applications; Providing Information In The Fields Of The Development Of Computer Systems, Networks And Software, Over Computer Networks, Wireless Netwo...

Ascend: New Gods

[Class : 9] Game Software[Class : 42] Providing An Online Portal For Video Game Services And Social Networking

Wordament (Logo)

[Class : 9] Computer Application Software For Mobile Phones, Handheld Computers, Laptops And Desktop Computers, Namely, Software For A Word Finding Game.

Powerpoint Launch Icon (2007) With...

[Class : 9] Computer Software, Namely, Presentation Graphics Programs.

Readydrive

[Class : 9] Computer Memory Hardware; Computer Peripherals; Computer Software For Controlling Computer Memory Hardware; Operating Systems Software; And Computer Utility Programs.

Remotefx

[Class : 9] Computer Software For The Transmission And Display On Computers, Computer Displays And Mobile Devices Of Graphics And Application Programs Running On Another Computer; Computer Software For Facilitating Communication Between Computers.

Bluetrack Technology

[Class : 9] Computer Peripherals.

Xbox 360

[Class : 9] Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Game Consoles, Game Controllers, And Software For Operating Game Controllers; Electronic Devices, Namely Computer Hardware For Accessing Global Computer And Communication Networks; Computer Hardware And Computer Peripherals; Cameras; Computer Software For Playing V...

Flexgo

[Class : 36] Equipment Financing Services; And Lease Purchase Financing[Class : 35] Licensing Of Computer Software; Electronic Payment Services; And Retail Store And Online Retail Services Featuring Computers, Computer Peripherals, Personal Digital Assistants And Computer Software[Class : 42] Leasing Of Computers, Computer Equipment And Computer Software; And Providing Tempo...

Windows Vista

[Class : 16] Publications, Namely, User Manuals, Instruction Guides, Reference Guides, Newsletters, Magazines, Books, All About Computer Operating Systems; Pens, Pencils, Markers, Stationery, Stationery Type Portfolios, Clipboards, Desk Sets, Pen And Pencil Holders, Mounted And Unmounted Photographs, Posters, Magnetic Boards, Memo Pads, Binders, Staplers, Paperweights, Paper...

Active Desktop

[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical , Weighing, Measuring, Signalling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Of Images, Magnetic Data Carriers, Recording Discs, Sutomatic Vending Machines And Mechanisms For Coin Operat...

Windows Nt

[Class : 16] Books, Documentation For Computer Programs, Computers, Computer Components, Computer Peripherals And Display Devices For Controlling Menu Selections And Images On A Display Screen, User Manuals, Reference Manuals And Technical Manuals, Data Sheets, Reference Cards And Templates Periodicals, Magazines And Newsletters, Labels And Holographic Labels.

Tribit

[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Entertainment Services, Namely, Providing An Online Computer Game.

Endless Skater

[Class : 9] Computer Game Software.[Class : 41] Entertainment Services, Namely, Providing An On Line Computer Game.

Intellitrace

[Class : 9] Computer Programs For Developing Other Computer Programs; Debugger Computer Programs And Utility Computer Programs For Creating Graphical Applications; Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs.

Logo

[Class : 9] Operating System Software; Computer Utility Programs; Graphical User Interface Software; And Computer Software For Use In The Creation, Delivery, Playing And Viewing Of Video, Music, Graphics, Photos, Audio, Text, Other Media, Computer Programs And Other Data";

Webtv

[Class : 16] Telecommunication, Data, Electronic And Multidedia Communications; Internet Services, Connecting, Supplying And Transmitting Data, Information And Communications By Telephones, Computer, Electronic Mail, Laserbeam, Satellite Or By Electrinic Or Optical Means; Audio And Videio Conferencing And Communications; Telecoferencing In Class 16

Microsoft Office Live

[Class : 35] Organizing, Arranging, Conducting And Promoting Of Trade Shows, Exhibitions And Business Conferences In The Fields Of Computer Hardware, Software, Telecommunications, And High Technology And In The Field Of Development Of Computer Programs And Systems; Computer Software Licensing Services; Providing Information In The Fields Of Business, Business Communication A...

Nuance

[Class : 9] Computers, Computer Boards And Peripherals, And Computer Software For Speech, Speaker, Voice And/Or Voice Print Recognition, Identification, Authentication, Validation, Verification And Processing, And For Language Recognitions, Computer Software Applications Using Speech, Speaker, Voice And/Or Language Recognition Technology In The Fields Of Banking And Financia...

Microsoft Msx

[Class : 16] Computer Hardware And Software Manuals, Comuter Documentation Namely Reference, User, Instructional, And General Utilities Manuals And Tata Sheets For Computer Hardware And Software Manufacturers, Producers And Users.

Frontpage

[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments; Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images; Magnetic Data Carriers, Recording Discs; Automatic Vending Machines And Mechanisms For Coinoperated...

Label

[Class : 9] Computer Software And Computer Hardware[Class : 16] Paper Goods And Printed Matters (Including Tutorial Books, Periodicals, Various Publications)[Class : 25] Clothing[Class : 28] Toys And Games[Class : 35] Business And Advertising Services[Class : 36] Financial Services[Class : 38] Telecommunication Services[Class : 39] Transportation And Storage[Class : 41] Educ...

Hotmail

[Class : 35] Advertising And Marketing Services Included In Class 35.[Class : 38] Communication Services, Telecommunication Services, And Electronic Mail Services Included In Class 38.

Backoffice

[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking(supervision), Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images, Magnetic Data Carriers, Recording Discs, Automatic Vending Machines And Mechanisms For Coin Operated...

Logo

[Class : 9] Computer Software For Connecting Users To Web Messaging Services And For Voice And Video Transmissions Over The Internet And Wireless Networks.[Class : 35] Advertising And Marketing Services, Namely, Promoting The Goods And Services Of Others By Placing Advertisements And Promotional Displays In An Electronic Site Accessed Through Computer Networks And By De...

Device Mark

[Class : 9] Computer Operating System Software; Computer Software For Computer Security, Internet Browsing, Viewing Photographs And Videos, Listening To Music And Other Sound Recordings; And Computer Software For Word Processing, Drawing, Small Business Accounting, Desktop Publishin, Project Management, Presentation Graphics, Email, Calendaring, Note Taking, Internet And Net...

Windows Intune

[Class : 9] Computer Software For Providing Remote Access To Computer Systems Within A Designated Network For The Purpose Of Administering, Monitoring, And Auditing Computer Systems And Software; Computer Software For Use In Delivering And Deploying Software Applications And Data Over Computer Networks; Computer Software For Diagnosing And Repairing Software Problems; Comput...

Tm Application Id 1810825 Device

[Class : 9] Computer Software For Browsing The Internet And Private Networks, And For Enhancing The Abilities Of Web Browser Software; Computer Software For Viewing And Listening To Video, Animation And Audio; Computer Software For Creating And Authoring Of Web Based Applications, Video, Animation And Audio

Be What's Next

[Class : 16] Publications, Namely, Strategy Guides, User Manuals, Magazines And Newsletters All In The Fields Of Computers, Computer Hardware, Computer Peripherals, Computer Software, Computer Networks, The Internet, Interactive Television, Computer Games, Video Games, Education; Pens, Pencils, Stationery, Stationery Type Portfolios, Desk Sets, Pen And Pencil Holders, M...

Tinker

[Class : 9] Computer Programs, Namely, Game Software For Use On Computer.

Fluent

[Class : 9] Graphical User Interface Software; Computer Software For Word Processing, Drawing, Small Business Accounting, Desktop Publishing, Project Management, Presentation Graphics, Email, Calendar, Note Taking, Internet And Network Conferencing, Information Gathering And Sharing, Website Creation And Maintenance, Electronic Spreadsheets, And Database Management:.

Geosynth

[Class : 9] Computer Software For Browsing And Searching Photographs, For Viewing Photographs In Three Dimensional Models, For Creating Photographic Tours, And For Annotating Photographs And Photograph Collections; Computer Software For Geolocating Photographs And Images; Computer Software For Extracting Three Dimensional Data From Photographs, Images And Three Dimens...

Adcenter

[Class : 35] Advertising Services; Dissemination Of Advertising For Others Via The Internet.

P (Device)

[Class : 9] Computer Software For Project Management And Resource Management

Excel Launch Icon

[Class : 9] Computer Software, Naemly, Spreadsheet Software; And Computer Programs For Creating Charts And Graphs From Electronic Spreadsheets.

Flare Animation Device

[Class : 9] Operating System Software; Graphical User Interface Software.

Visual F#

[Class : 9] Computer Programs For Developing Other Computer Programs; Compiler Programs, Editor Programs, Debugger Programs And Utility Programs For Creating Other Computer Programs; Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs; And Computer Programs For Running Development Programs And Application Programs

Microsoft(device)

[Class : 16] Publications, Namely, Strategy Guides, User Manuals, Magazines And Newsletters All In The Fields Of Computers, Computer Hardware, Computer Peripherals, Computer Software, Computer Networks, The Internet, Interactive Television, Computer Games, Video Games, Education: Pens, Pencils, Stationery, Stationery Type Portfolios, Desk Sets, Pen And Pencil Holders, M...

Microsoft Office 2000

[Class : 9] Computer Programs For Use In Accounting, Word Processing, Desktop Publishing, Electronic Spreadsheets, Graphics, Drawing, Address Storage And Retrieval, Creation Of Multimedia Presentations, Charting, Database Access, Connecting Mainframe And Other Computers, Computers, Computer Aided Design And Drafting, Optical Character Recognition, User Training, Investment A...

Logo

[Class : 9] Scientific, Nautical,Surveying, Electric, Photographic, Cinematographic, Optical,Weighing,Measuring, Signalling, Checking(supervision), Life Saving And Teaching Apparatus And Instruments; Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images; Magnetic Data Carriers, Recording Discs; Automatic Vending Machines And Mechanisms For Coin Operated Ap...

Office 365

[Class : 9] Computer Programs: Computer Software And Computer Programs For: Database Management: Electronic Spreadsheets: Designing, Creating, Editing And Publishing Documents: Note Taking: Email; Calendaring: Contacts Management: Presentation Graphics; Desktop Publishing; Document Management: Word Processing: Instant Messaging. Voice Over Internet Protocol (Voip), Video Con...

Windows

[Class : 16] Books; Documentation For Computer Programs, User Manuals, Reference Manuals, Technical Manuals, Periodicals, Magazines And Newsletters, All Being Printed Matter Included In Class 16

Nirmala

[Class : 9] Computer Software For Generating ,Displaying And Printing Fonts

Hyper V

[Class : 9] Computer Software For Administration Of Computer Network; Computer Software For Network Server Virtualization; Computer Software Enabling Multiple Operating Systems To Run Concurrently On A Single Computer; And Computer Software For Using, Monitoring, Testing And Managing Multiple Operating Systems.

Roundtable

[Class : 9] Computer Hardware, Software And Peripherals For Use In Video Teleconferencing, Network Conferencing, Recording Meetings And Viewing Recorded Meetings Included In Class 9.

Multipoint

[Class : 9] Computer Hardware And Software.

Windows Mobile

[Class : 9] "Computers; Computer Peripherals; Computer Monitors; Personal Digital Assistants; Hand Held Computers; Set Top Boxes For Television; Cellular Phones; Smart Cards; Computer Servers; Computers And Software For Use In Transmitting And Receiving Data Over Wireless Networks; Operating Systems And Computer Programs For Use Therewith, Namely, Utility Programs, Calendar ...

Net

[Class : 9] ;Software, Namely; Operation System Software; Servver Software; Networks Management Software; Utility Programs; Software Development Programs; Security And Suthentication Software; Computer Programs For Operations Computer Peripherals, Handheld Computers, Pwersonal Digital Assistants, Radio Pagers Cellular Phine, Televisionand Cable Set Top Boxes, Game Consoles, ...

1.0 Logo

[Class : 9] Computers; Computer Peripherals; A Full Line Of Computer Software For Home, Business And Entertainment Use;

Cloud Power

[Class : 9] House Mark For A Full Line Of Business And Home Software; Operating System Software: Computer Software For Use On Networks And Services; Computer Software For Security And User Authentication; Computer Software For Use By Software Developers To Create, Edit And Test Other Computer Programs And Web Sites; Compiler Programs, Editor Programs, Debugger Programs A...

Microsoft At Work

[Class : 9] Computers, Office Equipment, Business Machines And Electrical And Electronic Equipment Including Computers And Computer Programs Contained Therein, Namely, Answering Machines, Voicemail Equipment And Systems, Vending Machines, Parking Meters, Audio Conferencing Equipment And Systems Data Conferencing Equipment And Systems, Attendant Console Equipment And Systems,...

Mahjong Titans

[Class : 9] Computer Programs, Namely, Game Software For Use On Comuters And Video Game Players;

Windows Update

[Class : 42] Computer Services, Namely , Providing Computer Software To Users Via The Internet, Providing Online Information Concerning Computers, Computer Peripherals And Computer Software, Online Technical Support In The Fieldof Computer And Computer Software.

Device Mark

[Class : 35] Advertising Services; Advertising Via Electronic Media And Specifically The Internet; Advertising By Transmission Of On Line Publicity For Third Parties Through Electronic Communications Networks; Dissemination Of Advertising For Others Via The Internet, Wireless Networks And Online Gaming And Entertainment Networks; Consulting Services In The Field Of Advertisi...

Sql Azure

[Class : 9] Computer Software; Computer Operating System Software; Network Operating Software; Computer Software Development Tools; Website Development Software; Computer Software That Provides Web Based Access To Applications And Services Through A Web Operating System Or Portal Interface; Computer Software For Developing And Operating Cloud Computer Networks And ...

W (Device)

[Class : 9] Word Processing Software; Computer Programs For Creating, Editing, Sharing, Storing, And Printing Documents Comprised Of Text And Graphics And Utility Programs For Use Therewith.[Class : 42] Cloud Computing Featuring Word Processing Software: Non Downloadable Computer Programs For Creating, Editing, Sharing, Storing, And Printing Documents Comprised Of Text And G...

Winfx

[Class : 16] Books, Magazines And Newsletters Relating To Programming Systems, Utility Programs And Application Programming Interfaces.

Bookshelf

[Class : 9] A Collection Of Interactive Reference Works And Computer Programs For Use Therewith, Including Computer Programs For Accessing And Retrieving Stored Reference Data And For Sharing Referance Data With Word Processing Programs, Instructional Manuals, User Guides And Reference Guides Therefore Sold As A Unit.

Tm Application Id 621362 Device

[Class : 16] Books, Instruction Manuals, Newsletters And Magazines, Relating Ot Computers, Computer Programs And Office Equipment, Business Equipment And Electrical And Elecctonic Equipment Including Computers And Computer Programs.

Msdn

[Class : 9] Computer Programs, Namely Utility Programs And Programs To Assist Developers In The Creation And Modification Of Other Computer Programs.

Office Squre Design (Label)

[Class : 9] Computer Namely, Computer Server Software, Computer Network Management Software; Computer Utility Programs, Computer Software Development Programs, Computer Security And Authentication Software For Controlling Access To And Communications With Computer; Application And Business Software For Use In Word Processing, Spreadsheets, Databases, Data Collection, Data An...

Your Potential. Our Passion.

[Class : 9] "House Mark For A Full Line Of Business And Home Software; Operating System Software; Computer Software For Use On Networks And Services; Computer Software For Security And User Authentication; Computer Software For Use By Software Developers To Create, Edit And Test Other Computer Programs And Web Sites; Compiler Programs, Editor Programs, Debugger Programs And ...

Windows

[Class : 41] Providing Information Over Computer Networks And Global Communication Networks In The Fields Of Entertainment, Music, And Interactive Games; Education Services, Namely On Line Tutorials In The Field Of Computers And Computer Software.[Class : 42] Computer Services, Including Providing Technical Support, Information And Consultation Services In The Fields Of Comp...

Msn

[Class : 36] Providing Information Concerning Real Estate, Real Estate Financing, Real Estate Agents And The Purchase, Sale And Rental Of Real Estate, All Via Computer Networks And Global Communication Networks; Providing Information Over Computer Networks And Global Communication Networks In The Fields Of Finance, Investment, Money And Banking, Retirement Planning And Wills...

Microsoft

[Class : 42] Computer Services, Computer Programming Services, Computer Consultancy And Technical Support, All Relating To The Design & Use Of Computer Programs, Computers, Computer Hardware & Computer Systems , Mail Order Services In The Field Of Computer Programs, Computer Related Books & Publications, & Other Computer Related Products, Arranging & Conducting Conferenc...

E, With Device

[Class : 9] Computer Programs For Connecting To Remote Computers And Computer Networks, Computer Programs For Searching The Contents Of Remote Computers And Computer Networks, Computer Programs For Transmitting And Receiving Data And Files To And From Remote Computers And Computer Networks, Computer Programs For Assisting Users In Navigating Through Computer Networks, Includ...

Windows Starter

[Class : 9] Computer Operating Systems';

Windows Mobile

[Class : 38] Communication Services, Namely, Electronic Transmission Of Data And Documents Among Users Of Computers; Electronic Mail Services; Web Messaging Services; Paging Services; Streaming Of Audio Material On The Internet; Wireless Voice Mail Services; Voice Activated Dialing Services; And Providing Wireless Acccess To Computer Networks And The Internet.[Class : 42] Te...

Outlook Launch Icon With Device

[Class : 9] Computer Programs For Providing Enhanced Electronic Mail And Scheduling Capabilities, For Use By Individual Computer Users, Namely, Computer Programs For Managing, Viewing, And Editing Files, Documents, Electronic Mail Messages And Private Network And Global Computer Network Communications; Computer Programs For Meeting And Event Scheduling, Managing Group Calend...

Powerpoint Launch Icon

[Class : 9] Computer Software, Namely, Presentation Graphics Programs.

Access Launch Icon

[Class : 9] General Purpose Computer Database Management Software.

Outlook Launch Icon (2007) With...

[Class : 9] Computer Programs For Providing Enhanced Electronic Mail And Scheduling Capabilities, For Use By Individual Computer Users, Namely, Computer Programs For Managing, Viewing, And Editing Files, Documents, Electronic Mail Messages And Private Network And Global Computer Network Communications; Computer Programs For Meeting And Event Scheduling, Managing Group Calend...

N With Device

[Class : 9] Computer Software For Use In Not Taking, Namely, Computer Software For Recording, Organizing, Editing And Transmitting Audio And Visual Information And Images In Electronic Form; Computer Software For Viewing And Editing Meeting Agendas And To Do Lists; Computer Software For Reminding Users Of Dates And Events; Computer Software For Accessing Shared Documents (No...

Cp With Device Of Label

[Class : 9] Word Processing Softwre; Computer Programs For Creating, Editing And Printing Documents Comprised Of Text And Graphics And Utility Programs For Use Therewith.

Business Relevant Design

[Class : 9] Computer Software For Use By Business Enterprises To Manage Their Financial Business And Customer Information Computer Software For Supply Side Management Customer Relationship And Accounting

Kumo

[Class : 9] Computer Software And Hardware; Including Computer Search Engine Software And Downloadable Software.[Class : 35] Advertising Services Including Dissemination Of Advertising For Others Via The Internet, Business Services Including Providing Links To The Websites Of Others, Providing Consumer And Product Information.[Class : 38] Telecommunication Services, Includin...

Device Mark

[Class : 9] Operating System Software For Stroing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Computer Software For Computer System And Web Based Application Development; Deployment And Management, Computer Software Platforms For Storing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Computer Software For Receiving, ...

Device Mark

[Class : 42] Non Downloadable Computer Software In The Fields Of Storing, Accessing And Sharing Files And Data Cover Computer And Wireless Networks; Non Downloadable Computer Software In The Fields Developing Online Systems And Applications; Providing Information In The Fields Of The Development Of Computer Systems, Networks And Software, Over Computer Networks, Wireless Net...

I (Logo)

[Class : 9] Computer Utility Software; Computer Software For The Detection And Removal Of Computer Viruses And Threats; Computer Software For Managing And Filtering Electronic Communications; Computer Software For Protecting And Securing Computer Networks And Applications; Computer Software For Encrypting And Authenticating Data; Computer Software For Detecting And Repairing...

(Device In Colour)

[Class : 9] Computer Utility Software; Computer Software For The Detection And Removal Of Computer Viruses And Threats; Computer Software For Managing And Filtering Electronic Communications; Computer Software For Protecting And Securing Computer Networks And Applications; Computer Software For Encrypting And Authenticating Data; Computer Software For Detecting And Repairing...

Device Mark

[Class : 9] Computer Peripherals, Namely, Computer Mice.

Branchcache

[Class : 9] Network Operating Software, Operating System Programs; Computer Software For Storing And Retrieving Data And Files;

Bing

[Class : 39] Providing A Web Site And Web Site Links To Geographic Information, Map Images, And Trip Routing

Device

[Class : 9] Computer Hardware; Computer Display And Input System Comprised Of A Projector, Camera And Computer Software For Displaying Images And Detecting Objects, User Gestures And Commands.

Iron Brigade

[Class : 9] Computer Game Software

Sharepoint

[Class : 42] Computer Services: Cloud Computing Featuring Software For Use In: Document Management, Authoring And Publishing; Developing Customized Internal Network Sites; Designing, Creating, Maintaining And Accessing Document Management, Authoring, Storage And Retrieval Systems; And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line No...

Onenote

[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Note Taking And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On¬Line Non Downloadable Software And Applications For Note Taking; Providing Technical Information In The Field Of Computer Software And Cloud Computing.

Charm

[Class : 9] Computer Programs; Graphical User Interface Software; Operating System Programs.

Sculpt

[Class : 9] Computer Peripherals

Every Street United

[Class : 9] Downloadable Video Recordings Featuring Sports.[Class : 41] Entertainment Services, Namely, An Ongoing Series Featuring Sports Provided Through Television And Webcasts.

Mod

[Class : 9] Computer Operating System Software; Computer Software; Computer Hardware; Computer Peripherals; Computer Accessories; Mobile Computing Devices; Mobile Communication Devices.

Windows Mod

[Class : 9] Computer Operating System Software; Computer Software; Computer Hardware; Computer Peripherals; Computer Accessories; Mobile Computing Devices; Mobile Communication Devices.

Microsoft Mod

[Class : 9] Computer Operating System Software; Computer Software; Computer Hardware; Computer Peripherals; Computer Accessories; Mobile Computing Devices; Mobile Communication Devices.

Device Of Three Irregular And...

[Class : 9] Computer Software For Use By Healthcare Providers For Developing Application Software And Device Drivers To Work As Part Of A Healthcare Information Sharing System; Computer Software For Collecting, Storing, Editing, Organizing, Modifying, Reviewing, Analyzing, Transmitting And Sharing Of Data And Information In The Fields Of Healthcare, Social Care, Medicine And...

Surface Connect

[Class : 9] Computer Hardware; Computer Peripherals.

Swiftkey

[Class : 9] Software, None Relating To Secure Financial Communications Or The Facilitation Of Secure Financial Transactions; Artificial Intelligence And Intelligent Inference Software; Natural Language Processing Software; Machine Learning Software; Software For Data Entry; Software For Text Entry; Software For Predictive/ Corrective Text Entry; Software For Data Entry Using...

Groove

[Class : 9] Downloadable Computer Software For Streaming, Broadcasting, Transmitting And Reproducing Text, Data, Images, Music And Video[Class : 38] Electronic Transmission Of Software, Messages, Data, Text, Sound, Graphics And Video Via Computer Networks, Wireless Networks And The Internet[Class : 41] Entertainment Services, Namely, Providing An Electronic Database Featurin...

Powershell

[Class : 9] Computer Software For Computer Programming; Computer Software For Administration Of Computer Networks; Computer Software Development Tools For Use By Computer Network Administrators.

Interflow

[Class : 42] Computer Services, Namely Collection, Analysis And Display Of Information And Data Generated By Software Applications, Servers, Network Devices, Security Devices, Firewalls And Remote Infrastructure; Computer Services, Namely Collection, Analysis And Display Of Information And Data Regarding Process Events, Registry Events And Network Events On A Network End Poi...

Holostudio

[Class : 9] Computer Software For Virtual Reality Visualization, Manipulation, Immersion And Integration Of Audio, Video, Text, Binary, Still Images, Graphics And Multimedia Files; Operating System Software; Virtual Reality Software; Computer Software, Namely, Software For Setting Up, Operating, Configuring, And Controlling Wearable Hardware And Wearable Computer Peripherals.

Holotour

[Class : 9] Computer Software For Virtual Reality Visualization, Manipulation, Immersion And Integration Of Audio, Video, Text, Binary, Still Images, Graphics And Multimedia Files; Operating System Software; Virtual Reality Software; Computer Software, Namely, Software For Setting Up, Operating, Configuring, And Controlling Wearable Hardware And Wearable Computer Peripherals.

Visual Studio

[Class : 42] Software As A Service (Saas) Services For Use In Developing And Testing Other Computer Programs; Software As A Service (Saas) Services Featuring Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications; Software As A Service (Saas) Services For Assisting Developers In Creating Program Code For Use In Multiple Application Prog...

Holopet

[Class : 9] Computer Software; Operating System Software; Virtual Reality Software; Computer Software, Namely, Software For Setting Up, Operating, Configuring, And Controlling Wearable Hardware And Wearable Computer Peripherals.

App Nexus

[Class : 42] Platform As A Service (Paas) Featuring Computer Software Platforms For Buyers And Sellers Of Online Advertising To Build, Manage, And Optimize Their Entire Online Advertising Businesses.

Smartglass

[Class : 9] Computer Software For Allowing Communication And Interaction Between Phones, Mobile Devices, Televisions, Video Game Consoles, Media Players And Audiovisual Devices.

Device Of A Square With...

[Class : 9] Computer Software.[Class : 42] Computer Software As A Service.

Storscore

[Class : 9] Computer Software For Testing, Analyzing, And Generating Reports Regarding Performance Of Computer Storage Systems.

Device Of Geometric Design

[Class : 42] Software As A Service (Saas) Services For Use In Developing And Testing Other Computer Programs; Software As A Service (Saas) Services Featuring Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications; Software As A Service (Saas) Services For Assisting Developers In Creating Program Code For Use In Multiple Application Prog...

Device

[Class : 9] Computer Software For The Design, Execution And Management Of Advertising And Marketing Campaigns; Computer Software For Generating Reports And Analytics For Advertising And Marketing Campaigns.[Class : 42] Software As A Service (Saa S) Featuring Computer Software For The Design, Execution And Management Of Advertising And Marketing Campaigns; Software As A Servi...

D (With Device Of A...

[Class : 9] Computer Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images.[Class : 42] Providing Online, Non Downloadable Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images; And Software As A Service (Saas) Feat...

Device

[Class : 9] Computer Software For Customer Relationship Management.[Class : 42] Software As A Service (Saa S) Featuring Computer Software For Customer Service Management

Continuum

[Class : 9] Operating System Software; Computer Software, Namely, For Projecting Mobile Device Software To Computer Displays And Monitors Via Computer Peripheral Devices And Wireless Networks; Computer Software, Namely, For Automatic User Interface Mode Adaption.[Class : 42] Providing Temporary Use Of Non Downloadable Online Computer Software, Namely, Operating Systems Progr...

Hololens

[Class : 9] Computer Hardware; Operating System Software; Computer Software For Virtual Reality Visualization, Manipulation, Immersion And Integration Of Audio, Video, Text, Binary, Still Images, Graphics And Multimedia Files; Computer Peripherals; Wearable Computers; Wearable Computer Peripherals; Virtual Reality Headsets For Use In Visualization, Manipulation, Immersion An...

Actiongram

[Class : 9] Computer Software For Virtual Reality Visualization, Manipulation, Immersion And Integration Of Holographic Content For The Purpose Of Making Virtual Reality Audio/Visual Content That Incorporates Holograms Or Holographic Content; Operating System Software; Computer Software, Namely, Software For Setting Up, Operating, Configuring, And Controlling Wearable Hardwa...

Holoshot

[Class : 9] Computer Software; Operating System Software; Virtual Reality Software; Computer Software, Namely, Software For Setting Up, Operating, Configuring, And Controlling Wearable Hardware And Wearable Computer Peripherals.

Holonotes

[Class : 9] Computer Software; Operating System Software; Virtual Reality Software; Computer Software, Namely, Software For Setting Up, Operating, Configuring, And Controlling Wearable Hardware And Wearable Computer Peripherals.

Microsoft Intune

[Class : 9] Computer Software For Providing Remote Access To Computer Systems And Personal Electronic Devices Within A Designated Network For The Purpose Of Administering, Monitoring, And Auditing Computer Systems, Software And Personal Electronic Devices; Computer Software For Use In Delivering And Deploying Software Applications And Data Over Computer Networks; Computer So...

Mojang

[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software Downloaded Or Downloadable; Electronic Publications; Computer Software Publications Downloaded; Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Ro Ms, Dv Ds And Other Mag...

Surface Hub

[Class : 9] Computers; Computer Hardware; Computer Peripherals; Computer Accessories, Namely, Digital Touch Screen Pens, Electrical Power Cords, Stands Specially Adapted For Computers And Computer Peripherals, And Computer Wall Mounts; Computer Displays; Touch Computer Monitors; Interactive Computer Displays; Computer Software For Use In Operating, Configuring, And Controlli...

Microsoft Edge

[Class : 9] Computer Software For Browsing The Internet; Computer Browsing Software, Namely, Software For Browsing The Global Computer Network And Private Networks; Computer Software For Providing Access To The Internet.

Heal Thvault

[Class : 9] Computer Software For Displaying, Processing And Uploading To The Internet Information Concerning Healthcare And Fitness; Computer Software For Controlling And Managing Personal And Family Health And Fitness Information; Computer Software For Use By Healthcare Providers For Developing Application Software And Device Drivers To Work As Part Of A Healthcare Informa...

Sea Of Thieves

[Class : 9] Game Software.[Class : 41] Entertainment Services, Namely, Providing An On Line Computer Game.

Recore

[Class : 9] Game Software.

Minecon

[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Discs, Tapes, Cartridges, Cd Ro Ms, Dv Ds And Other Magnetic, Electronic Or Optical Media, All Bearing Audio Visual Content From Computer And Video Games; Computer Peripherals; Computer Software For Gathering, Monitoring, Processing, Analysing, Managing And Reporting Informa...

Sprightly

[Class : 9] Downloadable Software, Namely, Instant Messaging Software, File Sharing Software, Communications Software For Electronically Exchanging Data, Audio, Video Images And Graphics Via Computer, Mobile, Wireless, Telecommunications Networks And Downloadable Computer Software For Processing Images, Graphics, Audio, Video, And Text

Windows 365

[Class : 9] Computer Software, Namely, Operating System Programs And Utilities, Programs, Address Book Programs, Calculator Programs, Terminal Emulation Programs, Programs For Downloading And Playing Audio And Video, Programs For Managing Computer Power Supplies, Programs For Use In Transmitting Data Between Computers And Other Electronic Devices, Computer Maintenance Progra...

Device Of Letter 'E'

[Class : 9] Computer Software For Browsing The Internet; Computer Browsing Software, Namely, Software For Browsing The Global Computer Network And Private Networks; Computer Software For Providing Access To The Internet.

Device Of Geometrical Miscellaneous

[Class : 9] Computer Software For Displaying, Processing And Uploading To The Internet Information Concerning Healthcare And Fitness; Computer Software For Controlling And Managing Personal And Family Health And Fitness Information; Computer Software For Use By Healthcare Providers For Developing Application Software And Device Drivers To Work As Part Of A Healthcare Informa...

Parature

[Class : 9] Computer Software For Customer Service And Help Desk Support Management; Computer Software For Customer Relationship Management And Instruction And User Manuals Therefor, Sold As A Unit; Computer Software For Use In Collecting, Managing And Modifying Data On Social Networks; Computer Software That Monitors The Internet And Social Networks To Provide Alerts, Manag...

Logo

[Class : 41] Education; Providing Of Training; Entertainment; Sporting And Cultural Activities;[Class : 38] Telecommunications;[Class : 9] Scientific, Nautical, Surveying, Photographic, Cinematographic, Optical, Weighing, Measuring, Signaling, Checking(supervision), Life Saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Trans...

Xna

[Class : 42] Technical Support And Technical Consultation Services In The Field Of Software Development For Video Game And Computer Game Software; And Providing Online Information In The Field Of Software Development And Technical Support For Video Game And Computer Game Software';[Class : 9] Computer Software Development Tools For Use In Developing Computer Games And Video ...

Playready

[Class : 9] Digital Rights Management Software; And Data Encryption Software";

Device Mark

[Class : 42] Providing Technical Information And Technical Documentation In The Field Of Computer Software And File Formats For The Formatting, Storing, Printing And Reading Of Documents Using A Markup Language; Providing Online Technical Support Services, Namely, Support For Manufacturers Developing Xps Based Printing Solutions And Software Developers Integrating Support In...

Excel Launch Icon (2007)

[Class : 9] Computer Software, Namely, Spreadsheet Software; And Computer Programs For Creating Charts And Graphs From Electronic Spreadsheets.

Lifecam Liberty

[Class : 9] Computer Hardware And Peripherals; Webcams; Computer Software For Use As An Interface Between Webcams And Computers.

Arc

[Class : 9] Computer Peripherals.

Windows Azure

[Class : 9] Computer Software; Computer Operating System Software; Network Operating Software; Computer Software Development Tools; Website Development Software; Computer Software That Provides Web Based Access To Applications And Services Through A Web Operating System Or Portal Interface; Computer Software For Developing And Operating Cloud Computer Networks And Applicatio...

Tm Application Id 1860274 Device

[Class : 9] Computer Software, Namely, Computer Server Software For Use In Re Al Time Communications Featuring Instant Messaging, Audio, Video And Data Exchange, Web Conferencing And Document Sharing; Computer Utility Programs; Computer Software Development Programs; Computer Security And Authentication Software For Controlling Access Rot And Communications With Computers; A...

E (With Device)

[Class : 9] Computer Programs For Connecting To Remote Computers And Computer Networks; Computer Programs For Searching The Contents Of Remote Computers And Computer Networks: Computer Programs For Transmitting And Receiving Data And Files To And From Remote Computer And Computer Networks; Computer Programs For Assisting Users In Navigating Through Computer Networks, I...

Halo Reach

[Class : 28] Toys, Games And Playthings, Namely, Toy Action Figures And Accessories Therefore, Mechanical Action Toys, Toy Vehicles And Bendable Toy Figurines

Gadugi

[Class : 9] Computer Software For Generating,Displaying And Printing Fonts.

Oneapp

[Class : 35] Online Retail Store Services Facilitating The Download Of Computer Software For Use On Mobile Phones, Media Players, And Other Portable Electronic Devices

Forza Horizon

[Class : 9] Game Software.[Class : 41] Providing A Website Featuring Information In The Field Of Games And Home Entertainment; Entertainment Services, Namely, Providing Online Video Games.

Groupme

[Class : 9] Software Capable Of Causing Transmission Of A Message From A Message Originator To Multiple Predefined Recipients Across A Wired And/Or Wireless Network.

Device

[Class : 9] Computer Software, Namelv. A Full Line Of Computer Software For Business, Business Management, Accounting, Marketing And E Commerce Applications: Computer Software For Supply Side Management, Customer Relationship Management, Financial Management And Accounting[Class : 42] Computer Services, Namelv. Providing Specific Information As Requested By Customers Via The...

Marlow Briggs

[Class : 9] Game Software.

Press Play

[Class : 9] Game Software.

Powerstar Golf

[Class : 9] Game Software.[Class : 41] Entertainment Services, Namely, Providing Online Video Games.

Microsoft Design (Color) Device Mark

[Class : 16] Paper Goods And Printed Matters (Including Tutorial Books, Periodicals, Various Publications).[Class : 35] Business And Advertising Services.[Class : 9] Computer Software And Computer Hardware.[Class : 36] Financial Services.[Class : 25] Clothing.[Class : 41] Education And Entertainment Services.[Class : 42] Computer And Scientific Services.[Class : 45] Personal...

Ori And The Blind Forest

[Class : 9] Game Software.

Jump Ahead

[Class : 9] Game Software; Set Top Boxes.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.

Team Dakota

[Class : 9] Game Software.

Microsoft Onedrive

[Class : 42] Providing Temporary Use Of Non Downloadable Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically; Electronic Storage Of Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data For Others.

Curah!

[Class : 42] Computer Services, Namely, Creating An On Line Community For Registered Users To Participate In Discussions And Get Feedback From Their Peers.

Snap Attack

[Class : 9] Game Software.[Class : 41] Entertainment Services, Namely, Providing An On Line Computer Game.

Device Of Geometrical Miscellaneous

[Class : 42] Providing Temporary Use Of Non Downloadable Software For Mapping And Directions, Language Translation, And Accessing Information Related To Entertainment, Travel, Finance, News, Sports, Weather, Food And Drink, And Health And Fitness Consisting Mainly Of Links To Other Websites; Providing Internet Search Engine Services; Providing Temporary Use Of Non Downloadab...

Secrets And Treasure

[Class : 9] Game Software.

Power Bi

[Class : 9] Computer Software For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presenting And Sharing Data And Other Information[Class : 42] Computer Software As A Service (Saa S) Services For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presenting An...

Office Mod

[Class : 9] Computer Operating System Software; Computer Software; Computer Hardware; Computer Peripherals; Computer Accessories; Mobile Computing Devices; Mobile Communication Devices.

Device

[Class : 9] Software; Artificial Intelligence And Intelligent Inference Software; Natural Language Processing Software; Machine Learning Software; Software For Data Entry; Software For Text Entry; Software For Predictive/Corrective Text Entry; Software For Data Entry Using Touch Screens; Software For Gesture Recognition; Software For Gesture Based Data Entry.

Minecraft

[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software Downloaded Or Downloadable; Electronic Publications; Computer Software Publications Downloaded; Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Ro Ms, Dv Ds And Other Mag...

Window Cover

[Class : 9] Cases For Mobile Phone; Application Software; Software For Mobile Phones; Computer Application Software For Mobile Phone; Downloadable Computer Programs; Operating System Programs; Application Software For Smart Phone And Tablet Computer; Computers; Computer Software; Smart Phones; Portable Communication Apparatus Namely Handsets, Walkie Talkies, Satellite Teleph...

Codelens

[Class : 42] Software As A Service (Saa S) Services For Analysis And Production Of Programming Code In The Field Of Software Development.

Microsoft Passport

[Class : 9] Computer Software For Data Synchronization, Password Management, And Authenticating User Identification; Computer Software For Restricting Access To Data And Computer Programs Stored On Computer Hardware And External Data Storage Media; Computer Software To Prevent Identity Theft And Phishing.[Class : 42] Software As A Service (Saa S) Services Namely, Computer So...

Windows Hello

[Class : 9] Computer Software, Namely, Security Software, User Authentication Software, Password Management And Protection Software For Mobile Digital Electronic Devices And Computing Devices.[Class : 42] Online Computer Services, Namely, Online Scanning, Detecting, Managing And Authenticating Security And Log In Credentials For Users Of Mobile Digital Electronic Devices And...

Fusion Genesis

[Class : 9] Computer Game Software[Class : 41] Entertainment Services ,Namely ,Providing And On Line Computer Game.

Blue Frontier

[Class : 9] Computer Games; Computer And Video Games Software; Downloaded Computer Software Publications; Interactive Entertainment Software; Data Recorded Electronically From The Internet; Discs, Tapes, Cartridges, Cd Ro Ms And Other Magnetic, Electronic Or Optical Media, All Bearing Computer Games Software Or Video Games.[Class : 25] Articles Of Clothing; Headgear; T Shirt...

Battletoads

[Class : 9] Game Software.

Microsoftinterflow

[Class : 42] Computer Services, Namely, Collection, Analysis And Display Of Information And Data Generated By Software Applications, Servers, Network Devices, Security Devices, Firewalls And Remote Infrastructure; Computer Services, Namely, Collection, Analysis And Display Of Information And Data Regarding Process Events, Registry Events And Network Events On A Network Endpo...

Digigirlz

[Class : 41] Educational Services, Namely, Conducting Workshops, Seminars And Conferences In The Fields Of Computers And Technology.

Gigjam

[Class : 9] Software, Namely, Computer Software For Accessing Computer Software Applications And Mobile Software Applications, Software For Extracting And Manipulating Text, Images And Data, Software Enabling Users To Share, Edit And Collaborate On Documents With Other Users, And Software Enabling Users To Communicate With Other Users Via Audio And Text.[Class : 42] Software...

Surface

[Class : 9] Computer Software; Computer Hardware; Computer Hardware Peripherals; Computer Hardware Accessories; Computers; Laptop Computers; Tablet Computers; Computer Mice; Computer Keyboards; Mobile Computers; Handheld Computers; Mobile Phones; Mobile Phone Peripherals; Mobile Phone Accessories, Mobile Phone Communication Devices; Handheld Mobile Digital Electronic Devices...

Surfacestudio

[Class : 9] Computer Software; Computer Hardware; Computer Hardware Peripherals; Computer Hardware Accessories; Computers; Laptop Computers; Tablet Computers; Computer Mice; Computer Keyboards; Mobile Computers; Handheld Computers; Mobile Phones; Mobile Phone Peripherals; Mobile Phone Accessories, Mobile Phone Communication Devices; Handheld Mobile Digital Electronic Devices...

Ascend; Hand Of Kul

[Class : 9] Computer Game Software.[Class : 41] Entertainment Services, Namely, Providing An On Line Computer Game.

Forza Hub

[Class : 41] Entertainment Services, Namely, Providing Interactive, Multiplayer Game Services For Video Games, Namely, Charting Progress And Accomplishments Of Users In A Series Of Video Games; Providing Information About Video Games; Providing A Web Site Featuring Information In The Field Of Video Games (Terms Considered Too Vague By The International Bureau Rule 13.2.B) ...

Xamarin

[Class : 9] Computer Software Platforms For Mobile Devices For Use In The Creation, Development And Operation Of Software Applications; Software Development Tools For The Creation Of Applications For Mobile Devices.[Class : 42] Platform As A Service (Paas) Services Featuring Computer Software Platforms For Mobile Devices For Use In The Creation, Development And Operation Of ...

Vapormg

[Class : 9] Computers; Tablet Computers; Laptop Computers: Mobile Computers; Reader For E Books And Other Electronic Publications: Computer Peripherals; Wireless Computer Peripherals; Mobile Communications Modules For Use With Tablet Computers: Headphones; Audio Speakers; Computer Keyboards; Computer Mouse; Webcams; Digital Pens; Power Cords; Battery Chargers; Electrical Ca...

Screamride

[Class : 9] Game Software.

Kinectimals

[Class : 28] Stuffed And Plush Toys

Kodu

[Class : 9] Computer Software Development Tools For Developing Computer Games And Video Games; And Computer Programs, Namely, Game Software For Use On Computers And Video Game Players[Class : 41] Entertainment Services, Namely Providing Online Computer Games

Tm Application Id 1810306 Device

[Class : 41] Providing A Web Site Featuring Information In The Field Of Computer Games, Games And Home Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; And Entertainment Services, Namely, Providing An On Line Computer Game[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players

Kaizala

[Class : 9] Computer Software Including Downloadable Mobile Application Featuring Software For Use In Group Communication Namely, Posting And Instant Messaging, File Sharing, Calendar Synchronization And Automated Integration With External Service Providers.[Class : 42] Software As A Service (Saas) Featuring Computer Software Platforms For Use In Group Communication, Namely ...

Xbox One Console

[Class : 9] Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.

Minecoin

[Class : 9] Computer Software; Computer Game Software; Computer Games.[Class : 36] Virtual Currency For Use In On Line Community; Virtual Currency For Use In Gaming; Providing A Virtual Currency For Use By Members Of An On Line Community Via A Global Computer Network; Providing A Virtual Currency For Use By Members Of A Gaming Community.[Class : 42] Non Downloadable Software...

Xbox One X Xdk

[Class : 9] Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.

Xbox One X

[Class : 9] Computer Software; Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.[Class : 42] Providing Temporary Use Of Online, Non Downloadable Computer Software; Providing Temporary Use Of Online, Non Downloadable Video Game Software.

Xiaoice

[Class : 9] Computer Software For Providing For Interaction Of A User With A Conversational User Interface; Computer Software For Retrieving Information From A User And Delivering To The User Context Sensitive Information And User Specific Information; Computer Software For Providing Information To A User From An Adaptive, Artificially Intelligent Software Agent; Computer So...

Forza Motorsport

[Class : 9] Downloadable Video Games

Microsoft Azure

[Class : 9] Computer Software; Computer Operating System Software; Network Operating Software; Computer Software Development Tools; Website Development Software; Computer Software That Provides Web Based Access To Applications And Services Through A Web Operating System Or Portal Interface; Computer Software For Developing And Operating Cloud Computer Networks And Applicatio...

Playfab

[Class : 9] Computer Software; Computer Software For Video Game Development, Operation, Management, And Hosting.[Class : 42] Platform As A Service (Paa S); Platform As A Service (Paa S) Featuring Computer Software Platforms Used For The Operations, Management And Hosting Of Online Video Games; Software As A Service (Saa S); Software As A Service (Saa S) Featuring Computer So...

Microsoft Ignite

[Class : 35] Organizing, Promoting And Conducting Exhibitions, Trade Shows And Events In The Fields Of Innovation, Technology, Computer Software And Hardware, Computer Software Development, Business, Cybersecurity, Security, Technology Development, Cloud Technology, Data Analytics, Data, Digital Transformation, Internet Of Things, Artificial Intelligence And Machine Learning...

Make Advertising Matter By Xandr

[Class : 35] Advertising, Marketing, And Promotion Services; Advertising And Marketing Services, Namely, Promoting The Goods And Services Of Others; Consulting In The Fields Of Business, Advertising, Marketing And Data Analytics; Dissemination Of Advertising And Marketing For Others Via The Internet And Other Communications Networks And Platforms; Developing And Providing Ma...

Wasteland

[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing A Web Site Featuring Information In The Field Of Computer Games, Games And Home Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; And Entertainment Services, Namely, Providing An On Line Computer Ga...

Secure Score

[Class : 9] Computer Software.[Class : 42] Software As A Service (Saas).

Altspacevr

[Class : 9] Software To Provide Access To 3 D Virtual Reality Environments, Including Avatars And User Interfaces For 3 D Virtual Reality; Software That Allows Participants To View And Interact With Web Content In A 3 D Virtual Reality Environment And To Interact With Others In A Virtual Reality Environment For Business, Leisure, Entertainment, Or Training Purposes; Software...

Sara

[Class : 9] Computer Software For Diagnosing, Troubleshooting And Repairing Computer Software Problems; Computer Software For Use In Setting Up And Configuring Software Applications Via The Internet, Computer And Wireless Networks; Computer Software For Use In Delivering And Deploying Software Applications Vis The Internet, Computer And Wireless Networks.

Xandr Cares And Design

[Class : 41] Educational Services, Namely, Providing Individual And Group Education Sessions, Seminars, Workshops, Internships, And Apprenticeships In The Fields Of Business, Technology, Software Development, Telecommunications, Advertising, Marketing, Artificial Intelligence, Machine Learning, Automation, And Data Analytics; Educational Services, Namely, Providing Individua...

Semantic Machines

[Class : 9] Software

Device With Semantic Machines

[Class : 9] Software

Semantic Machines

[Class : 38] Communication Services

Semantic Machines & Design

[Class : 38] Technology Designed To Enhance Communications.

Semantic Machines

[Class : 42] Software As A Service, Platform As A Service

Semantic Machines & Design

[Class : 42] Software As A Service, Platform As A Service

Promoteiq

[Class : 9] Scientific, Research, Navigation, Surveying, Photographic, Cinematographic, Audiovisual, Optical, Weighing, Measuring, Signalling, Detecting, Testing, Inspecting, Life Saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling The Distribution Or Use Of Electricity; App...

Promoteiq

[Class : 35] Advertising; Business Management; Business Administration; Office Functions; The Bringing Together, For The Benefit Of Others, Of A Variety Of Goods (Excluding The Transport Thereof), Enabling Customers To Conveniently View And Purchase Those Goods; Digital Marketing, Digital Advertising, Ecommerce Services; Advertising, Public Relations, Publicity, Sales Promot...

Promoteiq

[Class : 42] Scientific And Technological Services And Research And Design Relating Thereto; Industrial Analysis And Industrial Research Services; Design And Development Of Computer Hardware And Software; Computer Software Services; All The Aforesaid Only In Relation To Electronic Business Marketing, Digital Marketing, Managing And Controlling Product Display On Websites And...

Edge Icon 2019 (Bw)

[Class : 9] Computer Software; Computer Software For Browsing The Internet; Computer Operating Software, Computer Browsing Software, Namely, Software For Browsing The Global Computer Network And Private Networks, Computer Software For Providing Access To The Internet.[Class : 35] Advertising And Marketing Services; Digital Advertising Services; On Line Retail Store Services ...

Device

[Class : 9] Computer Software; Computer Software For Browsing The Internet; Computer Operating Software, Computer Browsing Software, Namely, Software For Browsing The Global Computer Network And Private Networks, Computer Software For Providing Access To The Internet.[Class : 35] Advertising And Marketing Services; Digital Advertising Services; On Line Retail Store Services ...

Grounded

[Class : 9] Downloadable Computer Game Software; Downloadable Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing A Website Featuring Entertainment Information In The Field Of Computer Games, Games, Computer Enhancements For Games, And Home Entertainment; Entertainment Services, Namely, Providing On Line Computer G...

Bing Icon (Color)

[Class : 9] Scientific, Research, Navigation, Surveying, Photographic, Cinematographic, Audiovisual, Optical, Weighing, Measuring, Signalling, Detecting, Testing, Inspecting, Life Saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling The Distribution Or Use Of Electricity; Ap...

World's Edge

[Class : 28] Game Controllers For Computer Games; Gaming Headsets For Use In Playing Video Games.

Device

[Class : 9] Class 9, Including Computer Hardware; Computer Hardware Peripherals; Computer Hardware Peripherals, Namely, Computer Cables, Audio/Video Cables, Audio/Video Cable Connectors, Power Cords, Computer Display Screens, Touch Screens, Projection Screens For Virtual Reality Visualization, Manipulation, Immersion And Integration Of Audio, Video, Text, Binary, Still Image...

Microsoft

[Class : 9] All Goods In Class 9, Including Computer Hardware; Computer Hardware Peripherals; Computer Hardware Peripherals, Namely, Computer Cables, Audio/Video Cables, Audio/Video Cable Connectors, Power Cords, Computer Display Screens, Touch Screens, Projection Screens For Virtual Reality Visualization, Manipulation, Immersion And Integration Of Audio, Video, Text, Binary...

Dataverse

[Class : 9] Computer Software; Computer Software For The Development Of Computer Software Applications.

Dataverse

[Class : 42] Providing Non Downloadable Software; Software As A Service (Saa S); Hardware As A Service (Haa S); Platform As A Service (Paa S); Computer Consultancy Services.

Microsoft

[Class : 28] Games, Toys And Playthings; Video Game Apparatus; Gymnastic And Sporting Articles; Decorations For Christmas Trees; Game Consoles; Computer Game Consoles; Video Game Consoles; Hand Held Game Consoles; Video Game Consoles For Use With An External Display Screen Or Monitor; Apparatus For Electronic Games Adapted For Use With An External Display Screen Or Monitor; ...

Miscellaneous Device

[Class : 28] Games, Toys And Playthings; Video Game Apparatus; Gymnastic And Sporting Articles; Decorations For Christmas Trees; Game Consoles; Computer Game Consoles; Video Game Consoles; Hand Held Game Consoles; Video Game Consoles For Use With An External Display Screen Or Monitor; Apparatus For Electronic Games Adapted For Use With An External Display Screen Or Monitor; ...

Windows & Design

[Class : 9] Software; Computer Programs; Computers; Laptops; Tablet Computers; Computer Backup And Storage Systems; Computer Peripherals; Carrying Cases Adapted For Computers; Web Cameras; Protective Covers And Cases; Computer Servers; Portable Electronic Devices.[Class : 16] Printed Publications.[Class : 35] Online Retail Store Services; Conducting Trade Shows And Exhibitio...

Windows Device

[Class : 9] Software; Computer Programs; Computers; Laptops; Tablet Computers; Computer Backup And Storage Systems; Computer Peripherals; Carrying Cases Adapted For Computers; Web Cameras; Protective Covers And Cases; Computer Servers; Portable Electronic Devices.[Class : 16] Printed Publications.[Class : 35] Online Retail Store Services; Conducting Trade Shows And Exhibitio...

Windows Sonic

[Class : 9] Computer Software, Namely, Software For Manipulating Digital Audio And For Improving Sound; Computer Software Namely, Software For Use In Processing, Recording, Reproduction, Streaming, Transmission, And Reception Of Electronic Or Digital Signals; Computer Software Namely, Software For Operating, Measuring, Signaling And Checking Hearing Aids And Audiological Ins...

Flip

[Class : 9] Software[Class : 41] Education Services[Class : 42] Software As A Service[Class : 45] Social Networking

Windows 365

[Class : 9] Computer Software; Computer Software For Virtual Desktop Platform And Server Applications; Computer Software For Accessing And Using A Cloud Computing Network; Computer Software For Accessing Virtual Computer Systems And Environments; Cloud Computing Software; Computer Software For Communication And Data Exchange On Computer Networks And Global Computer Networks....

Microsoft

[Class : 36] Financial Services, Namely, Installment Loans, Lease Purchase Financing And Loans, Loan Financing, Clearing And Reconciling Financial Transactions Via Computer And Communication Networks; Financial Services, Namely, Installment Loans, Lease Purchase Financing And Loans, And Loan Financing; Virtual Currency For Use In Gaming; Financial Services, Namely, Providing...

Microsoft Design (Color) 2012

[Class : 35] Business Services, Namely, Business Consultation Services, Business Advice And Information Services; Business Marketing Services; Business Consulting Services; Business Networking; Providing Information In The Fields Of Business And Commerce Over Global Computer Networks And Global Communications Networks; Providing Consumer Product Information Via The Internet;...

Microsoft Loop

[Class : 9] Collaboration Software; Collaboration Software Platforms; Collaboration Management Software Platforms.[Class : 42] Software As A Service (Saa S) Services Featuring Software For Enabling Users To Communicate, Collaborate, And Share Computer Screens, Desktops, Data, Electronic Documents, Video, And Applications Via The Internet.

Device

[Class : 9] Computer Software For The Collection And Analysis Of Business Data And Business Productivity Information; Downloadable Computer Software For Personnel And Project Management; Social Media Management, Peer To Peer Communications, Workplace Management; Computer Software Platform For Organizational Development; Computer Application Software For Mobile Phones, Namely...

Sharepoint Syntex

[Class : 9] Software[Class : 42] Software As A Service

Microsoft Sentinel

[Class : 9] Computer Security Software; Downloadable Computer Software For Security Information And Event Management (Siem) Employing Artificial Intelligence And Machine Learning To Enable Automated Responses In Real Time To Security Vulnerabilities, Threats And Events; Downloadable Computer Software For Collection, Storage, Analysis And Presentation Of Data For Forensic Ana...

Context Iq

[Class : 42] Software As A Service (Saa S) Services.

Context Iq

[Class : 9] Computer Software.

Device

[Class : 9] Computer Operating System Software; Operating System Programs; Graphical User Interface Software; Mobile Phones.

Sway

[Class : 9] Computer Software; Computer Application Software.[Class : 42] Online Computer Software, Software As A Service (Saas).

Appnexus (With Device)

[Class : 42] Platform As A Service (Paas) Featuring Computer Software Platforms For Buyers And Sellers Of Online Advertising To Build, Manage, And Optimize Their Entire Online Advertising Businesses.

Xbox One S

[Class : 9] Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.

Envision

[Class : 35] Organizing, Promoting And Conducting Online, Business To Business Events And Webinars In The Field Of Computing And Digital Transformation.[Class : 41] Educational Services, Namely Providing A Web Video Series For An Enterprise Audience In The Field Of Computing And Digital Transformation.[Class : 42] Providing A Website And Platform As A Service Featuring On Li...

Activesync

[Class : 9] Computer Programs, Namely, Operating Systems Programs And Utility Programs, Computer Programs For Managing Communications And Data Exchange Between Computers.

Kiln

[Class : 9] Game Software; Computer Game Software; Downloadable Computer Programs, Namely, Game Software For Use On Computers, Video Game Players, And Electronic And Wireless Devices.[Class : 41] Providing A Website Featuring Non Downloadable Game Software; Providing Temporary Use Of Non Downloadable Game Software; Providing Online Non Downloadable Game Software; Entertainme...

Microsoft

[Class : 16] Computer Hardware, Software Manuals, Computer Documentation : Reference, User, Instructional & General Utlities Manuals & Data Sheets For Computer Hardware & Software Manufacturers Producers And Users

Device

[Class : 9] Scinetific, Nautical, Surveying And Electrical Apparatus And Instruments (Incuding Wireless), Photographic, Cinemato Graphic, Optical, Weighing, Measuring, Singnalling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments; Coin Or Counter Freed Apparatus; Talking Machines; Cash Registers; Calculating Machines; Fire Extinguishing Apparatus, C...

Device

[Class : 16] Printed Computer Programmes, Books, Periodicals, Manuals, And Other Publications Relating To Computer And Computer Programmes, Paper Tapes And Cards For The Recordal Of Computer Programmes Being Goods Included In Class 16.

Microsoft At Work

[Class : 16] Books, Instruction Manuals, Newsletters And Magazines Relating To Computers, Computer Programs And Office Equipment, Business Equipment And Electrical And Electronic Equipment Including Computers And Computer Programs Stationery Including Pencil Sharpeners And Staplers.

Netmeeting

[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sounds Or Images, Magnetic Data Carriers, Recording Discs, Automatic Vending Machines And Mechanisms For Coin Operat...

Active Channel

[Class : 9] Scientific, Nautical, Surveying, Electric Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking (Supervision). Life Saving And Teaching Apparatus And Instruments; Apparatus For Recording, Transmision Or Reproduction Of Sound Or Images; Magnetic Data Carriers, Recording Discs; Automatic Vending Machines And Mechanisms For Coin Operated ...

Windows Media

[Class : 9] Computer Programs, Namely Software For Use In The Creation, Delivery, Playing And Viewing Of Video, Graphic, Audio, Text, Computer Programs And Other Data Over Global Computer And Communication Networks.

Star (Device)

[Class : 9] Video Game Player Machines For Use With Televisions And Computers, Electronic Devices, Namely Computer Hardware For Accessing Global Computer And Communication Networks, Computer Hardware And Peripherals, Computer Keyboards, Computer And Video Game Joysticks And Game Controllers, Computer Game Pads And Controllers, Computer Peripherals, Namely Computer Mice And O...

Microsoft Office Xp

[Class : 9] Database Software; Electronic Spreadsheet Software; Software For Use In Word Processing, Electronic Mail, Calendar And Scheduling, Desktop Publishing, Image Editing, Graphics Creation And Editing, Drawing, Computer Aided Design And Drafting, Creation Of Multimedia Presentations, Project Management, Customer Management, Business Planning, Direct Mail, And Business...

Infopath

[Class : 9] Computer Software, Namely Software To Design Created, Edit And Publish Documents, Computer Programs That Assist Users In Designing, Creating, Editing, Publishing And Completing Documents And Computer Programs For Transmittings Documents Between Users Included In Class 9.

Butterfly Design

[Class : 41] Providing Interactive On Line Computer Games Via Computer Network And Global Communication Networks, Providing Information In The Fields Of Entertainment, Movies, Music, Sports And Education Over Computer Networks And Global Communication Networks, Entertainment Services, On Line Education Services, Providing Educational Information For Students And Teachers Ove...

Msdn

[Class : 16] In Respect Of "Publications,Namely Newsletters, Pamphlets, Magazines, Books, Instruction Manuals, User Guides And Reference Guides In The Field Of Computers, Software, And The Development Of Computer Systems And Software"[Class : 41] In Respect Of "Providing Informaton Over Computer Networks And Global Communication Networks In The Fields Of Entertainment,Music,...

Device Of Triangle And Circle...

[Class : 9] Computer Software For Viewing, Searching And Playing Pre Recorded Audio And Audio Streaming Over The Internet, Computer Software For Viewing, Searching And Playing Television Broadcasts, Pre Recorded Video And Video Streaming Over The Internet And Computer Software For Viewing, Searching And Displaying Graphic Images Included In Class 9.

Gadgets

[Class : 9] Operating System Software,Computer Utility Programs;Computer Software For Displaying Links To Other Programs And Websites,For Launching Other Programs And For Linking Users To Websites

Hotstart

[Class : 9] Operating System Software, Computr Software For Digital Media Playback On Computers; Computer Software For Initializing Digital Media Devices And Software';

Device Mark

[Class : 35] Promoting The Use Of Digital Pre Paid Purchase Services Through The Administration Of An Incentive Award Program[Class : 36] Digital Pre Paid Purchase Services, Namely Processing Online Payments

Bitlocker

[Class : 9] Operating System Software; Computer Utility Programs; Computer Software For Encryption; Computer Software For Restricting Access To Data And Computer Programs Stored On A Personal Computer

Device

[Class : 9] Digital Communication Hardware And Software; Webcams, Computer Keyboards, Telephones, Headsets For Use With Telephones, Computers, Personal Digital Assistants And Digital Music Players, And Computer Mice; Software For Sending And Receiving Instant Messages [Class : 38] Instant Messaging Services

Zune

[Class : 9] Multimedia Player, Entertainment And Communications Devices; Peripherals And Accessories For Use With Multimedia Player Entertainment And Communications Device; Headphones; Earphones; Docking Stations For Use With Multimedia Players; Wired And Wireless Remote Control Devices For Use With Multimedia Players; Battery Chargers; Battery Packs; Electrical Connectors, ...

Forefront

[Class : 9] Computer Software For Providing Computer And Computer Network Security, Anti Virus Protection, And Intrusion Detection And Prevention, Computer Software For Managing And Filtering Electronic Communincations; Computer Software For Protecting And Securing Computer Networks And Applications, Computer Software Providing Firewall Protection, And Computer Software For ...

P

[Class : 9] Desktop Publishing Software

In

[Class : 9] Software For Creating And Managing Computer Templates.

P

[Class : 9] Computer Software, Namely, Programs For Creating Presentations, Graphics And Videos.

S

[Class : 9] Computer Software For Use In Project Management; Computer Software For Designing, Creating, Maintaining And Accessing Customized Internal Network Sites And Global Communication Network Sites; Computer Authoring Software For Use On Internal Computer Networks And Global Communication Networks, Namely, Software For Creating, Editing And Delivering Textual And Gr...

Vertipaq

[Class : 9] Computer Software For Compressing And Managing Data

Kin

[Class : 9] Scicnliiic. Nauticaf. Survcyinu. Pfiotouraphic. Cinematographic, Optical, Weighing, Measuring. Signaling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling Electricity. Apparatus For Recording, Transmission Or Reproduction Of Sound ...

Webmatrix

[Class : 9] Computer Software Development Tools; Computer Software For Creating And Authoring Web Based Applications.

Start.Gg

[Class : 9] Downloadable Computer Software For Use In E Sports Competitions And Streaming; Electronic Sports Training Simulators; Downloadable And Recorded Computer Software For Accessing The Internet, Computer Networks, And Global Communication Networks; Downloadable And Recorded Computer Software For Accessing A Search Engine And Web Browsing; Downloadable And Recorded Com...

Empowering Us All

[Class : 35] Providing Information In The Fields Of Business And Commerce Over Global Computer Networks And Global Communications Networks; Business Services, Namely, Business Consultation And Marketing Services, Business Advice And Information Services; Providing Consumer Product Information Via Global Computer Networks; Promoting The Goods And Services Of Others Via Global...

Microsoft Deepspeed

[Class : 9] Downloadable Computer Software Development Tools; Downloadable Computer Software For Artificial Intelligence Processing And Deep Learning; Downloadable Computer Software Development Libraries, Namely, Downloadable Electronic Data Files Consisting Of Software Development Tools For Model Development And Training; Downloadable Computer Software For Implementing A Co...

Microsoft Onedrive

[Class : 9] Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically.[Class : 38] Telecommunication Services, Namely, Transmission Of Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data By Means Of Telecommunications Network...

Microsoft Start

[Class : 9] Downloadable And Recorded Computer Software For Accessing The Internet, Computer Networks, And Global Communication Networks; Downloadable And Recorded Computer Software For Accessing A Search Engine And Web Browsing; Downloadable And Recorded Computer Software For Accessing And Searching Online Databases And Websites; Downloadable And Recorded Computer Software ...

Microsoft Defender

[Class : 9] Downloadable Computer Software, Namely, Downloadable Computer Security Software For Computer, Applications, Cloud, And Computer Network Security, Automated Domain Threat Protection And Prevention, Analysis, Management And Integration Of Threat Data, Security Information And Event Management, Detection, Investigation And Elimination Of Computer Threats, Cyberattac...

Project: Mara

[Class : 9] Software; Computer Software; Recorded Game Software; Video Game Software; Computer Programs; Downloadable Game Software; Downloadable Computer Game Software; Downloadable Video Game Software; Downloadable Electronic Game Software; Downloadable Electronic Game Software For Mobile And Cellular Telephones; Downloadable Electronic Game Software For Handheld Electroni...

Clockwork Revolution

[Class : 9] Software; Computer Software; Recorded Game Software; Video Game Software; Computer Programs; Downloadable Game Software; Downloadable Computer Game Software; Downloadable Video Game Software; Downloadable Electronic Game Software; Downloadable Electronic Game Software For Mobile And Cellular Telephones; Downloadable Electronic Game Software For Handheld Electroni...

Contraband

[Class : 9] Game Software; Computer Game Software; Downloadable Computer Programs, Namely, Game Software For Use On Computers, Video Game Players, And Electronic And Wireless Devices.[Class : 41] Providing A Website Featuring Non Downloadable Game Software; Providing Temporary Use Of Non Downloadable Game Software; Providing Online Non Downloadable Game Software; Entertainme...

Airband

[Class : 9] Computer Hardware, Software And Software Applications To Provide Internet Connectivity Services To White Space Telecommunications Channels, Networks And Databases.

Power Platform Icon

[Class : 9] Computer Software For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presenting And Sharing Data And Other Information; Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer...

The Endless

[Class : 9] Downloadable Game Software; Computer Game Software; Video Game Software; Computer Game Software For Use With Personal Computers, Home Video Game Consoles, And Arcade Based Video Game Consoles; Computer Game Software Downloadable From A Global Computer Network; Digital Media, Namely, Pre Recorded Cd Ro Ms, Tapes, Cartridges, Digital Video Discs, Digital Versatile ...

Office Icon 2019 (B/W)

[Class : 35] Organizing, Arranging, Conducting And Promoting Of Trade Shows, Business, Commercial, And Promotional Exhibitions And Business Conferences In The Fields Of Computer Hardware, Software, Telecommunications, And High Technology And In The Field Of Development Of Computer Programs And Systems; Providing Business Information Concerning Human Resources, Sales And Mark...

The Power To Innovate

[Class : 9] Computer Software For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presenting And Sharing Data And Other Information; Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer...

Nuance

[Class : 42] Computer Consultation And Technical Consultation In The Field Of Computers, Updating And Maintenance Of Computer Software And Software Design And Development Services In The Fields Of Speech, Speaker, Voice And/Or Voice Print Recognition, Identification, Authentication, Validation, Verification And Processing And Language Recognition.

Ender Dragon

[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications In The Nature Of Mag...

Dax

[Class : 9] Computer Software For Use In Speech Recognition Applications And Systems; Speech Processing Software; Downloadable Computer Software For Speech Recognition, Natural Language Understanding, Movement Monitoring, Human Feature Recognition, Gathering And Processing Biometric Data, Speaker Diarization, Document Creation, Machine Learning, And Artificial Intelligence; ...

Dragon

[Class : 9] Computer Software For Use In Speech Recognition Applications And Systems; Speech Processing Software; Computer Software For Document Management; Computer Application Software For Mobile Phones To Enable Voice Activated Dialing, Internet Searching And Navigating Via A Worldwide Computer Network, And Dictation Of Messages; Computer Application Software For Handheld...

Syntex

[Class : 9] Software Excluding Software For Enterprise Resource Planning (Erp) Systems.[Class : 42] Software As A Service.

Onelake

[Class : 9] Downloadable Computer Software; Downloadable Computer Software For Data Management, Data Repositories, Data Ingestion, Data Wrangling, Data Aggregation, Data Integration, Data Security, Data Analysis, Providing Data Analytics, Data Reporting, Information Delivery, Online Analytic Processing, Machine Learning, Combining Information From Various Data Sources And Da...

Microsoft Onelake

[Class : 9] Downloadable Computer Software; Downloadable Computer Software For Data Management, Data Repositories, Data Ingestion, Data Wrangling, Data Aggregation, Data Integration, Data Security, Data Analysis, Providing Data Analytics, Data Reporting, Information Delivery, Online Analytic Processing, Machine Learning, Combining Information From Various Data Sources And Da...

Towerborne

[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications In The Field Of Vide...

Xcloud

[Class : 9] Video Game Software[Class : 38] Streaming Of Audiovisual Material In The Nature Of Video Game Competitions And Play Via The Internet; Streaming Of Audiovisual Video Game Related Material Via The Internet[Class : 41] Entertainment Services, Namely, Providing Online Video Games; Rental Of Video Games; Providing Entertainment Information And Video Game Tournaments A...

Microsoft Pluton

[Class : 9] Silicon Microprocessors; Microcontroller Units; Microcontrollers And Chipsets For The Secure Receipt And Transmission Of Data; Microcontrollers And Chipsets Optimized For Use In Access Control, Identification, Authentication, Security And Safety; Communications Receivers; Data Exchange Units; Computer Hardware Modules For Use In Security And Secure Power Manageme...

Pentiment

[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications In The Field Of Vide...

Microsoft Advertising Brand Identity Icon

[Class : 9] Software; Computer Programs; Applications; Mobile Applications; Software And Mobile Application Software For Use In Advertising, Marketing, And Promotion Services; Artificial Intelligence, Machine Learning, And Deep Learning Software; Generative Artificial Intelligence Software; Generative Artificial Intelligence Applications; Software Using Artificial Intelligen...

Device Of A Triangle Shaped Ribbon

[Class : 9] Downloadable Software For Use In Data Governance, Data Management, Data Protection And Data Compliance, Namely, Downloadable Software For Use To Enable Users To Integrate, Manage, Classify, Label And Search For Data And Electronic Information, Downloadable Software To Design, Create, Construct, And Manage Data Maps To Facilitate Use Of And Access To Data And Elec...

The Mark Consists Of A...

[Class : 9] Software; Applications; Mobile Applications; Artificial Intelligence, Machine Learning, And Deep Learning Software; Generative Artificial Intelligence; Generative Artificial Intelligence Software; Generative Artificial Intelligence Applications; Software Featuring Generative Artificial Intelligence; Applications Featuring Generative Artificial Intelligence; Softw...

Cobalt

[Class : 9] Silicon Chips; Computer Chips; Computer Hardware For Delivery Of Cloud Computing Services, Namely, Central Processing Units, And Computer Chips; Computer Hardware Used For Advanced Cloud Computing Functions In The Nature Of General Computing, Networking, Storage, And Computation Offloading.

Azure Cobalt

[Class : 9] Silicon Chips; Computer Chips; Computer Hardware For Delivery Of Cloud Computing Services, Namely, Central Processing Units, And Computer Chips; Computer Hardware Used For Advanced Cloud Computing Functions In The Nature Of General Computing, Networking, Storage, And Computation Offloading.

Azure Maia

[Class : 9] Silicon Chips; Computer Chips; Computer Hardware For Delivery Of Cloud Computing Services, Namely, Ai Accelerators, And Computer Chips; Computer Hardware Used For Advanced Cloud Computing Functions In The Nature Of Artificial Intelligence, Networking, Storage, And Computation Offloading.

Maia

[Class : 9] Silicon Chips; Computer Chips; Computer Hardware For Delivery Of Cloud Computing Services, Namely, Ai Accelerators, And Computer Chips; Computer Hardware Used For Advanced Cloud Computing Functions In The Nature Of Artificial Intelligence, Networking, Storage, And Computation Offloading.

Series S Icon

[Class : 38] Providing Online Chat Rooms For Transmission Of Messages Among Computer Users For Use In Connection With Interactive Games Played Over Computer Networks And Global Communications Networks.

Device Of A Circular Shaped...

[Class : 9] Software; Applications; Mobile Applications; Artificial Intelligence, Machine Learning, And Deep Learning Software; Generative Artificial Intelligence; Generative Artificial Intelligence Software; Generative Artificial Intelligence Applications; Software Featuring Generative Artificial Intelligence; Applications Featuring Generative Artificial Intelligence; Softw...

Microsoft Farmbeats

[Class : 35] Advertising; Business Management; Business Administration; Office Functions; Database Management; Compilation And Collection Of Data, Information And Statistics For Business Purposes Relating To Agriculture; Retail Store And Online Retail Store Services For Computer Software And Equipment Relating To Agriculture; Business Management Services In The Agriculture F...

Omnisonic Speakers

[Class : 9] Audio Speakers For Laptop Computers, Tablet Computers, Portable Computers, Portable Devices And Headphone Speakers.

Clipchamp

[Class : 41] Video Editing; Video Capturing Services; Video Capturing Services, Namely, Capturing Of Videos From A Video Camera, Screen Recording Or Webcam; Entertainment And Educational Services Featuring Electronic Media, Multimedia Content, Videos, User Generated Content, And Related Information Via The Internet And Other Communications Networks; Entertainment And Educati...

Device

[Class : 9] Computer Software To Assist A User In Operating A Computerized Handheld Device; Computer Software For Initiating And Receiving Telephone Calls, And For Accessing, Storing, Retrieving, Managing, Processing And Using Information; Computer Software For Voice Recognition, Processing Voice Commands And Converting Between Speech And Text; Computer Software For Creating...

Lxp (With Device Of Image...

[Class : 9] Game Software.

Device

[Class : 9] Downloadable Computer Software For Creating, Integrating, Editing, Importing, And Exporting Digital Media, Graphics, Drawings, Text, And Images; Keyboards; Downloadable Computer Graphics.

Microsoft Sq

[Class : 9] Integrated Circuits, Namely, Integrated Circuit Chip Sets, Computer Chips.

V

[Class : 9] Downloadable Computer Software Program For Creating Drawings And Graphics.

S

[Class : 9] Downloadable Computer Software For Use In Creating, Accessing, Editing, And Sharing Documents, Presentations And Webpages; Downloadable Computer Software For Use In Locating And Arranging Audio, Video, Graphic, Image, Textual And Multimedia Content, And Configuring Such Content Into A Document, Presentation Or Webpage.[Class : 42] Providing Online, Non Downl...

Neo

[Class : 9] Computer Hardware; Computers; Laptop Computers; Tablet Computers; Notebook Computers; Mobile Computers; Mobile Phones; Smartphones; Handheld Computers; Touch Screens; Computer Hardware Peripherals, Namely, Headphones, Computer Keyboards, Computer Mice, Computer Stylus, Headsets, Electronic Docking Stations.

Duo

[Class : 9] Computer Hardware; Computers; Laptop Computers; Tablet Computers; Notebook Computers; Mobile Computers; Handheld Computers; Computer Hardware Peripherals; Namely, Headphones, Computer Keyboards, Computer Mice, Computer Stylus, Headsets; Electronic Docking Stations.

Priva Icon

[Class : 9] Downloadable Software For Use In Connection With Privacy Management For Identifying, Managing, Redacting, And Safeguarding Personally Identifiable Information To Prevent And Mitigate Privacy Risks And Conflicts, And For Implementing Privacy Policies And Data Subject Rights To Meet Organizational Needs And Ensure Compliance With Privacy Laws And Regulatory Require...

Microsoft Syntex

[Class : 9] Software Excluding Software For Enterprise Resource Planning (Erp) Systems.[Class : 42] Software As A Service Excluding Services And Software For Enterprise Resource Planning (Erp) Systems.

Microsoft Priva

[Class : 9] Software For Use In Connection With Privacy Management.[Class : 42] Software As A Service Services In Connection With Privacy Management.

Device

[Class : 9] Computer Software And Computer Programs For Database Management, Data Storage And Backup, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Transmission Of Voice, Dat...

Microsoft Flip

[Class : 9] Software.[Class : 41] Education Services.[Class : 42] Software As A Service.[Class : 45] Social Networking.

Microsoft Entra

[Class : 42] Software As A Service.[Class : 9] Software.

A

[Class : 9] Downloadable Computer Software And Mobile Software Applications For Data Storage And Backup, Database Management, Virtualization, Electronic And Telecommunications Networking, Collaboration, Remote Access, Remote Computer Technical Support, Cloud Computing, Data Sharing, Data Security, Electronic Network Access, Administration And Management Of Computer Applicati...

A

[Class : 9] Downloadable Computer Software And Mobile Software Applications For Data Storage And Backup, Database Management, Virtualization, Electronic And Telecommunications Networking, Collaboration, Remote Access, Remote Computer Technical Support, Cloud Computing, Data Sharing, Data Security, Electronic Network Access, Administration And Management Of Computer Applicati...

Halo: The Endless

[Class : 9] Downloadable Game Software; Computer Game Software; Video Game Software; Computer Game Software For Use With Personal Computers, Home Video Game Consoles, And Arcade Based Video Game Consoles; Computer Game Software Downloadable From A Global Computer Network; Digital Media, Namely, Pre Recorded Cd Ro Ms, Tapes, Cartridges, Digital Video Discs, Digital Versatile ...

Microsoft Purview

[Class : 9] Downloadable Software For Use In Data Governance, Data Management, Data Protection And Data Compliance, Namely, Downloadable Software For Use To Enable Users To Integrate, Manage, Classify, Label And Search For Data And Electronic Information, Downloadable Software To Design, Create, Construct, And Manage Data Maps To Facilitate Use Of And Access To Data And Elec...

Priva

[Class : 9] Software For Use In Connection With Privacy Management.[Class : 42] Software As A Service Services In Connection With Privacy Management.

The Endless

[Class : 9] Downloadable Game Software; Computer Game Software; Video Game Software; Computer Game Software For Use With Personal Computers, Home Video Game Consoles, And Arcade Based Video Game Consoles; Computer Game Software Downloadable From A Global Computer Network; Digital Media, Namely, Pre Recorded Cd Ro Ms, Tapes, Cartridges, Digital Video Discs, Digital Versatile ...

D

[Class : 9] Computer Software For Sales Management, Customer Service Management, Business Operations Management, Financial And Finance Operations Management, Remote And Field Service Operations Management, Project Service Automation Management, Marketing Campaign Planning And Management, Customer Relationship Management, Enterprise Resource Management, Sales And Marketing In...

The Endless

[Class : 28] Toys, Games And Playthings, Namely, Toy Action Figures And Accessories Therefor, Mechanical Action Toys, Toy Vehicles And Bendable Toy Figurines; Game Controllers For Computer Games; Electronic Interactive Board Games For Use With External Monitor; Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units...

Device

[Class : 9] Software.[Class : 42] Software As A Service.

Minecraft

[Class : 39] Cruise Ship Services; Boat Cruises; Arranging Of Cruises; Transportation Of Passengers By Cruise Ship; Travel Agency Services; Travel Agency Services, Namely, Making Reservations And Bookings For Transportation And Cruises; Providing Transport For Excursions; Travel And Transport Information Services; Provision Of Travel Information; Providing Transportation Inf...

Xbox Series Xs

[Class : 9] Blank Digital Storage Media; Recorded Video Game Programs; Downloadable Video Game Software.[Class : 28] Controllers For Game Consoles; Video Game Interactive Remote Control Units.[Class : 41] Educational Services, Namely, Providing Educational Information On Online Educational Video Games; Providing Of Training In The Fields Of The Video And Computer Game In...

Syntex

[Class : 9] Software.[Class : 42] Software As A Service.

Series X

[Class : 9] Downloadable Video And Computer Game Programs; Downloadable And Recorded Software For Operating Game Controllers; Electronic Devices, Namely, Computer Hardware For Accessing Global Computer And Communication Networks; Computer Hardware And Peripherals.[Class : 14] Jewelry.[Class : 28] Video Game Consoles; Interactive Video Game Devices Comprised Of Video Gam...

Device

[Class : 9] Computer Hardware And Peripherals.

Kermit

[Class : 9] Typeface Fonts, Type Fonts And Type Designs Of Alphanumerical Characters And/Or Typographical Symbols Recorded On A Machine Readable Media; Downloadable Computer Software For Generating Type Fonts, Typeface Designs And Ornamental Designs.

Microsoft Viva

[Class : 9] Computer Software For The Collection And Analysis Of Business Data And Business Productivity Information; Downloadable Computer Software For Personnel And Project Management, Social Media Management, Peer To Peer Communications, Workplace Management; Computer Software Platform For Organizational Development; Computer Application Software For Mobile Phones, Namely...

Flipgrid

[Class : 9] Software.[Class : 42] Software As A Service.

Minecraft

[Class : 3] Cosmetic Cotton Wool For Personal Use, Namely, Cotton Swabs, Cotton Balls, Cotton Pads; Pre Moistened Cosmetic Wipes; Hair Care Preparations, Namely, Shampoos, Dry Shampoos, Conditioners; Hair Styling Preparations, Namely, Hair Styling Sprays, Gels, Foams, Clays, And Waxes; Hair Masks; Hair Detangling Preparations; Make Up Preparations, Namely, Eyebrow Pencils, E...

Perfect Dark

[Class : 9] Software; Computer Software; Recorded Game Software; Video Game Software; Computer Programs; Downloadable Game Software; Downloadable Computer Game Software; Downloadable Video Game Software; Downloadable Electronic Game Software; Downloadable Electronic Game Software For Mobile And Cellular Telephones; Downloadable Electronic Game Software For Handheld Electroni...

Perfect Dark

[Class : 25] Clothing, Hats, Footwear.

Azure Percept

[Class : 9] Computer Software; Computer Software For The Development Of Computer Software Applications; Intelligent Edge Devices; Edge Computing And Storage Devices; Sase (Secure Access Service Edge); Industrial Sase.[Class : 42] Providing Non Downloadable Software; Software As A Service (Saa S); Connectivity As A Service (Caa S), Hardware As A Service (Haa S); Platform A...

Percept

[Class : 9] Computer Software; Computer Software For The Development Of Computer Software Applications; Intelligent Edge Devices; Edge Computing And Storage Devices; Sase (Secure Access Service Edge); Industrial Sase.[Class : 42] Providing Non Downloadable Software; Software As A Service (Saa S); Connectivity As A Service (Caa S), Hardware As A Service (Haa S); Platform As A...

Vs Code

[Class : 9] Downloadable Computer Programs For Developing Other Computer Programs, Downloadable Compiler Programs, Downloadable Debugger Programs, And Downloadable Utility Programs For Creating Graphical Applications; Downloadable Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs; Downloadable Computer Programs...

Series S

[Class : 9] Downloadable Video And Computer Game Programs; Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Software For Operating Game Controllers; Electronic Devices For Accessing Global Computer And Communication Networks; Computer Hardware And Peripherals.[Class : 11] Accent Lights For Indoor Use; Lighting Fixtures.[Clas...

Azure Orbital

[Class : 38] Satellite Transmission; Satellite Communication Services; Telecommunication Services For Air To Ground And Ground To Air Communications, Namely, Local And Long Distance Transmission Of Audio, Video And Data Transmission By Means Of The World Wide Web, Satellites And Relaying Ground Stations.[Class : 42] Providing Temporary Use Of Non Downloadable Cloud Based Sof...

Deepspeed

[Class : 9] Downloadable Computer Software Development Tools; Downloadable Computer Software For Artificial Intelligence Processing And Deep Learning; Downloadable Computer Software Development Libraries, Namely, Downloadable Electronic Data Files Consisting Of Software Development Tools For Model Development And Training; Downloadable Computer Software For Implementing A Co...

Series X|S

[Class : 9] Downloadable Video And Computer Game Programs; Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Software For Operating Game Controllers; Electronic Devices For Accessing Global Computer And Communication Networks; Computer Hardware And Peripherals.[Class : 11] Accent Lights For Indoor Use; Lighting Fixtures.[Clas...

Mojang Studios

[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Downloadable Electronic Publications In The Nature Of Magazines In The Field Of Computer Software; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, Electronic Or Optical Media, All Bearing Computer Games,...

Xbox Series S

[Class : 9] Apparatus And Instruments For Recording, Transmitting, Reproducing Or Processing Sound, Images Or Data, Blank Digital Storage Media, Computers And Computer Peripheral Devices; Recorded Video Game Programs; Downloadable Video Game Software.[Class : 28] Video Game Machines; Video Games Consoles; Video Game Consoles For Use With An External Display Screen Or Mo...

The Fight Is In Us

[Class : 41] Organizing Seminars, Events, Conferences, Training Sessions For Educational Purposes, Namely, Promoting And Fostering Blood Plasma Donation; Arranging And Conducting Educational Conferences, Events, Programs, Seminars, And Training Sessions For Educational Purposes, Namely, Promoting And Fostering Blood Plasma Donation.[Class : 44] Providing Information In ...

Tell Me Why

[Class : 9] Downloadable Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing A Web Site Featuring Entertainment Information In The Field Of Computer Games, Games, And Home Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Prov...

Takelessons

[Class : 35] Operating An Online Marketplace For Matching Instructors With Students In The Fields Of Music, Performing Arts And Visual Arts.

Series X|S

[Class : 38] Providing Online Chat Rooms For Transmission Of Messages Among Computer Users For Use In Connection With Interactive Games Played Over Computer Networks And Global Communications Networks.

Series S

[Class : 38] Providing Online Chat Rooms For Transmission Of Messages Among Computer Users For Use In Connection With Interactive Games Played Over Computer Networks And Global Communications Networks.

Mojang Studios

[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Computer Software Publications (Downloadable); Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, El...

Mojang Studios

[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Computer Software Publications (Downloadable); Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, El...

Mojang Studios

[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Computer Software Publications (Downloadable); Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, El...

Device

[Class : 9] Computer Software; Mobile Application Software; Collaboration Software Platform.[Class : 35] Business Services; Business Consulting Services; Providing Business Information; Business Advice And Information Services.[Class : 42] Computer And Information Technology Consultancy Services; Platform As A Service (Paas) Services; Software As A Service (Saas) Services.

Accountguard

[Class : 9] Computer Software.[Class : 42] Software As A Service.

Mojang Studio

[Class : 38] Providing Online Access To Computer Networks, Computer Databases, The Internet, On Line Bulletin Boards, Virtual Worlds, Servers, Virtual Worlds Including User Generated Characters, And Libraries Of Text, Graphics And Audio Visual And Multimedia Information And Entertainment; Providing On Line Electronic Bulletin Board Services And Chat Rooms; Providing User Acc...

Mojang Studios

[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Computer Software Publications (Downloadable); Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, El...

As Dusk Falls

[Class : 9] Downloadable Computer And Video Game Software; Downloadable Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Entertainment Services, Namely, Providing Temporary Use Of Non Downloadable Game Software, Providing Online Nondownloadable Visual And Audio Recordings In The Field Of Computer And Video Games, Providing...

Xbox Series

[Class : 9] Apparatus And Instruments For Recording, Transmitting, Reproducing Or Processing Sound, Images Or Data; Recorded And Downloadable Media, Computer Software, Blank Digital Or Analogue Recording And Storage Media; Computers And Computer Peripheral Devices; Recorded Video Game Programs; Downloadable Video Game Software.[Class : 28] Games, Toys And Playthings; Video G...

Avowed

[Class : 9] Software; Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Entertainment; Providing A Website Featuring Information In The Field Of Computer Games, Games, And Home Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing O...

D

[Class : 9] Computer Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images.[Class : 42] Providing Online, Non Downloadable Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images; Software As A Service (Saas) Featurin...

Everwild

[Class : 9] Software; Computer Programs, Namely, Game Software For Use On Computers And Video Game Players; Visual Recordings; Audio Recordings.[Class : 16] Printed Publications; Books; Comics; Magazines; Cartoon Prints.[Class : 18] Bags; Handbags; Purses; Wallets; Shopping Bags; Sports Bags; Tote Bags; School Bags; Travelling Bags; Backpacks; Rucksacks; Parts And Fittings F...

Xbox Series X

[Class : 9] Apparatus And Instruments For Recording, Transmitting, Reproducing Or Processing Sound, Images Or Data; Recorded And Downloadable Media, Computer Software, Blank Digital Or Analogue Recording And Storage Media; Computers And Computer Peripheral Devices; Recorded Video Game Programs; Downloadable Video Game Software.[Class : 28] Games, Toys And Playthings; Video G...

Undead Labs Key

[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...

Intellicode

[Class : 9] Computer Software Development Tools; Computer Software, Namely, Artificial Intelligence Enabled Software For Assisting With Software Development.[Class : 42] Software As A Service (Saas) Services Featuring Software For Developing, Reviewing, And Testing Other Computer Programs And Applications; Software As A Service (Saas) Services Featuring Software For Ass...

Airband

[Class : 35] Providing Business Information And Consulting In The Field Of White Space Telecommunications And Internet Connectivity; Promoting Public Interest And Awareness Of White Space Telecommunications And Internet Connectivity (Terms Considered Too Vague By The International Bureau Rule 13 (2) (B) Of The Common Regulations).[Class : 38] Telecommunications Services, N...

Azure Playfab

[Class : 9] Computer Software; Computer Software For Video Game Development, Operation, Management, And Hosting.[Class : 42] Platform As A Service (Paa S); Platform As A Service (Paa S) Featuring Computer Software Platforms Used For The Operations, Management And Hosting Of Online Video Games; Software As A Service (Saa S); Software As A Service (Saa S) Featuring Computer So...

Fluid Framework

[Class : 9] Downloadable Software, Namely Software For Connecting To The Cloud To Allow For Collaboration Among Users Across Other Software Applications; Downloadable Software, Namely Software For Integrating Artificial Intelligence And Intelligent Agents Into Other Software; Downloadable Software, Namely Software For Allowing Real Time Updates To Software Applications Acces...

Farmbeats

[Class : 9] Scientific, Nautical, Surveying, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling Electricity; Apparatus For Recording, Transmission Or Reproduction Of ...

Double Fine

[Class : 9] Computer Game Software, Computer Software; Headsets For Use With Computers; Mousepads; Night Vision Goggles; Computer Game Software Downloadable Via A Global Computer Network And Wireless Devices; Computer Game Software For Use On Mobile And Cellular Phones; Prerecorded Media, Namely, Digital Audio And Video Tapes And Discs, C Ds, Dv Ds, And Blue Ray Discs All Fe...

Forza Street

[Class : 9] Downloadable Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing Temporary Use Of Non Downloadable Computer Game Software; Providing A Web Site Featuring Information In The Field Of Computer Games, Games, Namely, Electronic Games And Video Games, And Entertainment Information In The Field Of Computer Ga...

Brütal Legend

[Class : 9] Computer Game Software, Computer Software, Headsets For Use With Computers; Mousepads; Night Vision Goggles; Computer Game Software Downloadable Via A Global Computer Network And Wireless Devices; Computer Game Software For Use On Mobile And Cellular Phones; Prerecorded Media, Namely, Digital Audio And Video Tapes And Discs, C Ds, Dv Ds, And Blue Ray Discs All Fe...

Broken Age

[Class : 9] Downloadable Computer Game Software; Downloadable Computer Software For Use In The Field Of Electronic Gaming; Computer Game Software Downloadable Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Use On Mobile And Cellular Phones; Prerecorded Digital Audio And Discs, C Ds, All Featuring Music; Downloadable Music Fi...

Electionguard

[Class : 9] All Software In Class 9.[Class : 42] All Software As A Service (Saa S) Services In Class 42.

Microsoft Fluid Framework

[Class : 9] Downloadable Software, Namely Software For Connecting To The Cloud To Allow For Collaboration Among Users Across Other Software Applications; Downloadable Software, Namely Software For Integrating Artificial Intelligence And Intelligent Agents Into Other Software; Downloadable Software, Namely Software For Allowing Real Time Updates To Software Applications Acces...

Psychonauts

[Class : 9] Downloadable Computer Game Software; Computer Game Software Downloadable Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Use On Mobile And Cellular Phones; Downloadable Movies Featuring Electronic Games Provided Via A Video On Demand Service; Downloadable Music Files; Phonograph Records Featuring Electronic Game S...

The Bard's Tale

[Class : 41] Providing Information In The Field Of Computer Games, Games And Home Entertainment, Via A Web Site; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; And Entertainment Services, Namely, Providing An On Line Computer Game.[Class : 42] Non Downloadable Computer Game Software; Providing Technology That Enables Users To Cr...

Hellblade

[Class : 9] Downloadable Computer Game Software; Computer Game Software Downloadable Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Use On Mobile And Cellular Phones; Prerecorded Media, Namely, Digital Audio And Video Tapes And Discs, C Ds, Dv Ds, And Digital Optical Discs All Featuring Films, Movies And/Or Television Progra...

Azure

[Class : 41] Education Services, Namely, Conducting Seminars, Classes, Workshops, Online Courses, And Conferences In The Fields Of Technology, Computers, Computer Software, Computer Networks, Web Services, Mobile Computing, Artificial Intelligence, Cloud Computing, Software As A Service (Saa S), Platform As A Service (Paa S), Mobile Backend As A Service (M Baa S), Artificial...

Windows

[Class : 9] Computers, Tablet Computers, Laptops; Software Developer Kits (E.G. Windows Sd Ks); Portable Electronic Devices For Receiving And Reading Text, Images And Sound Through Wireless Internet Access, Namely, Mobile Computers, Portable Computers, Mobile Phones; Computer Software For Use In Connection With The Transmission Of Voice And Data; Computer Software Used...

A

[Class : 9] Downloadable Computer Database Management Software.

Forza

[Class : 9] Downloadable Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing Information In The Field Of Computer Games, Games, And Home Entertainment, Via A Website; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing On Line Computer ...

Y

[Class : 9] Downloadable Computer Software For Sending And Receiving Electronic Messages.[Class : 35] On Line Business Networking Services.[Class : 38] Transmission Of Messages; Message Sending, Receiving And Forwarding; Electronic Transmission Of Mail And Messages; Instant Messaging Services.[Class : 42] On Line Non Downloadable Software For Sending And Receiving Electro...

Undead Labs

[Class : 9] Computer Programs, Namely, Game Software For Use In Computers And Video Game Players.[Class : 41] Providing Via Web Site Information In The Field Of Computer Games, Games And Home Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing On Line Computer Games.[Class : 42...

T

[Class : 9] Downloadable Computer Software Which Enables Instant Messaging And File Sharing; Downloadable Communications Software For Enabling Computer Network, Wireless Network And Internet Users To Exchange Data, Audio Transmissions, Video Images And Graphics; Downloadable Computer Programs For Managing Communications And Data Exchange Between Hand Held Computers And...

O

[Class : 9] Downloadable Computer Programs For Providing Enhanced Electronic Mail And Scheduling Capabilities, For Use By Individual Computer Users, Namely, Downloadable Computer Programs For Managing, Viewing, And Editing Files, Documents, Electronic Mail Messages And Private Network And Global Computer Network Communications; Downloadable Computer Programs For Meetin...

S

[Class : 9] Downloadable Computer Software For Use In Project Management; Downloadable Computer Software For Designing, Creating, Maintaining And Accessing Customized Internal Network Sites And Global Communication Network Sites; Downloadable Computer Authoring Software For Use On Internal Computer Networks And Global Communication Networks, Namely, Software For Creati...

Pillars Of Eternity

[Class : 9] Downloadable Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing Information In The Field Of Computer Games, Games And Home Entertainment Via A Web Site; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; And Entertainment Services, Namely, Providing An On Line...

Device

[Class : 9] Downloadable Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically.[Class : 38] Telecommunication Services, Namely, Transmission Of Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data By Means Of Telecommun...

S

[Class : 9] Downloadable Computer Software, Namely, Software For The Transmission, Recording, Reproduction, Display, Organization, Management, Manipulation And Review Of Messages, Text, Images, Files, Audio, Video And Audio Visual Content And Other Data For The Facilitation Of Communications Between Two Or Multiple Users Via Computer Networks, Communication Networks An...

The Outer Worlds

[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing Information In The Field Of Computer Games, Games And Home Entertainment Via A Web Site; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; And Entertainment Services, Namely, Providing An On Line Computer Game.[Cl...

Hacking Stem

[Class : 9] Downloadable Electronic Publications In The Nature Of Educational Course Materials In The Fields Of Science, Technology, Engineering And Math; Software, Namely, Educational Software For Providing Instruction In The Fields Of Science, Technology, Engineering And Math; Computer Hardware And Computer Peripherals; Teaching Robots.[Class : 41] Developing Curricul...

Microsoft Premonition

[Class : 9] Software For Use In Medical Analysis, Namely, Detection Of Pathogens, Performing Gene Sequencing Research, Visualization, And Analysis, And Locating Insects And Insect Habitats; Software For Operating Drones And Insect Traps.[Class : 12] Drones.[Class : 21] Insect Traps.[Class : 42] Software As A Service (Saa S) Services Featuring Software For Use In Medical ...

Device

[Class : 3] Soaps; Perfumery, Essential Oils, Cosmetics, Hair Lotions; Adhesives For Affixing False Eyelashes; After Shave Lotions; Air Fragrancing Preparations; Antiperspirant Soap; Antiperspirants [Toiletries]; Bath Salts, Not For Medical Purposes; Cosmetic Creams; Cosmetic Dyes; Cosmetic Kits; Cosmetic Pencils; Cosmetic Preparations For Baths; Cosmetic Preparations For Ey...

Device

[Class : 9] Computer Software For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presenting And Sharing Data And Other Information; Computer Application Software For Mobile Phones, Namely, Software For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presen...

Story Remix

[Class : 9] Computer Software For Creating And Editing Digital Images, Sound, Videos And Movies; Computer Software For Compressing And Decompressing Digital Media; Computer Software For Viewing, Searching And Playing Pre Recorded Digital Videos And Movies; Computer Software For Organizing, Storing, Sharing And Viewing Digital Images, Photographs, Videos And Movies; Computer ...

Device Of Geometrical Figure

[Class : 9] Downloadable Computer Software For Streaming, Broadcasting, Transmitting And Reproducing Text, Data, Images, Music And Video; Electronic Databases In The Field Of Entertainment Featuring Music And Videos Recorded On Computer Media.[Class : 38] Electronic Transmission Of Software, Messages, Data, Text, Sound, Graphics And Video Via Computer Networks, Wireless Netw...

Xbox

[Class : 35] On Line Retail Store Services Featuring Downloadable Computer And Video Games; Operating An On Line Shopping Site In The Field Of Computer And Video Games; Providing Consumer Product Information And Advertising And Commercial Information Regarding Computer And Video Games Available For Purchase Via An Online Searchable Database; Providing Consumer Product ...

Halo: Outpost Discovery

[Class : 9] Computer And Video Games Software; Interactive Entertainment Software For Playing Computer Games And Video Games; Downloadable Publications In Electronic Form Supplied On Line From A Database Or From Facilities Provided On The Internet Or Other Networks Including Websites, Namely, Books, Comics, Magazines, Newsletters, Catalogues And Manuals In The Field Of Compu...

The Initiative

[Class : 9] Computer Programs, Namely, Game Software For Use In Computers And Video Game Players.[Class : 41] Providing Entertainment Information In The Field Of Computer Games, Games And Home Entertainment, Via A Web Site; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing On Line Computer ...

X

[Class : 9] Recorded And Downloadable Computer Software, Namely, Recorded And Downloadable Computer Spreadsheet Software; Recorded And Downloadable Computer Programs For Creating Charts And Graphs From Electronic Spreadsheets.[Class : 42] Cloud Computing Featuring Software For Use In Electronic Spreadsheets And Accessing Remotely Stored Data For Such Applications; Providi...

Microsoft Pluton

[Class : 9] Silicon Microprocessors; Microcontroller Units; Microcontrollers And Chipsets For The Secure Receipt And Transmission Of Data; Microcontrollers And Chipsets Optimized For Use In Access Control, Identification, Authentication, Security And Safety; Communications Receivers; Data Exchange Units; Computer Hardware Modules For Use In Security And Secure Power Manageme...

Azure Brainwave

[Class : 9] Computer Software; Computer Software For Artificial Intelligence (Ai) Processing; Computer Chips For Artificial Intelligence (Ai) Processing; Computers And Servers For Artificial Intelligence (Ai) Processing; Computer Operating System Software; Embedded Operating Software; Computer Software Development Tools, For Use In The Fields Of Artificial Intelligence, Deep...

Imagine Cup

[Class : 41] Educational Services And Entertainment, Namely, Providing Incentives To Students To Demonstrate Excellence Through The Issuance Of Awards And Recognition, All In The Fields Of Innovation And Technology; Arranging And Conducting Educational Competitions For Students And Participants In The Fields Of Innovation And Technology.

Azure Cloud For All

[Class : 9] Downloadable Computer Software And Mobile Software Applications For Data Storage And Backup, Database Management, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Tr...

Glint

[Class : 9] Computer Software Platform For Organizational Development In The Field Of Human Resources; Computer Software Platform For Organizational Development In The Field Of Employment; Computer Software For Interactive Communication By Companies In The Field Of Organizational Development.[Class : 35] Providing Organizational Development Consulting Services; Consulting Se...

Unlock Next

[Class : 9] Computer Software For Sales Management, Customer Service Management, Business Operations Management, Financial And Finance Operations Management, Remote And Field Service Operations Management, Project Service Automation Management, Marketing Campaign Planning And Management, Customer Relationship Management, Enterprise Resource Management, Sales And Marketing In...

Playground

[Class : 9] Entertainment Software, Namely, Electronic Game Software; Interactive Entertainment Software, Namely, Electronic Game Software; Application Software, Namely, Electronic Game Software.[Class : 41] Entertainment Services, Namely, Providing Online Nondownloadable Electronic Games; Provision Of Entertainment Software, Namely, Online Non Downloadable Electronic Ga...

E (With Three Dimensionaldepiction Of A...

[Class : 9] Computer Software For Information Management, Data And Text Processing, Networking, Electronic Mail And Other Electronic Communications In The Nature Of Private Network And Global Computer Network Communications, For Use In The Field Of Business Communications, General Email Communications, And General Use; Computer Software For Use Monitoring And Managing E Mail...

Halo Spartan Assault

[Class : 9] Game Software.

Device

[Class : 9] Computer Hardware; Computer Software; Computer Peripherals.

Minecraft Realms

[Class : 28] Games; Toys; Playthings; Soft Toys; Board Games; Gymnastic And Sporting Articles; Electronic Toys And Electronic Games; Handheld Electronic Games Apparatus; Slot Machines And Gaming Devices; Play Sets And Play Cases; Toy Models; Handheld Games; Playing Cards; Instructional And Teaching Materials In The Form Of Games; Balls; Electronic Amusement Apparatus; Amusem...

Codelens

[Class : 9] Computer Software For Analysis And Production Of Programming Code In The Field Of Software Development.

Launchworks

[Class : 9] Game Software.

Glacier Blast

[Class : 9] Game Software.

Secrets And Treasure

[Class : 9] Game Software.

Tm Application Id 2705699 Device

[Class : 9] Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.

S

[Class : 9] Computer Software, Namely, Software For The Transmission, Recording, Reproduction, Display, Organization, Management, Manipulation And Review Of Messages, Text, Images, Files, Audio, Video And Audio Visual Content And Other Data For The Facilitation Of Communications Between Two Or Multiple Users Via Computer Networks, Communication Networks And The Global Inform...

Oneguide

[Class : 41] Providing On Line Entertainment Information, Namely, Information About Television Programming.

Microsoft Office Mod

[Class : 9] Computer Operating System Software; Computer Software; Computer Hardware; Computer Peripherals; Computer Accessories; Mobile Computing Devices; Mobile Communication Devices.

Onedrive

[Class : 9] Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically.[Class : 38] Telecommunication Services, Namely, Transmission Of Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data By Means Of Telecommunications Network...

Delve

[Class : 9] Computer Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images.[Class : 42] Providing Online, Non Downloadable Software And Software As A Service (Saas) Services For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Ima...

Throne Together

[Class : 9] Game Software.

K I

[Class : 9] Game Software.[Class : 41] Entertainment Services, Namely, Providing An On Line Computer Game.

B Bing

[Class : 9] Computer Software For Computers, Mobile Phones, Computer Tablets, And Other Personal Electronic Devices, Namely, For Use In Accessing, Monitoring, Tracking, Searching, Saving, And Sharing Information In The Fields Of Health, Fitness, Food, Beverages, Wine, Spirits, Travel, Entertainment, Weather, News, Sports, Maps, Language Translation, And Finance; Search Engin...

Swiftmoji

[Class : 9] Downloadable Software Application In The Nature Of A Keyboard For Mobile Devices.

Device Of Butterfly

[Class : 9] Computer Programs For Accessing Internet, Computer Networks And Global Communication Networks; Computer Software For Accessing A Search Engine; Computer Software For Providing Access To A Search Engine; Computer Programs For Transmitting And Receiving Graphics, Audio, Video, And Other Data From A Remote Computer Network And For Accessing Global Communications Net...

Windows Ink

[Class : 9] Computer Software For Processing, Creating, Editing, Importing, Exporting, And Sending User Interfaces, Web Pages, Software Applications, Digital Media, Graphics, Drawings, Text, And Images; Computer Software For Integrating Digital Media, Graphics, Drawings, Text, And Images With And Into Other Software Programs And Applications.

Zo

[Class : 41] Entertainment.[Class : 42] Providing Online Non Downloadable Software; Software As A Service (Saa S).[Class : 45] Online Social Networking Services.

Microsoft Appsource

[Class : 35] On Line Marketplace Services, Namely, Operating An On Line Marketplace Featuring Computer Software.[Class : 42] Software As A Service (Saa S) Services Featuring Software For Use In Connection With Buying, Selling Sharing, Searching, Downloading, Customizing, Integrating And Reviewing Computer Software; Providing A Website Featuring Technology That Enables U...

Botlet

[Class : 9] Computer Software That Provides Analytics And Engagement Services For Chatbots And Bots; Computer Software For Providing For Interaction Of A User With A Conversational User Interface; Computer Software For Retrieving Information From A User And Delivering To The User Context Sensitive Information And User Specific Information; Computer Software For Providing Inf...

Device

[Class : 9] Computer Software For Computers, Mobile Phones, Computer Tablets, And Other Personal Electronic Devices, Namely, For Use In Accessing, Monitoring, Tracking, Searching, Saving, And Sharing Information In The Fields Of Health, Fitness, Food, Beverages, Wine, Spirits, Travel, Entertainment, Weather, News, Sports, Maps, Language Translation, And Finance; Search Engin...

Riskiq

[Class : 42] Computer Services, Namely, On Line Scanning, Detecting, Quarantining And Eliminating Of Viruses, Worms, Trojans, Spyware, Adware, Malware And Unauthorized Data And Programs On Computers And Electronic Devices; Software As A Service (Saas) Services Featuring Software For Use In Monitoring, Tracking, Analysis, And Display Of Relationships Between Data; Software As...

Omnisonic

[Class : 9] Audio Speakers For Laptop Computers; Audio Speakers For Tablet Computers; Audio Speakers For Portable Computers; Audio Speakers For Portable Devices; Audio Speakers For Headphone Speakers.

Ai For Earth

[Class : 35] Promoting Public Awareness And Interests Concerned With Health, Community And Environmental Data And Analytics; Providing Business Information In The Field Of Environmental Data And Analytics; Scientific Research In The Field Of Environmental Data And Analytics.[Class : 42] Information Technology Consultation, Development And Implementation Of Technology So...

Device

[Class : 41] Education Services, Namely, Conducting Seminars, Classes, Workshops, Online Courses, And Educational Conferences In The Fields Of Technology, Cloud Computing, Web Services, Software As A Service (Saa S), Platform As A Service (Paa S), Mobile Backend As A Service (M Baa S), Artificial Intelligence, Software Development, Game Development, Internet Of Things, ...

M12

[Class : 35] Promoting Trade Shows In The Fields Of Computers, Technology, Computer Programming, Computer Software, Computer Games, Artificial Intelligence, Machine Learning, Cloud Based Technology, Internet Technology, Big Data Analytics, Business Management, Business Development, Entrepreneurship And Venture Capital Financing; Arranging And Conducting Business Co...

Azure Sphere

[Class : 9] Microcontrollers; Computer Chipsets; Microcontrollers And Chipsets For The Secure Transmission Of Data; Communications Receivers; Data Exchange Units; Computer Hardware Modules For Use With The Internet Of Things (Io T); Wired And Wireless Internet Connected Computing Devices, Including Smart Watches, Electric Sensors, Electric Actuators, And Other Electronically...

Brainwave

[Class : 9] Computer Software; Computer Software For Artificial Intelligence (Ai) Processing; Computer Chips For Artificial Intelligence (Ai) Processing; Computers And Servers For Artificial Intelligence (Ai) Processing; Computer Operating System Software; Embedded Operating Software; Computer Software Development Tools, For Use In The Fields Of Artificial Intelligence, Deep...

Compulsion Games

[Class : 9] Computer Programs, Namely, Game Software For Use In Computers And Video Game Players.[Class : 41] Providing Entertainment Information In The Field Of Computer Games, Games And Home Entertainment Via A Website; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games.[Class : 42] Providing Technology That Enables Users To Upl...

Cortana

[Class : 9] Computer Software To Assist A User In Operating A Computerized Handheld Device; Computer Software For Initiating And Receiving Telephone Calls, And For Accessing, Storing, Retrieving, Managing, Processing And Using Information; Computer Software For Voice Recognition, Processing Voice Commands And Converting Between Speech And Text; Computer Software For Creating...

N

[Class : 9] Downloadable Computer Software For Use In Note Taking, Namely, Computer Software For Recording, Organizing, Editing And Transmitting Audio And Visual Information And Images In Electronic Form; Downloadable Computer Software For Viewing And Editing Meeting Agendas And To Do Lists; Downloadable Computer Software For Reminding Users Of Dates And Events; Downlo...

Device Of Letter "P"

[Class : 9] Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer Software For Publishing, Sharing And Accessing Computer Software Applications And Mobile Software Applications.[Class : 42] Software As A Service (Saa S) Featuring Computer Softwar...

Remix

[Class : 38] Communication Services, Namely The Transmission Of Three Dimensional (3 D) Drawings, Images And Digital Content Via The Internet; Electronic Bulletin Board Services; Electronic Message Services.[Class : 42] Online Non Downloadable Software For Three Dimensional (3 D) Modeling Of Spaces And Objects, Converting Two Dimensional (2 D) Content Into Three Dimensional ...

Empowering Us All

[Class : 35] Providing Information In The Fields Of Business And Commerce Over Global Computer Networks And Global Communications Networks; Business Services, Namely, Business Consultation And Marketing Services, Business Advice And Information Services; Providing Consumer Product Information Via Global Computer Networks; Promoting The Goods And Services Of Others Via ...

Inxile

[Class : 9] Downloadable Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing An On Line Computer Game.

Powerapps

[Class : 9] Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer Software For Publishing, Sharing And Accessing Computer Software Applications And Mobile Software Applications[Class : 42] Software As A Service (Saa S) Featuring Computer Software...

P

[Class : 9] Downloadable Desktop Publishing Software.

We Happy Few

[Class : 9] Downloadable Computer Game Software; Downloadable Computer Software For Use In The Field Of Electronic Gaming, Mousepads; Computer Game Software Downloadable Via A Global Computer Network And Wireless Devices; Prerecorded Digital Audio And Video Tapes And Discs, C Ds, And Dv Ds, All Featuring Music; Downloadable Music Files; Records, Namely, Sound Recording...

Ex

[Class : 9] Downloadable Computer Software For Information Management, Data And Text Processing, Networking, Electronic Mail And Other Electronic Communications In The Nature Of Private Network And Global Computer Network Communications, For Use In The Field Of Business Communications, General Email Communications, And General Use; Downloadable Computer Software For Use...

Minecraft Earth

[Class : 9] Computer Software; Downloadable And Installable Programs For Playing Video Games; Computer Programs For Playing Video Games And Social Networking; Computer Programs For Cellular Phones For Playing Video Games And Social Networking; Game Programs For Cellular Phones For Playing Video Games And Social Networking; Downloadable Image Files Featuring Images Of Charact...

Xcloud

[Class : 9] Video Game Software.[Class : 38] Video Game Streaming.[Class : 41] Entertainment Services, Namely, Providing Online Video Games.[Class : 42] Providing Online Non Downloadable Software And Software As A Service (Saas) Services For Transmitting And For Receiving Video Games.

Surface Neo

[Class : 9] Computer Hardware; Computers; Laptop Computers; Tablet Computers; Notebook Computers; Mobile Computers; Mobile Phones; Smartphones; Handheld Computers; Touch Screens; Computer Hardware Peripherals, Namely, Headphones, Computer Keyboards, Computer Mice, Computer Stylus, Headsets, Electronic Docking Stations.

Device

[Class : 9] Downloadable Computer Software And Computer Programs For Use In Database Management, Electronic Spreadsheets, Designing, Creating, Editing And Publishing Documents, Note Taking, Email, Calendaring, Scheduling, Contact Information Storage And Management, Accounting, Customer Relationship Management, Project Management, Presentation Graphics, Desktop Publishing, We...

Expressroute

[Class : 38] Providing Private And Secure Real Time Electronic Communication Over A Computer Network Using A Dedicated Connection.

Device

[Class : 9] Computer Software For Sales Management, Customer Service Management, Business Operations Management, Financial And Finance Operations Management, Remote And Field Service Operations Management, Project Service Automation Management, Marketing Campaign Planning And Management, Customer Relationship Management, Enterprise Resource Management, Sales And Market...

S

[Class : 9] Computer Software For Voice Over Internet Protocol (Voip); Computer Software For Enabling Messaging And Instant Messaging Via The Internet; Computer Software For Use In Simple Message Service (Sms) And Multimedia Message Service (Mms); Computer Software For Voice Calling, Voice Mailing, Call Forwarding, Video Calling, Video Conferencing, Simple Message Service (S...

Windows Homeloop

[Class : 9] Computer Software.[Class : 42] Providing Online Non Downloadable Software; Software As A Service (Saa S).

Azure Cosmos Db

[Class : 42] Software As A Service (Saa S) Services Featuring Software For Database Design And Development; Software As A Service (Saa S) Services Featuring Software For Use In Database Management.

Microsoft Unified Support

[Class : 35] Business Consultation Services In The Fields Of Information Technology, Software, Cloud Computing, And Enterprise Architecture; Database Management Services; Business Risk Assessment And Management Services.[Class : 37] Technical Support Services, Namely, Troubleshooting In The Nature Of The Repair Of Computer Hardware.[Class : 41] Educational And Training S...

Surface Go

[Class : 9] Computer Hardware; Computer Hardware Peripherals; Computer Hardware Accessories, Namely Computer Controllers, Headphones, Audio Speakers, Computer Mice, Computer Keyboards; Webcams, Digital Pens, Electrical Power Extension Cords, Battery Chargers, Electrical Cables And Cord Sets, Electronic Docking Stations, Computer Docking Stations, Computer Network Adapters Fo...

Playground Games

[Class : 9] Entertainment Software, Namely, Electronic Game Software; Interactive Entertainment Software, Namely, Electronic Game Software; Application Software, Namely, Electronic Game Software.[Class : 41] Entertainment Services, Namely, Providing Online Nondownloadable Electronic Games; Provision Of Entertainment Software, Namely, Online Non Downloadable Electronic Ga...

Windows Sonic

[Class : 9] Computer Software, Namely, Software For Manipulating Digital Audio And For Improving Sound; Computer Software Namely, Software For Use In Processing, Recording, Reproduction, Streaming, Transmission, And Reception Of Electronic Or Digital Signals; Computer Software Namely, Software For Operating, Measuring, Signaling And Checking Hearing Aids And Audiologic...

Microsoft Imagine

[Class : 41] Educational Services And Entertainment, Namely, Sponsoring Competitions And Providing Incentives To Students To Demonstrate Excellence Through Organization And Conducting Of Award Ceremonies, All In The Fields Of Computers, Computer Programming, Computer Coding, Web Design, Graphic Design, Animation, Video Game Design And Development And Application Software Dev...

Hololens

[Class : 41] Entertainment Services, Namely, Providing Interactive Entertainment Via Virtual Reality, Mixed Reality, And Augmented Reality Content, Namely, Audio, Video, Text, Binary, Still Images, Graphics, Multimedia Files And Computer Games; Organizing Exhibitions In The Field Of Interactive Entertainment, Virtual Reality, Mixed Reality, Augmented Reality, And Consum...

Forza Motorsport

[Class : 14] Lapel Pins.[Class : 16] Strategy Guide Books For Video Games; Notebooks; Journals; Posters.[Class : 25] Clothing, Namely, Jackets, Pants, Sweaters, Sweatshirts, Hoodies, Jerseys, Shirts, T Shirts, Long Sleeve T Shirts, Sleepwear, Pajamas, Socks, Headwear, Headbands, Wristbands, Rainwear, Scarves.[Class : 28] Toy Cars; Video Game Controllers.[Class : 38] Stre...

Fm

[Class : 14] Lapel Pins.[Class : 16] Strategy Guide Books For Video Games; Notebooks; Journals; Posters.[Class : 25] Clothing, Namely, Jackets, Pants, Sweaters, Sweatshirts, Hoodies, Jerseys, Shirts, T Shirts, Long Sleeve T Shirts, Sleepwear, Pajamas, Socks, Headwear, Headbands, Wristbands, Rainwear, Scarves.[Class : 28] Toy Cars; Video Game Controllers.[Class : 38] Stre...

Microsoft Teams

[Class : 9] Computers; Computer Hardware; Transceivers For Television And Global Communication Network Transmissions That Transmit Them To A Television Or Other Display Device, And Computer Operating Programs For Use Therewith; Telephones; Entertainment System Comprising A Computer, Multiple Image Display Screen And Multiple Input Devices; Hand Held Computers; Audiovis...

Remix 3d

[Class : 38] Communication Services, Namely The Transmission Of Three Dimensional (3 D) Drawings, Images And Digital Content Via The Internet; Electronic Bulletin Board Services; Electronic Message Services.[Class : 42] Provision Of Online Non Downloadable Software For Three Dimensional (3 D) Modeling Of Spaces And Objects, Converting Two Dimensional (2 D) Content Into Three...

Device

[Class : 9] Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer Software For Publishing, Sharing And Accessing Computer Software Applications And Mobile Software Applications.[Class : 42] Software As A Service (Saa S) Featuring Computer Softwar...

Appnexus

[Class : 42] Platform As A Service (Paas) Featuring Computer Software Platforms For Buyers And Sellers Of Online Advertising To Build, Manage, And Optimize Their Entire Online Advertising Businesses.

Device Of Shopping Bag

[Class : 35] Providing Commercial Information In The Fields Of Business, Commerce, And Consumer Products; Retail And Online Retail Store Services Featuring Computer Hardware And Software, Video Games And Accessories, Computers And Computer Peripherals, Mobile And Telecommunication Devices And Accessories, A/V Equipment And Accessories, Personal Digital Assistants, Webc...

Altvr

[Class : 9] Software To Provide Access To 3 D Virtual Reality Environments, Including Avatars And User Interfaces For 3 D Virtual Reality; Software That Allows Participants To View And Interact With Web Content In A 3 D Virtual Reality Environment And To Interact With Others In A Virtual Reality Environment For Business, Leisure, Entertainment, Or Training Purposes; Software...

Microsoft Airband

[Class : 35] Business Consultation Services; Business Development, Marketing And Management Consultancy Services; Business Management Consulting With Relation To Strategy, Financing, Marketing, Production, And Personnel For Companies Involved In The Development Of Technologies For Rural And Underdeveloped Communities; Promoting Public Interest And Awareness Of Technological ...

Holoportation

[Class : 9] Computer Software For Data Processing; Technological Devices For Data Processing In The Nature Of Calculating Machines, Data Processing Equipment And Computers; Technological Devices In The Nature Of Multifunction Electronic Devices And Apparatus For Capturing, Transmitting, Reproducing, And Displaying Three Dimensional Objects, Images And Video; Technologi...

Microsoft Techspark

[Class : 35] Promoting Public Interest And Awareness Of White Space Telecommunications And Internet Connectivity; Charitable Services, Namely, Organizing, Developing, And Conducting Marketing And Business Programs And Projects Aimed At Increasing Technological Development In Rural Communities; Providing Information In The Fields Of Business Analysis And Strategic Plann...

Microsoft 365

[Class : 9] Computer Software And Computer Programs For Database Management, Data Storage And Backup, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Transmission Of Voice, Dat...

Ninja Theory

[Class : 6] Identification Tags Of Metal; Key Tags Of Common Metal; Metal Rings; Metal Cases; Metal Badges.[Class : 9] Interactive Entertainment Software; Computer Software; Computer Application Software; Computer Games Software; Computer Gaming Software; Video Games Programs; Action Computer Games [Software]; Action Console Games Software; Action Games Software; Applica...

W

[Class : 9] Downloadable And Recorded Computer Word Processing Software; Downloadable And Recorded Computer Programs For Creating, Editing, Sharing, Storing, And Printing Documents Comprised Of Text And Graphics And Downloadable And Recorded Computer Utility Programs For Use Therewith.[Class : 42] Cloud Computing Featuring Word Processing Software; Providing Temporary Us...

P

[Class : 42] Cloud Computing Featuring Software For Use In Presentation Graphics And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Presentation Graphics; Providing Technical Information In The Field Of Computer Software And Cloud Computing.[Class : 9] Recorded And Downloadable Computer ...

Halo

[Class : 9] Computer Game Software; Headsets For Use With Computers; Mousepads; Computer Game Software Downloadable Via A Global Computer Network And Wireless Devices; Computer Game Software For Use On Mobile And Cellular Phones; Prerecorded Media, Namely, Digital Audio And Video Tapes And Discs, C Ds, Dv Ds, And Optical Discs All Featuring Movies In The Field Of Actio...

Flip

[Class : 9] Educational Computer Software Downloaded From The Internet; Computer Apparatus For Educational Use; Educational Materials In The Form Of Computer Programmes For Teaching Languages; Computer Programs Relating To The Training Of Personnel; Training Guides In Electronic Format; Training Guides In The Form Of A Computer Program; Educational Computer Software Includin...

Obsidian Entertainment

[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing An On Line Computer Game.[Class : 42] Computer Software Design; Designing Of Entertainment Software; Developing Of Entertainment So...

Azure Sentinel

[Class : 9] Downloadable Computer Software For Security Information And Event Management (Siem) Employing Artificial Intelligence And Machine Learning To Enable Automated Responses In Real Time To Security Vulnerabilities, Threats And Events; Downloadable Computer Software For Collection, Storage, Analysis And Presentation Of Data For Forensic Analysis Of Security Event...

Power Automate

[Class : 9] Downloadable Computer Software For Automating Business Processes And Analysis Including Creating And Managing Workflows Across Multiple Applications To Synchronise Files, Get Notifications, Collect Data; Downloadable Computer Software For Building Ai Models To Add Intelligence To Business Workflows; Downloadable Computer Software For Viewing, Exploring, Ena...

World's Edge

[Class : 41] Providing Entertainment Information In The Field Of Computer Games, Games And Home Entertainment Via A Website; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely,: Providing On Line Computer Games; Online Entertainment In The Nature Of Computer Game Tournaments; Conducting Contests Online...

Device

[Class : 9] Downloadable Computer Software For Parental Control Of Computer And Internet Usage; Downloadable Computer Software For Managing, Filtering, And Monitoring Access To Mobile Devices, Console And Portable Gaming Devices, Applications, Games Software And Internet Usage; Downloadable Computer Software For Remotely Managing Device And Application Settings; Downlo...

Xbox

[Class : 9] Recorded Video Game Programs; Downloadable Video Game Software.[Class : 28] Controllers For Game Consoles; Game Controllers In The Nature Of Keyboards For Computer Games; Video Game Interactive Remote Control Units; Video Game Consoles; Video Game Consoles For Use With An External Display Screen Or Monitor.[Class : 38] Streaming Of Data; Streaming Of Video Materi...

P

[Class : 9] Downloadable Computer Software For Project Management And Resource Management.[Class : 42] Providing Online Non Downloadable Computer Software For Project Management And Resource Management.

Project Spark

[Class : 9] Game Software.[Class : 41] Entertainment Services, Namely, Providing An On Line Computer Game.

S (With Device Of Geometric...

[Class : 9] Computer Software For Use In Creating, Accessing, Editing, And Sharing Documents, Presentations And Webpages; Computer Software For Use In Locating And Arranging Audio, Video, Graphic, Image, Textual And Multimedia Content, And Configuring Such Content Into A Document, Presentation Or Webpage.[Class : 42] Providing Online, Non Downloadable Software And Software A...

Scalebound

[Class : 9] Game Software.[Class : 41] Entertainment Services, Namely, Providing An On Line Computer Game.

Device Of Clouds

[Class : 9] Computer Software For Data Storage And Backup, Database Management, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Transmission Of Voice, Data, Images, Audio, Vide...

Surface Duo

[Class : 9] Computer Hardware; Computers; Laptop Computers; Tablet Computers; Notebook Computers; Mobile Computers; Handheld Computers; Computer Hardware Peripherals, Namely, Headphones, Computer Stylus, Headsets For Use With Computers.

Fluent Design

[Class : 41] Providing Non Downloadable Instructional Materials And Guidelines In The Field Of Computer Software Application And User Interface Via A Website; Education Services, Namely, Providing Online Tutorials And Instruction In The Field Of Computer Software, Mobile Applications, And User Interface; Development Of Instructional And Educational Materials And Guid...

8080

[Class : 9] Downloadable Electronic Publications, Namely, Books, Textbooks, Instructional Material, Instructional Manuals, Magazines, Newsletters, Newspapers, Journals, Periodicals, Textbooks, Activity Books, Workbooks, Reference Books, Audio Books, Electronic Audio Files, Video Recordings And Electronic Image Files Featuring A Variety Of Topics; Audiobooks Featuring A Varie...

8080 Books (Device)

[Class : 9] Downloadable Electronic Publications, Namely, Books, Textbooks, Instructional Material, Instructional Manuals, Magazines, Newsletters, Newspapers, Journals, Periodicals, Textbooks, Activity Books, Workbooks, Reference Books, Audio Books, Electronic Audio Files, Video Recordings And Electronic Image Files Featuring A Variety Of Topics; Audiobooks Featuring A Varie...

Halo Studios Logo

[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications[Class : 41] Entertai...

Halo Studios

[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...

Fable

[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...

Aoe

[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...

Device Of Butterfly

[Class : 9] Software; Artificial Intelligence, Machine Learning, And Deep Learning Software; Mobile Applications; Downloadable Electronic Publications; Downloadable Software For Accessing, Viewing, And Interacting With News And Information Content; Mobile Applications For Aggregating And Organizing News And Information; Downloadable Electronic Publications In The Nature Of A...

Color Device Of Butterfly

[Class : 9] Software; Artificial Intelligence, Machine Learning, And Deep Learning Software; Mobile Applications; Downloadable Electronic Publications; Downloadable Software For Accessing, Viewing, And Interacting With News And Information Content; Mobile Applications For Aggregating And Organizing News And Information; Downloadable Electronic Publications In The Nature Of A...

Msn

[Class : 9] Software; Artificial Intelligence, Machine Learning, And Deep Learning Software; Mobile Applications; Downloadable Electronic Publications; Downloadable Software For Accessing, Viewing, And Interacting With News And Information Content; Mobile Applications For Aggregating And Organizing News And Information; Downloadable Electronic Publications In The Nature Of A...

You, Empowered

[Class : 9] Software; Applications; Mobile Applications; Artificial Intelligence, Machine Learning, And Deep Learning Software; Generative Artificial Intelligence; Generative Artificial Intelligence Software; Generative Artificial Intelligence Applications; Software Featuring Generative Artificial Intelligence; Applications Featuring Generative Artificial Intelligence; Softw...

Ms

[Class : 38] Providing Access To Blockchain Networks; Telecommunication Services; Telecommunication Network Services; Providing Electronic Message Alerts Via Telecommunication Networks; Electronic And Telecommunication Transmission Services; Video, Audio And Television Streaming Services; Online Communications Services; Providing Access To Online Computer Databases; Instant ...

Msft

[Class : 9] Downloadable Software Applications; Computer Software Platforms; Artificial Intelligence Software; Data Processing Software; Utility, Security And Cryptography Software; Database Management Software; Virtual And Augmented Reality Software; Software Development Tools; Computer Software For Controlling And Managing Access Server Applications; Computer Application S...

Keeper

[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...

M365

[Class : 9] Computer Software; Computer Software And Computer Programs For Database Management, Data Storage And Backup, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Transmi...

M365 Copilot Icon

[Class : 9] Downloadable Software Using Artificial Intelligence (Ai) Processing, Machine Learning, And Deep Learning For Providing A Virtual Assistant Using Generative Artificial Intelligence (Ai) For Locating, Analyzing, Summarizing, Editing, And Providing Data And Information; Recorded Computer Software Using Artificial Intelligence (Ai) Processing, Machine Learning, And D...

Pyautogen

[Class : 9] Downloadable Computer Software For Artificial Intelligence Processing; Downloadable Computer Software For Collecting, Analyzing And Organizing Data In The Field Of Deep Learning; Downloadable Intelligent Computer Software For Natural Language Processing; Downloadable Computer Programs Using Artificial Intelligence (Ai) For Machine Learning; Downloadable Computer ...

Autogen

[Class : 9] Downloadable Computer Software For Artificial Intelligence Processing; Downloadable Computer Software For Collecting, Analyzing And Organizing Data In The Field Of Deep Learning; Downloadable Intelligent Computer Software For Natural Language Processing; Downloadable Computer Programs Using Artificial Intelligence (Ai) For Machine Learning; Downloadable Computer ...

Magentic

[Class : 9] Downloadable Computer Software For Use In Artificial Intelligence Applications, Namely, Generalist Multi Agent Systems; Downloadable Computer Software For Use In Artificial Intelligence Applications, Namely Developing, Configuring, Deploying And Managing Multi Agent Workflows Across Various Domains; Downloadable Computer Software For Orchestrating And Managing Au...