A system for automatically implementing high-level instructions in a distributed application program, where the high-level instructions reflect the behavior of the distributed application program, includes at least a tools component. The tools component is used to write high-level instructions in the form of declara...
A system provides high availability electronic message forwarding. When an electronic message is communicated to a first server, a copy of the electronic message is maintained at a second server. The electronic message is maintained on both servers until the electronic message is successfully communicated to a third...
Embodiments are provided to automatically managing system downtime in a computer network. In one embodiment, an event is created in an application server to schedule a system downtime period for a web server. When the scheduled downtime occurs, the web server is automatically removed from the network and a downtime ...
Various aspects are disclosed herein for an architecture for online communal and connected experiences. This architecture can be embodied in an application running a host computing device, where the application provides functionalities such as finding modules on local devices or hosted on online services, launching ...
Computer-readable media and computerized methods for utilizing an awareness of video content within a media file to incorporate an advertisement therein are provided. Building the video-content awareness involves performing an offline authoring process to generate a trajectory. In particular, the offline authoring p...
Distributing and tracking electronic coupons based on proximity. Upon detecting recipients proximate to a computing device, one or more electronic coupons are selected and transmitted to the detected recipients. The transmittal occurs via a wireless connection in some embodiments. Coupon properties associated with t...
ABSTRACT VISUAL SEARCH AND THREE-DIMENSIONAL RESULTS
Methods, systems, graphical user interfaces, and computer-readable media for visually searching and exploring a set of objects are provided. A computer system executes a method that generates three-dimensional representations or two-dimensional representations fo...
Protocol architecture for wiring media streams and specifying mixing behavior in a multipoint control unit. The protocol provides the capability to expose the core mixing algorithms to modification for mixing media without dealing with the functionality of the mixer itself (e.g., ports and IP specifics). The protoco...
Isolation of extension code by processes in an application is described. In an implementation, execution of one or more processes is managed that contain content received via a network by another process of a single application that includes the one or more processes. The management includes terminating the one or m...
Systems and methods of media optimization are disclosed herein. An operation command can be sent to a media device from a host device. The operation command can be indicative of an intent to perform an operation on the recording medium. A list of media device characteristics corresponding to media device resources c...
ABSTRACT INTERRUPTIBLE NAND FLASH MEMORY
A NAND flash memory logical unit. The NAND flash memory logical unit includes a control circuit that responds to commands and permits program and/or erase commands to be interruptible by read commands. The control circuit includes a set of internal registers for performing t...
ABSTRACT DYNAMIC IMAGE PRESENTATION
One or more techniques and/or systems are disclosed for efficiently organizing images in a display. A size of an image is scaled by an image scale factor, while an aspect ratio for the image is maintained, where the image scale factor comprises a combination of a first scale dist...
Scalable hosting of user solutions is provided. A system for hosting application software includes a local server, one or more remote servers, a configuration database and a content database. The local server includes a web front end module that processes a request from a client computer over the Internet to host ap...
Embodiments described herein are directed to generating a customized data viewer, where the viewer is configured to display data at any level in a data model. In one embodiment, a computer system receives a user request indicating that portions of data are to be displayed in a user-customized manner using a data vie...
Innovations for signaling state of a decoded picture buffer ("DPB") and reference picture lists ("RPLs"). In example implementations rather than rely on internal state of a decoder to manage and update DPB and RPLs state information about the DPB and RPLs is explicitly signaled. This permits a decoder to determine w...
Architecture for cell-based security on a per-user basis. A security model for this capability includes not only dimension level tables, but is extended to include cell level tables. The security model can include existing dimension tables, plus cell security tables that include a cell permissions table, a cell qual...
Systems, methods, and computer-readable media for optimizing emulated fixed-function and programmable graphics operations are provided. Data comprising fixed function and programmable states for an image or scenario to be rendered is received. The data for the image is translated into operations. One or more optimiz...
A source device and a target device may endeavor to form a secure communication session whereby encrypted messages may be transmitted over an untrusted network, such as the internet. However, the exchange of many messages in the establishment of the communication session may involve considerable latency and computat...
A user data entry is received at a mobile communications device. After receiving the user data entry, user selections of a first application and a second application are received. In response to the user selections, the user data entry is routed to both the first application and the second application. Additionally,...
Feeds from cameras are better visualized by superimposing images based on the feeds onto map based on a two- or three-dimensional virtual map. For example, a traffic camera feed can be aligned with a roadway included in the map. Multiple videos can be aligned with roadways in the map and can also be aligned in time....
Embodiments described herein are directed to dynamically reconfiguring at least a portion of an operating software application. In one embodiment, a computer system receives an edit indicating that at least one portion of an operating software application is to be edited, where the edit includes changes that are to ...
Tools and techniques for providing multi-client collaboration to access and update structured data elements are disclosed. Client systems may present user interfaces that provide libraries of published data elements that are available for collaboration. The clients may request selected data elements, while referenci...
A project management resources scheduling user interface is provided in which resource information may be displayed in a condensed timeline for each resource over the duration of a project. Individual tasks or groups of tasks displayed in the project management resources scheduling view may be moved from one resourc...
A collection of multiple user credentials each associated with one of multiple different users is obtained at a device, and one or more of the multiple user credentials are verified. The collection of multiple user credentials is also compared to a threshold combination of user credentials to be satisfied to access ...
An approach is described for controlling access to a data item using one or more access graphs. The approach entails distributing a compact package of access-related information to a recipient that pertains to the access graphs. The recipient can use the access-related information to access the data item through the...
A method and a processing device are provided. A group of documents may be selected from multiple documents of a search result. Associations among the selected group of documents may be determined and indicated. An indication of ones of the associations that are of interest and/or others of the associations that are...
Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising un requested content (e.g., advertisement data) may be transmitted in response to request from a client device, while in other exemplary techn...
Techniques to modify a document using a latent transfer surface are described. An apparatus may comprise a document editing subsystem comprising a transfer surface creation module operative to embed a latent transfer surface in the document. A transfer control module may be communicatively coupled to the transfer su...
SOCIAL NETWORK POWERED QUERY REFINEMENT AND RECOMMENDATIONS
Embodiments of the present invention enhance the search experience of a user by looking at the search history of one or more buddies to provide search enhancements to the user. Examples of search enhancements include an annotation or graphic adjacent to a ...
A webpage contains a canvas. The canvas contains a drawing that is editable within the webpage by a user of a client device and by other users who use other client devices to open webpages that include the canvas. While the webpage is open on the client device the drawing is dynamically updated to reflect edits made...
Techniques are disclosed to improve quality of images that may be blurred or underexposed. In one described implementation, a method includes providing two images of a same scene. The method determines a spatial coherence and color statistics of the two images. The determined color statistics and spatial coherence a...
The present invention is directed a logical consistency checker (LCC) working alone or in conjunction with a physical consistency checker (PCC) and/or a data reliability system (DRS) for a database files system of a hardware/software interface system. Logical data correction pertains to logical data corruptions for ...
Email tags are described. In embodiments email messages are received for distribution to client devices that correspond to respective recipients of the email messages. Email routing decisions are applied to route an email message to an email folder for a recipient of the email message where the email folder may incl...
A rules runtime engine for scheduling and concurrently processing of rules. The engine efficiently runs a large number of rules in a parallel fashion. This is accomplished by authoring rules in a rule definition language, passing these rules through the translator for communication to the runtime engine and, schedul...
Systems and methods for password protection are described. In one aspect, an asymmetric key pair is deterministically formed by combining a password and other data. The public key of the asymmetric key pair is exported to an external device. The private key of the asymmetric key pair is used to effect subsequent aut...
Command driven web site browsing with web page command interpretation. As a part of web page command interpretation a web page (105) is displayed having a field (106) for accepting user input text. It is determined whether the user input text is a command. A specific application (140) is selected from a plurality of...
Techniques are provided for managing cache metadata that maps addresses on a storage medium (e.g., disk) to corresponding addresses on a cache device. Cache metadata may be stored in a hierarchical data structure. Only a subset of the levels of the hierarchy may be loaded to memory, thus reducing the cache metadata"...
Example embodiments provide for keeping an HTTP reply flow for a communication open such that portions of an overall response corresponding to a single request may be sent across the HTTP reply flow. As the various portions of the overall response become available at a corresponding service endpoint, the service app...
A software program for creating features for use with a plurality of media objects in a sequence. The program comprises a feature component specifying a feature having parameters affecting at least one variable aspect of the feature. An indicator component identifies a position of the specified feature relative to t...
In accordance with this invention, a system, method, and computer-readable medium that aggregates the knowledge base of a plurality of antivirus software applications are provided. User mode applications, such as antivirus software applications, gain access to file system operations through a common information mode...
Multiple devices are identified in a network along with connection information associated with the multiple devices. The connection information associated with the multiple devices is converted into hierarchical structure and communication links between the multiple devices are identified.
A method and apparatus determine a channel response for an alternative sensor using an alternative sensor signal and an air conduction microphone signal. The channel response is then used to estimate a clean speech value using at least a portion of the alternative sensor signal.
Disclosed is a mechanism for securely provisioning a client by authenticating that client during a dynamic configuration process. Rather than relying on post-configuration authentication schemes, the present invention combines security and dynamic configuration into a unified scheme. Any client device attempting to ...
A licensor receives a request from a requestor including an identifier identifying the requestor and rights data associated with digital content, where the rights data lists at least one identifier and rights associated therewith. The licensor thereafter locates the identifier of the requestor in a directory, and lo...
Alerts are transmitted to subscribers to an alerts service in response to events that occur within a gaming environment. Communication within the gaming environment is limited to specific game consoles and the gaming service. A subscriber to the alert notification service can be alerted when a friend joins the gamin...
Described are embodiments which allow token based file operations. The client may request a s0pecial offload file operation that is formatted according to a file access protocol. The file operation may be an offload read operation or an offload write operation. In an offload read operation the client requests that d...
Software is licensed for use on a particular computing device, such as a gaming console or a multimedia console. An unlocking code is provided from a distribution service to the computing device (either directly or via a user), which in turn, unlocks the appropriate software or portion of software for use with the a...
In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one embodiment, one portion of the non-volatile memory is used as a write buffer and a read cache for writes and reads to the long-term storage media. Interfaces are p...
The present invention provides for facilitating synchronization in a data source/data destination environment using data replicas. When a plurality of destinations request synchronization with a source, a first destination selected for synchronization is processed such that differences between the first destination ...
A system and method for processing images utilizing varied feature class weights is provided. A Computer system associates two or more images with a set of feature class data, such as color and texture data. The computer system assigns a set of processing weights for each of the feature classes. The two or more imag...
In one embodiment, a computer system generates a view of entities associated with varying data types for presentation on a generic viewer. The entities and data types have relationships as defined in a corresponding schema. The schema is stored as data in a repository with the data types. The computer system receive...
ABSTRACT
MEMORY TRAINING VIA VISUAL JOURNAL
A system that can enhance cognitive ability by viewing sequences of images captured during an event is disclosed. For example, the innovation can employ captured event sequences to improve failing memories in patients with a diagnosed memory condition such as acquired br...
*
Various embodiments develop (and consume), along with rendered print job data, metadata that describes certain characteristics of the print job data. This
i
metadata can be provided, along with the rendered data, from a client device to a print server and can allow the print server to ascertain the ...
A facility for evaluating a spreadsheet cell is described. The facility reads a function call stored in a spreadsheet cell. The function call specifies an arbitrary geometric path and an operation to be performed on the specified path. The facility performs the specified operation on the specified path, and attribut...
A system and method relating to creation of object(s) in an object hierarchy structure is provided. An object generator that in response to a command to expand a node/object provides a initiator node that facilitates generation of a new object within the object hierarchy upon expansion of the node. A display compone...
A mechanism for placing a telephone call (241) while at the same time communicating context (244) (e.g., subject, importance and/or nature) of the telephone call. The caller uses a mechanism on a user interface (400) to instruct a caller computing system (210) to place a telephone call to a callee computing system. ...
An invention is described for securely deploying a provable identity for virtual machines (VMs) in a dynamic environment. In an embodiment a fabric controller instructs a VM host to create a VM and sends that VM a secret. The fabric controller sends that same secret (or a second secret such as the private key of a p...
The present invention enforces digital rights within the confines of a content license by validating an entity certificate. Cryptographic information within a entity certificate is utilized to unlock protected content and authenticate the entity certificate. The entity certificate includes personal credentials, whic...
A method, computer readable medium and system are provided which generate a model driven form user interface to represent an application model. The method includes selecting which of multiple different logical form types to use to generate the form user interface to represent the application model. The method also i...
An instant messaging system provides instant message communication between computers, including multi-user computers. The system provides multiple concurrent instant message user logins on a multi-user computer, one of the multiple concurrent instant message user logins being a registered buddy of a user of a secon...
Adware and viruses are examples of objects that may be embedded in a webpage or linked to a webpage. When such an object is detected to be associated with a webpage loading on a browser, an analysis may be performed to determine a trust level for the object. The object may be blocked in accordance with the trust lev...
A location service and method provides a location aware computing device that is extensible by allowing different types of location providers operate with the service. The method includes receiving a request for a location context, acquiring data associated with a current location from one or more location detection...
A computing system in which devices communicate wirelessly as secondary users in a band assigned to primary users. The computers communicate using new signals developed to reduce disruption to primary users of the band. The new signals may be produced by sensing, or otherwise determining, signals used by primary use...
A resource of a first organization provides access thereto to a requestor of a second organization. A first administrator of the first organization issues a first credential to a second administrator of the second organization, including policy that the second administrator may issue a second credential to the reque...
ABSTRACT CONTROLLING THE DELEGATION OF RIGHTS
The delegation of rights may be controlled in a number of manners. In an example implementation, a delegation authority assertion is formulated with a delegator principal, a delegatee principal, a verb phrase, a resource, and a delegation-directive verb. In another exam...
The present invention extends to methods, systems, and program products for translating declarative models. Embodiments of the present invention facilitate processing declarative models to perform various operations on such as, for example, application deployment, updates, application control such as start and stop...
The present invention leverages iterative transformations of search query strings along with statistics extracted from search query logs and/or web data to provide possible alternative spellings for the search query strings. This provides a spell checking means that can be influenced to provide individualized sugges...
A mobile device includes an air conduction microphone and an alternative sensor that provides an alternative sensor signal indicative of speech. A communication interface permits the mobile device to communicate directly with other mobile devices.
A method of operating an access point (AP) configured to support multiple pre-shared keys. Each client device associated with the AP is provisioned with a key. To authenticate the client device, the AP determines which pre-shared key (PSK) of the multiple supported pre-shared keys, if any, matches information includ...
A system for capturing time and expense information over a net and for processing the information into a project accounting system has a projecting accounting system adapted to store time and expense data associated with a project. A user interface provides a from accessible over a network by a user via a browser. T...
One or more techniques and/or systems are provided for assigning power management classifications to a process transitioning a computing environment into a connected standby state based upon power management classifications assigned to processes and transitioning the computing environment from the connected standby ...
A system facilitates the search engine to search for pieces of information in various databases and application documents without the need to know the specific protocols to communicate with the various databases and application documents, such as Microsoft Excel documents. Despite the multitude of possible prot...
Described herein is an implementation that reduces the battery consumption of an energy-constrained computing device that is capable of communicating over a wireless network. As conditions and circumstances warrant, the implementation selects one of multiple radios (e.g., two)-with each having a unique combination ...
Service provisioning tasks can be performed to provision or deprovision services for users reconcile overlapping services and apply effective service properties. A service can be provisioned by receiving a request to provision the service for a user reconciling new service properties with current service properties ...
A mobile telephone automatically establishes communication with a system via a short-range wireless network. When communication is established, the mobile telephone user is automatically logged in to the system. The system can then apply personalized settings and/or provide access to personalized services based...
Architecture that identifies and learns repeated user behavior (habits) related to routes of travel and points of interest. Once learned the habits of an individual can be used to make an algorithm more efficient and hence the user experience of an application more effective and enjoyable. The capability to more acc...
The present invention provides for an interface between two seemingly incompatible and different content protection systems. Accordingly, protected content may be transferred between the respective security kernels of a conditional access (CA) and digital rights management (DRM) system, while maintaining security of...
A system and methods of language
identification of natural language text are
presented. The system includes stored expected
character counts and variances for a list of
characters found in a natural language. Expected
character counts and variances are stored f...
A system that facilitates performance of a focused search over a collection of sites comprises a subweb that corresponds to a topic and/or user charateristic(s)that are of interest to the user. The subweb includes a plurality of domains and/or paths (e.g.sites) that are related to the topic and/or the user character...
Semantic rich objects for a dynamic user experience. One or more actions in the process are represented by semantic rich objects (SROs) for exposing functionality of the process. Each of the SROs includes metadata associated with an action and an execution environment therefor. In response to an interactive gesture ...
An image such as a depth image of a scene may be received, observed, or captured by a device and a model of a user in the image may be generated. The model may then be adjusted to mimic one or more movements by the user. For example, the model may be a skeletal model having joints and bones that may be adjusted into...
A collation creation process is provided to automatically establish collation support for sorted linguistic data. The sorted linguistic data is examined to determine if it matches an existing collation support. If not. a new collation support is created for the sorted linguistic data. The provider of the sorted ling...
In at least some embodiments a web browser user interface is designed to enable site branding and functionality. Specifically websites can provide content that can be utilized in a control layout area near the top of the web browser user interface to reinforce branding through the use of color and/or a site provided...
Abstracting access control policy from access check mechanisms allows for richer expression of policy, using a declarative model with semantics, than what is permitted by the access check mechanisms. Further, abstracting access control policy allows for uniform expression of policy across multiple access check mech...
An edge-based gateway (102) is employed to provide communication data routing and filtering via a plurality of communication mechanisms (108 and 110), selected independently of central authority. The communication mechanisms (108 and 110) include POTS, cellular networks and Internet. Each user (112) can constrain th...
A change tracking technique is used maintain the consistency of the source data with the destination data during transactional replication. A first functional characteristic is that it is a transactional database replication technique. A second characteristic is that the technique supports an incremental tracking of...
A method and system of transferring boot files from a server to a client having a pre-installation environment. The server authenticates the client. The client authenticates the server. The boot files are transferred from the authenticated server to the authenticated client the boot files may be authenticated by the...
Many different users may access, revise and update the same shared object simultaneously through several different transports. Clients may communicate asynchronously by accessing the shared object through a physical server. Clients may also communicate synchronously by accessing the shared object through a peer-to-p...
Described is a mechanism for allowing new functionality for an object to be expressed as a property that is not built into the class from which the object derives. More specifically, the mechanism associates properties in one class with another class. A computer-readable medium, that includes an object having a prop...
Methods and systems are provided for presenting a plurality of shared calendars in a single electronic display frame or window where each of the plurality of shared calendars is displayed in a common view mode relative to other displayed shared calendars. Users may select one or more shared calendars to be displayed...
The subject invention provides a unique system and method that facilitates management and navigation of various data objects by making use of a unique time-line based navigation tool. In particular, objects can organized into a plurality of bands based on their respective subject matter. Each band can be created to ...
An apparatus for communicating with a handheld device (e.g., a cellular telephone) is provided herein. A protective shroud is configured to enclose the handheld device and protect it against incidents that commonly cause damage to handheld devices. Integral to the protective shroud is at least one of an input compon...
An increasing amount of the world s content resides on the web in a form targeted to web browser rendering. It may be advantageous to utilize this web content within non web based rich client applications because such rich client applications may provide robust features and/or interactions that web based platforms l...
Techniques and tools for selectively using multiple entropy models in adaptive coding and decoding are described herein. For example, for multiple symbols, an audio encoder selects an entropy model from a first model set that includes multiple entropy models. Each of the multiple entropy models includes a model s...
The present invention provides a means for dynamically adding virtual devices to a virtual computing environment. The system described in the invention includes a virtualized computing system with a manifest, which further includes device lists and an external device directory, which provides users of the virtualize...
A method in a consumer system for determining whether an application is misbehaving, the method comprising:
when installing an application , estabishing a limit on services of a service of a services of a service provider that the application is authorized to use; adn under control a runtime environment,
providin...
Membership information for participating computer systems participating in a multi-party conferencing session is distributed by intermittently exchanging link databases with one or more neighbor computer systems. A link database includes one or more link state records, each link state record identifying a participat...
A system and methods for service discovery and publication are disclosed. Application programs write requests for service discovery, publication, and subscription to a service discovery application programming interface. The service discovery application programming interface invokes one or more lower-level protocol...
Configuration of user interfaces is described. In an implementation, a method includes receiving a query from a device. The query is for a user interface (UI) from a client. A processing of the request determines whether the execution by the client of the control function is permitted. The processing is performed at...
A method for creating an archive protection plan for archiving a backup of data is provided. An indication of an archive data protection kind and an archive data protection duration are received. In response to receiving the archive data protection kind and the archive data protection duration, an archive scheme is ...
Described is labeling a video session with metadata representing a recognized person or object, such as to identify a person corresponding to a recognized face when that face is being shown during the video session. The identification may be made by overlaying text on the video session, e.g., the person"s name and/o...
The driving of an audio device that supports two or more audio modes is accomplished by associating a first physical device object of an audio device with a first device identifier, the first physical device object representing a first audio mode enumerated by a bus enumerator; associating a second physical device o...
ABSTRACT WEB-BASED COLLOCATION ERROR PROOFING
Collocation errors can be automatically proofed using local and network-based corpora, including the Web. For example, according to one illustrative method, one or more collocations from a text sample are compared with a corpus such as the content of the Web. The colloc...
An exemplary global listings format (GLF) is metadata for electronically transferring multimedia programming content and electronic program guide information.The GLF metadata specifies a self-referential data structure having a self-consistency mechanism comprising interlocking and crosslocking data elements.The sel...
Instant messaging with search is described. One or more techniques oflKe described techniques may be employed to provide a search during an instant messaging session, the results of which may then be shared between participants in the instant messaging session.
Maintaining DNS records. A computing network system includes a local Domain Name Service (DNS) server connected to one or more local clients or resources at a local branch office in an enterprise network. The local DNS server advertises to the local clients or resources at the local branch office that the DNS server...
A method and system for rendering a desktop on a computer using a composited desktop model operating system are disclosed. A composited desktop window manager, upon receiving content information from application programs, draws the window to a buffer memory for future reference, and takes advantage of advanced graph...
Modular content framework and document format methods and systems are described. The described framework and format define a set of building blocks for composing, packaging, distributing, and rendering document-centered content. These building blocks define a platform-independent framework for document formats that ...
A method and computer-readable medium convert the text of a word and a user's pronunciation of the word into a phonetic description to be added to a speech recognition lexicon. Initially, a plurality of at least two possible phonetic descriptions are generated. One phonetic description is formed by decoding a speech...
ABSTRACT
CONSULTATIVE CALL TRANSFER USING NON-VOICE CONSULTATION
MODES
Consultation architecture that allows a call assistant to use modes of consultation with the call recipient other than voice calls or vocal contact. The receptionist can place the incoming call (or message) on hold and send an instant message ...
The present invention provides for a digital rights management system with a centralized domain service capable of creating and managing membership criteria for joining a domain in accordance with business rules defined by ac content owner. A domain identification is created that allows a content provider to uniquel...
Strategies are described for propagating and responding to announcements within an environment having pre-established social groups, such as pre-established instant messenger social groups. More specifically, a member within a group can create an announcement, whereupon the announcement becomes associated with the m...
A system for providing system level notifications in a multimedia console has a notification system application native to the multimedia console which subscribes to all notification events generated by the application manager of the multimedia console. Through an application programming interface (API), a game devel...
The subject invention provides for an intelligent system and method that facilitates a more robust classification system in connection with spam prevention. The invention involves holding back some messages that appear to be questionable, suspicious, or untrustworthy from classification (as spam or good). In particu...
A printer connection administration/maintenance framework is disclosed. The framework is incorporated into a networked client machine. The framework maintains printer connections, in a network comprising printers, a directory comprising an enumeration of network entities and configuration definitions assignable t...
A computer system that facilitates presentation of-ata to a user. A search engine component receives and executes queries on behalf of a user. Results of the query are received and analyzed by an analysis component that filters and organizes the results as a function of relevancy of the data to the user and associat...
A wireless access point in a wireless network that may be adapted to transmit data indicating its location. The location data may be embedded in a control message or announcement transmission transmitted by the wireless access point, or other message conventionally used to broadcast network characteristics necessary...
Users attempting to join a conference facilitated by an enhanced communication system employing a network communication protocol such as SIP and having a distributed architecture are enabled to request the conference through a numeric conference identifier. The conference directory identifier is assigned to an assoc...
Methods and systems for reducing unsolicited electronic messages through variable pricing and conditional redemption are provided. Each ticket may have an associated value that is specified by a sender of an electronic message. This is referred to as "variable pricing." A ticket in a message acts as a guarantee that...
In an exemplary device implementation, a device includes: a connection migrator that is configured to migrate connections away from the device; the connection migrator capable of precipitating a compilation of protocol state for a connection across a protocol stack; the connection migrator adapted to aggregate the c...
A method and system to share objects that may reside on different machines. These objects can be accessedd and shared using a computer network such as the Internet. The objects can comprise computer programming objects, that may include but are not limited to, application programming intercfaces (APIs), programmin...
An embodiment of the current invention is directed to presenting a preview of search results for a suggested search. A search engine query is received. One or more search results are generated. One or more suggested, search terms are generated. A search engine results page is generated, including the one or more sea...
COMBINING VIRUS CHECKING AND REPLICATION FILTRATION
ABSTRACT
Data in backup systems can be effectively protected against viruses, even if definitions for certain viruses are found after infected data have been backed up to a backup server. In one implementation, a combined filter that includes antivirus and replic...
A motion-sensing remote control is described. In an embodiment, a television remote control can include various sensors that sense a motion of the device. The television remote control also includes an integrated circuit that receives a motion signal corresponding to the motion from the sensors and converts the moti...
A framework for creating modular web pages. The framework enables the development of modular, customized, and personalized web applications including web portals and web page. The framework includes an extensible part base class and an extensible zone base class. Part controls that derive from the part base class in...
The universal input device provides a common user interface for a variety of different computing platforms including printed documents. Using the present system, one may use the universal input device to control various computing devices as well as capture handwritten electronic ink and have the electronic ink be as...
A computing device includes a processing unit, and a memory with instructions that, when executed by the processing unit, cause the processing unit to create: a document processing module that processes the creation and editing of document content; and a metadata processing module that generates, monitors and stores...
A method and system for providing context of a caller to a callee when a call is initiated is provided. The context system executing on the calling device collects context for the call. The calling device initiates the call and sends a message to the callee that includes the context. Upon receiving the message, the ...
An error correction system determines a level of error correction protection to apply to a frame of video data to be transmitted by a sending endpoint to a receiving endpoint based on the predicted impact of packet loss as well as the importance of the frame based on inter-frame dependencies, frame size, packet loss...
A system and method for presenting a plurality of items to a user with a contextual display. A computer system is provided which includes a data store. At least a portion of the items in the data store include one or more field entries. An explorer interacts with the data store, selects items having one or more desi...
ABSTRACT
SMART CARD TERMINAL SIDE DATA AND MANAGEMENT FRAMEWORK
A data and management framework of a smart card terminal functions to provide interoperability between the smart card terminal and a smart card, and in particular between applications of the terminal and the card. An application program interface (API...
The present invention utilizes generic and user-specific of handwriting samples to provide adaptive handwriting recognition with a minimum level of user-specific enrollment data. By allowing generic and user-specific classifiers to facilitate in a recognition process, the features of a specific user"s handwriting ca...
A spurious timeout (STO) response allows a sending device to conservatively adjust congestion state parameters and maintain the packet flow, after detection of the STO. Since occurrence of an STO may be accompanied by data loss, the STO response couples the spurious timeout and the loss event by maintaining a value ...
An object model allows code to be developed using a programming environment to access the functionality of an application, in a word processing application, for example. The object model may be used to manipulate one or more data bindings in an application. Code may also be developed using a programming environment ...
Various techniques and tools for encoding and decoding (e.g., in a video encoder/decoder) binary information (e.g., skipped macroblock information) are described. In some embodiments, the binary information is arranged in a bit plane, and the bit plane is coded at the picture/frame layer. The encoder and decoder pro...
In a computerized system, a sending computer system and recipient computer system exchange an interchange format message in a resource-efficient manner. For example, a transformation writer at the sending computer system selects and transforms only one or few of a plurality of units of the message at the time. ...
A system and method for securely transferring computer-readable objects across a remote boundary is provided. The method decomposes any type of object into a hierarchy of sub-components based on a list of known object types. Each sub-component either corresponds to a known object type or an unknown object type. The ...
A system to perform transacted remote file operations over a network includes a client and a server. The client and server each include a transaction manager (TM) and a file system (FS). The client also includes a redirector (RDR), while the server includes a server application (SRV). The RDR receives a request for ...
ABSTRACT OF THE DISCLOSURE
RANKING FUNCTIONS USING AN INCREMENTALLY-UPDATABLE. MODIFIED NAIVE BAYESIAN QUERY CLASSIFIER
Methods of ranking documents on a network using an incrementally-updatable system are disclosed. Computer readable medium having stored thereon computer-executable instructions for performing a m...
A server provides Web responses that can include content from data tables in a database. The server maintains a cache (e.g., in system memory) that can store content (including content from data tables) so as to increase the efficiency of subsequently providing the same content to satisfy client Web requests. The se...
The universal input device provides a common user interface for a variety of different computing platforms including printed documents. Using the present system, one may use the universal input device to control various computing devices as well as capture handwritten electronic ink and have the electronic ink be as...
Mechanisms for rendering an object on a portion of a display that includes pixel sub-components for each pixel. The pixel sub-components are striped along a certain direction (e.g.. vertically or horizontally). The computing system determines (400) that the object has spatial frequency dominance in a direction wh...
An electric boosting system includes a plurality of molybdenum electrode bars for generating electric resistance heat of the molten glass, and a power supply connected to the molybdenum electrode bars to apply thereto a power needed for operation of the molybdenum electrode bars. The molybdenum electrode bars are pr...
A system and process for controlling printing of a print job by a printer. A print request is sent from a client to the printer. The request includes a unique source identifier for the print job; a type of the document or documents that make up the print job; an source address where a plurality of document resources...
In one exemplary implementation, strategies are described which transmit notification information from a first device (e.g., a media server) to a second device (e.g., a remote media device). Based on this notification information, a recipient-user can use the first device to generate an event pertaining to the notif...
Software-based audio rendering is described. The software-based audio rendering may also be synchronization to an external clock and/or a video rendering clock in some implementations. A particular implementation includes computer readable media configured to measure a first drift rate between an external clock and ...
Automatic conversation techniques are described. An apparatus may comprise a computing device having an incoming message module operative to receive an incoming message, a conversation identification module communicatively coupled to the incoming message module, the conversation identification module operative to de...
A network security module, interposed between a computing device and a network such that all network activities between the computing device and the network pass through the network security module, for protecting the computing device from an identified security threat on the network, the network security module com...
An extensible wireless framework for connecting to a wireless network is provided. The extensible wireless framework includes a network roaming service with a registration component and a network service component. The registration component registers extensible service modules and extensible drivers for providing n...
ABSTRACT DRM ASPECTS OF PEER-TO-PEER DIGITAL CONTENT DISTRIBUTION
Aspects of peer-to-peer distribution of digital content items protected by predetermined intellectual property rights are described. The digital content items are distributed between a source communication device operated by a source entity and a pro...
A word processor including a native XML file format is provided. The well formed XML file fully represents the word-processor document, and fully supports 100% of word-processor"s rich formatting. There are no feature losses when saving the word-processor documents as XML. A published XSD file defines all the rules ...
A first exemplary media implementation includes processor-executable instructions that direct a device to perform actions including: creating a session identifier (210) using a host identifier (214); and formulating a host session initiation message with the created session identifier. An exemplary device im...
Many different users may access, revise and update the same shared object simultaneously through several different transports. Revisions to the shared object are automatically synchronized such that all users can view the revisions to the shared object. Conflicting revisions are reconciled and merged into a current ...
A system that facilitates composition of schema mappings. A general algorithm is provided for composing a broad class of mappings, where one or both mappings are not functions, such as constraints between two schemas and the inverse of functions. A composition component performs composition on schema mappings of dis...
Designing and executing a workflow having flow-based and constraint-based regions. A user selects one or more activities to be part of a constraint-based region. Each constraint-based region has a constraint associated therewith. The workflow is executed by executing the flow-based region and the constraint-based re...
Exemplary embodiments disclosed herein may include a method and system for creating pair-wise security keys, comprising receiving an identity key from a website, generating a master key, creating a pair-wise symmetric key or asymmetric key pair by utilizing an encryption function of the identity key and the master k...
A method and system to generate a grammar adapted for use by a speech recognizer includes receiving a representation of an alphanumeric expression. For instance, the representation can take the form of a regular expression or a mask. The grammar is generated based on the representation.
Methods are described for using collaboration of neighboring wireless devices to enable location of disconnected wireless devices and rogue wireless access points. A central server computes the locations of the neighboring clients and uses those locations to estimate the location of a disconnected client. These tech...
Electronic devices often need to synchronize data themselves. A synchronization engine includes a database that supports the tracking of changed data, filtering, and recovery synchronization. Data changes that occur in the electronic devices are tracked for data synchronization. Data may be filtered by the database ...
Embodiments of the invention provide methods, systems, and media for, among other thigns, enabling an advertisement to interact with a software application. This can include receiving advertising content that is to be hosted by a software application. The advertising content can include an advertisement to be presen...
A process and system for processing a video to reliably identify a position in the video. The video position identification process and system use content-based video timeless. These timeless are composed of an ordered sequence of video "fingerprints" or "signatures" of video content that exploit the spatial charact...
Methods, systems, and apparatus are provided for viewing and managing collaboration data from within the context of a shared electronic document. A document editing pane is displayed for editing the shared document. In conjunction with the document editing pane; a collaboration pane is displayed for displaying the c...
ABSTRACT AUXILIARY PERIPHERAL FOR ALERTING A COMPUTER OF
AN INCOMING CALL
An auxiliary call control component is coupled to a computing system alerts the computing system of an incoming call in instances where the computing system is not capable of processing the incoming call. When the auxiliary call control comp...
A design tool includes a service definition model to enable abstract description of distributed computing systems and distributed applications. The design tool also includes a schema to dictate how functional operations within the service definition model are to be specified. The functional operations include desig...
A method and system provide a speech input mode which dynamically reports partial semantic parses, while audio captioning is still in progress. The semantic prases can be evaluated with an outcome immediately reported back to the user. The net effect is that task conventionally performed in the system turn are now c...
Architecture that synchronizes a job to shared notebook eliminating the need for user intervention and guaranteeing that only one instance of the notebook client performs the task. A job tracking component creates and maintains tracking information of jobs processed against shared notebook information. A scheduling ...
Systems and methods are described that facilitate learning a Bayesian network with decision trees via employing a learning algorithm to learn a Bayesian network with complete tables. The learning algorithm can comprise a search algorithm that can reverse edges in the Bayesian network with complete tables in order to...
The present invention provides a system or method for displaying rich presentation taskbar buttons for a corresponding application. In one example, the rich presentation taskbar button may receive content from an application through a programming interface. The present invention further relates to a system and metho...
A system and method for managing the installation of files on a computing device are provided. A client computing device obtains installation information identifying a version of a baseline installation component stored on the client computing device. The installation information also includes an installation compon...
ABSTRACT
ENABLING WEB ANALYTICS FOR INTERACTIVE WEB APPLICATIONS
|0038| A method is provided for tracking user-interaction with an interactive web application associated with a web page. The method includes providing one or more modified HTML elements for use with the web page. The default behavior of the HTML. el...
An expansion device is provided for expanding the functionality of a mobile electronic device while in a mobile mode and/or in a desktop mode. The expansion device may be a media slice that provides multimedia functionality to a mobile electronic device. The media slice may be configured to receive an electro-mechan...
A protocol negotiation platform permits a computer or other node lying outside of a security-enabled domain to negotiate a supported security protocol with a server or other node within that domain . Active Directory TM, Kerberos and other secure network technologies permit agent or nodes within a domain to commu...
The universal input device provides a common user interface for a variety of different computing platforms including printed documents. Using the present system, one may use the universal input device to control various computing devices as well as capture handwritten electronic ink and have the electronic ink be as...
Embodiments of the invention provide a method and system for automatically instrumenting a set of web documents, such as web pages, as well as embedding structures that present advertising content via the web pages. The instrumenting automatically embeds tags that enable usage information associated with the web doc...
Modular content framework and document format methods and systems are described. The described framework and format define a set of building blocks for composing, packaging, distributing, and rendering document-centered content. These building blocks define a platform-independent framework for document formats that ...
Collecting application execution data by a push service and targeting application programs with advertisements based on the collected data. Statistics such as activity, popularity, and frequency of execution for each of the application programs are generated based on the collected data. The statistics are matched to...
A method and system for offloading I/O processing from a first computer to a second computer, using RDMA-capable network interconnects, are disclosed. The method and system include a client on the first computer communicating over an RDMA connection to a server on the second computer by way of a lightweight input/ou...
The present invention extends to methods, systems, computer program products, and data structures for efficiently storing and accessing electronic messages. Generally, electronic messages are created and transformed in accordance with an electronic message schema hierarchy (150). Electronic messages can be created a...
One or more techniques and/or systems are provided for assigning power management classifications to a process transitioning a computing environment into a connected standby state based upon power management classifications assigned to processes and transitioning the computing environment from the connected standby ...
Priority binding enables a one-to-many mapping of a target to a source without requiring complex code development by the specification of one or more binding statements. During runtime, these bindings are evaluated. The highest priority binding that evaluates successfully is executed, controlling the two-way transfe...
A method and system is provided for instrumenting a program by optimizing prode insertion. The number of prode insertions into instrumented code is reduced by providing optimal prode insertion points. The control flow of the code is analyzed along with the arc and block relationships to build a post-dominator tree. ...
A firewall acts as transparent gateway to a server within a private network by initiating an unsolicited challenge to client to provide authentication credentials. After receiving the client’s credentials, the firewall verifies the authentication credentials and establishes a secure channel for accessing the server....
Filtering data packets in a manner that promotes efficient flow of data through a communication path. A filter stack includes one or more filter instances that may filter data packets that pass through the filter stack. The filter stack is associated with one or more protocol stacks that function in communication pa...
A computer-implemented method and system are provided for supporting hardware devices that are connected to the computer via a network. The existence of any hardware device connected on the network is detected in the method. Information descriptive of the connected device is then obtained, either from the device or ...
A system, a method and a program product provide access to variable-length data
segments on a sequential access storage medium using an iterative search for a specified data offset based un estimates of media offsets. The data is recorded in variable-length data segments aligned to predetermined alignment intervals...
A method and apparatus for selecting a view mode from aplurality of view modes and for selecting a setting within the selected view mode
for displaying one or more items in a screen display. A single user input
indicates both a selected view mode and a selected setting within that view mode.
The input mechani...
In accordance with one or more aspects, a license for content is retrieved, the license having been previously embedded in the content. A requested action is allowed to be performed with the content only if a standalone license, or both a leaf license and a root license, indicate that the action with the content is ...
A data protection application if provided. The data protection application includes a job for providing protection to data. That job contains a plurality of tasks configured to perform the job. Also included is a task executor for managing the progress of each of the plurality of tasks.
A system and method for generating a 2D transition between a first media object and a second media object. A 3D model is defined corresponding to a desired 2D transition pattern. A graphics processing unit (GPU) or a set of instructions generates a transition between the first media object and the second media objec...
ABSTRACT
WIRELESS SUPPORT FOR PORTABLE MEDIA PLAYER DEVICES
A portable media player device is capable of operating in a wireless network. The wireless portable media player device can bootstrap and synchronize with an ad hoe network with low power consumption. Neighbor portable media player deuces in an ad hoe net...
Modifying a componentized workflow model during execution of the workflow. Each step of the workflow is modeled as an activity that has metadata to describe design time aspects, compile time aspects, and runtime aspects of the workflow step. A user selects and arranges the activities to create the workflow via user ...
The present invention provides a system by which entities interact with one another in a manufacturing channel. The entities (such as a seller and customer) use a messaging system to perform status inquiry and functional processing steps with respect to data stored at the resource management system of the other.
...
A system and method are provided for modeling structured, semi-structured, and unstructured data all within a single instance of a user defined type (UDT) within a database store. In particular, the XML data model is extended to fields of a UDT. As a result, the properties of the XML data model — such as document or...
Systems and methods for transitioning between alternate views when rendering A/V content in a computing system are provided. In various embodiments, a "Now Playing" state is exposed to a user experiencing media on a media device via a user interface, wherein the Now Playing" state has a plurality of associated "Now ...
Images and/or collections of images may be rendered in a way that adapts to ambient circumstances and that may enhance a user s perception of experience quality. When an image is requested for display it is determined whether a rendered version of the image exists. If no rendered version of the image exists then an ...
The claimed method and system is an API set to support a multicast programming model for implementation on top of a service oriented framework, specifically a service oriented messaging system.
A derivative network DNA component and a raw network component are included in the network DNA. The raw network DNA component can be acquired from a local source or a remote source. The derivative network DNA component can be produced in accordance with a specification of the derivative network DNA component. The ne...
DRAGGING AND DROPPING OBJECTS BETWEEN LOCAL AND
REMOTE MODULES
ABSTRACT
The present invention extends to métiers, systems, and computer program products for dragging and dropping objects between local and remote modules Terminal server components simulate the functionality of participants in drag and drag operat...
Runtime polymorphism may be enabled with metadata that is usable for casting objects to casted objects. In an exemplary media implementation, processor-executable instructions cause operations including: discover at least one type of an objectt while in a runtime environment; and create a casted object from the obje...
Loyalty offer techniques are described. In one or more implementations data is received from a plurality of merchants via a network the data describing transactions for goods or services initiated at physical locations of respective said merchants and including identifiers that uniquely identify mobile communication...
Network connection information is requested by a wireless wide area network device via the internet. Such information may include configuration information, data roaming partner information, and/or cost information regarding roaming partner connection and/or a subscriber plan related to the wireless wide area networ...
Trusted e mail communication may be provided. A message source organization may be validated. When a message is received from the validated message source organization for a recipient organization a determination may be made as to whether the recipient organization supports an attribution data extension. If so the m...
An efficient interrupt system for a multi-processor computer. Devices interrupt a processor or group of processors using pre-defined message address and data payload communicated with a memory write transaction over a PCI, PCI-X, or PCI Express bus. The devices are configured with messages that each targets a proces...
Systems and methods for Just-My-Code(JMC) debugging are described. In one aspect, debugging probes are automatically inserted into respective programming constructs representing interesting code. The debugging probes are insered during computer computer-program compiling operations that generate native code. The nat...
A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file...
Disclosed herein are systems and methods for decorating a display environment. In one embodiment, a user may decorate a display environment by making one or more gestures, using voice commands, using a suitable interface device, and/or combinations thereof. A voice command can be detected for user selection of an ar...
ABSTRACT
SECURITY AUTHORIZATION QUERIES
In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of negations. In another example implementation, an authorization query table maps respective resource-specific opera...
Techniques are disclosed to improve quality of images that may be blurred or underexposed (e.g., because of camera shake, taken in dim lighting conditions, or taken of high action scenes). The techniques may be implemented in a digital camera, digital video camera, or a digital camera capable of capturing video. In...
A computer assigns networks to network zones based on predefined properties for each zone and/or the properties of the networks. An application program installed on the computer provides the computer with preference information that indicates the network zone whose network policies or properties are best suited for ...
The present invention relates to a synchronization system that utilizes a synchronization wizard ("PullSync") residing on a first computer device to request and receive (or "pull") data from a second computer device. The first computer device (the "syncer") copies files from shared folders on the second computer dev...
Described is a protocol by which wireless network communication devices comprising peer nodes (such as a computer system and an access point) cooperatively exchange information about RF interference detected in the network. The protocol administers the exchange of formatted control data corresponding to the detected...
Print plug-in isolation is described. In embodiment(s), a print system input can be received at a print system, and the print system input can be redirected from the print system to an isolation module that isolates one or more print plug-ins from the print system. The print system input can be processed at the isol...
An application instance identifier is employed with various systems and methods in order to provide a requestor with continuous access to a resource when operating in a client clustered environment. A requestor residing on a first client in may attempt to access a resource. The first client sends a request to access...
A role based graphical user interface (UI) is used for receiving user input for entry/editing relating to projects/tasks using a limited display device. Functional components are grouped into logical hubs that may be displayed within the user interface. The groupings of the components are based on a role of a user (...
Techniques involving the establishment of content navigational pattern direction based on directionally desired or intuitive gestures by users. One representative technique includes receiving user input that is indicative of a direction in which presented content that is arranged by sequence will be advanced. A navi...
A region menu is used to easily access menu items. Generally, the region menu includes a number of regions with associated menus that are located close to an initial mouse position from where the region menu is evoked. Hovering over any of the regions of the region menu displays the menu item that is associated with...
A system and method of managing unsolicited email sent to an email system over a network. Email messages are received at a message at an inbound mail transfer agent. A determination is made as to whether the email message is suspected to be an unsolicited suspect message. One or more queries for additional informati...
Segmented media content rights management is described. In embodiment(s), a media device can receive segments of protected media content from media content streams that each include a different version of the protected media content. A media content file can be generated to include the segments of the protected medi...
Allocation of memory registers for shaders by a processor is described herein. For each shader, registers are allocated based on the shader"s level of complexity. Simpler shader instances are restricted to a smaller number of memory registers. More complex shader instances are allotted more registers. To do so, deve...
A GUI adapted for use with portable electronic devices such as media players (110) is provided in which Interactive objects are arranged in a virtual three-dimensional space (400) (i.e., one represented on a two-dimensional display screen (218)). The user (105) manipulates controls (223) on the player (110) to maneu...
Disclosed is a gaming system having a processing device and a remote input device that is operationally coupled to the processing device. The remote input device may include a motion sensor. The resolution of the motion sensor may be set dynamically from the game software, such that both gross and fine gestures can ...
Real time media-based social network notifications (312) are utilized to provide updates of events (400) that occur in a social network (325) in real time. By providing a data feed of events which are monitored in the social network to a real time media system such as a presence-based messaging network (260), users ...
Embodiments described herein are directed to simultaneously presenting a virtual touchpad and a graphical user interface of an operating system on the same display. A user can interact with the OS using the virtual touchpad, and user touches are read by a touch-screen portion of the display assigned to the touchpad....
Techniques to manage communications between relay servers are described. A system may include multiple relay servers each having an enhanced relay control module. The enhanced relay control module may be operative to manage communications between private clients communicating over the first relay server and the seco...
The present invention extends to methods, systems, and computer program products for using Visual landmarks to organize diagrams. Embodiments of the invention facilitate using Visual landmarks to organize elements within a diagram. Elements of a diagram can be arranged in accordance with configurable defined propert...
The present invention extends to methods, systems, and computer program products for protected mode scheduling of operations. Protected mode (e.g., user mode) scheduling can facilitate the development of programming frameworks that better reflect the requirements of the workloads through the use of workload-specific...
The present invention extends to methods, systems, and computer program products for licensing protected content to application sets. Embodiments of the invention permit a local machine to increase its participation in authorizing access to protected content. For example, an operating system within an appropriate co...
A workflow designer enables a user to author a workflow by arranging building blocks in a particular order using a combination of a graphical designer and a rules based editor. The building blocks are encapsulated and displayed graphically to the user. The building blocks may correspond to events, conditions or acti...
A user interface element is displayed for in place editing of values within a document. For example in response to selecting a value a user interface is displayed near the value that receives a slide gesture for adjusting the value in place. The user interface may be configured to select one of the discrete parts of...
The normal roles of wireless stations and wireless access points in initiating wireless connections may be reversed without changing network interfaces for either the station or access point device. This may allow wireless devices acting as access points, but on which service clients operate, to initiate a connectio...
[0045] Technologies are described herein for providing a pan and zoom control
in conjunction with a timeline for navigating project schedule data in a project management application. The project management application displays a pan and zoom control in conjunction with a project schedule timeline, with the pan and ...
A note taking application displays a notebook with a multi column hierarchical navigation display. Each column has navigation elements that are activated to navigate through one or more notebooks. The user can control the display to expose more or fewer navigation columns.
Methods systems and computer readable media for providing topical search suggestions are provided. Topical search suggestions allow a user to receive search results related to the designated topic or subject matter. The present invention may generate multiple topics based on search input provided by a user. The sear...
Techniques for managing annotation transformations are described. An apparatus may include a processor coupled to memory. The memory may store a shared application manager (SAM) module for execution by the processor. The SAM module may comprise a client user interface component operative to generate a shared applica...
Application states may be stored and retrieved using policies that define various contexts in which the application is used. The application states may define configurations or uses of the application, including connections to and interactions with other applications. Applications that are virtualized may have state...
Motion controlled list scrolling includes outputting to a display device a user interface including a plurality of selectable items and receiving a world space position of a hand of a human subject. Responsive to the position of the hand of the human subject being within a first region the plurality of selectable it...
A set of workflows are provided for supporting proper user notifications after an action is taken by the user in conjunction with an asynchronous communication service. Timing and/or type of the notifications or an action to be taken by the service is determined based on one or more of a nature of the user action th...
Techniques to view and manage followed content are described. A technique may include receiving a selection to follow a content item. A reference to a content item selected for following may be stored for a user. The references for the user may be displayed in a centralized location in a user interface. The display ...
Described is the backup and/or restore of virtual disks In general, metadata is backed up for restoring a virtual disk. To restore the disk, a physical disk is created, with the virtual disk the created on a partition of the physical disk. Backup and restore is described for nested virtual disks, including for block...
Embodiments are disclosed that relate to the correction of an image acquired in a rolling image capture system for ambient light. One embodiment provides a device comprising a screen, a rolling image capture system, a local light source, and a controller. The controller is configured to operate the local light sourc...
Techniques for auto-generating the target's visual representation may reduce or eliminate the manual input required for the generation of the target's visual representation. For example, a system having a capture device may detect various features of a user in the physical space and make feature selections from a li...
Brokering locations for the completion of tasks. Location information for a
plurality of sellers is maintained. Buyers define tasks to be performed at particular task
locations at particular times. A brokering system notifies the sellers of the defined tasks,
and selects sellers near the task locations to complet...
A system for creating a report in a spreadsheet includes: a central processing unit; and a memory encoding instructions that when executed by the central processing unit cause the central processing unit to create: a data source module programmed to identify tables associated with the spreadsheet; a relationship mod...
A system for creating a report in a spreadsheet includes a data source module programmed to identify sources of data items associated with the spreadsheet an active module programmed to identify which of the data items are associated with the report that is generated in the spreadsheet and a display module programme...
Technologies are described herein for identifying a sharing level of content items in a content library. The content library includes a first content item having a first sharing configuration and a second content item having a second sharing configuration. The first sharing state associated with the first content it...
A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication channel. The security claims are stored, as is a digital signature generated over the set of security claims by an entity...
Correlating user activity and location-based prediction of network access events with the delivery of pushed content to a computing device. Location information for the computing device is received by the computing device. One or more network access events are predicted, or network access characteristics are determi...
The claimed subject matter provides systems and/or methods that effectuate distribution of advertising as real-time video calls. The system can include devices that detect whether or not a mobile device associated with a user is in the vicinity of a retail establishment, ascertains whether or not the proximate mobil...
Determining semantics for locations based on user data such as user activities and/or user communications. The user data is captured and analyzed to identify keywords including locations. Location data describing the locations is obtained and associated with the user and keywords. The associations represent user con...
The claimed subject matter provides a system and/or a method that facilitates routing an incoming data communication in connection with unified communications. A unified communications component can employ unified communications for a data communication with an email data communication mode, a voice data communicati...
Systems methods and computer readable storage media for enabling immersive interactive search engine home pages are provided. Upon receiving a request for a search engine home page an image is presented that covers only a portion of the available display. The image includes a portion of a larger image but appears as...
Review and filtering of search results is facilitated by providing additional types of results beyond links to existing documents can be provided in addition to or in place of links to existing documents. These additional results can facilitate modifying a search request to filter out unwanted documents. The additio...
The claimed subject matter provides systems and/or methods for propagating viral advertising content to multiple mobile devices without utilizing an intermediary interposing hosting and/or distribution service. The system includes devices that receive viral advertising content on a mobile device, modify the viral ad...
In server/client architectures the server application and client applications are often developed in different languages and execute in different environments specialized for the different contexts of each application (e.g. low level performant platform specialized and stateless instructions on the server and high l...
Device linking is described. In one or more implementations data is maintained at a network service that describes characteristics of a plurality of devices that are associated with a user account of the network service. A communication is formed to be received by one of the plurality of devices that includes a port...
A control server initiates a call to a first device. After creating a connection to the device, the control server reverses the direction of the message flow between the device and the control server such that the device becomes the initiator of the call (the caller) and the control server becomes the device that is...
Systems and methods are provided for generating a DNN classifier by "learning" a "student" DNN model from a larger more accurate "teacher" DNN model. The student DNN may be trained from unlabeled training data by passing the unlabeled training data through the teacher DNN which may be trained from labeled data. In o...
An environmental tracking system provides facilities for modeling the processes of an organization that have an impact on the environment. The environmental tracking system allows each process to be modeled by its input substances and its resulting output substances. The environmental tracking system allows links to...
Techniques and tools for conversion operations between modules in a scalable video encoding tool or scalable video decoding tool are described. For example, given reconstructed base layer video in a low resolution format (e.g., 4:2:0 video with 8 bits per sample) an encoding tool and decoding tool adaptively filter ...
In general, this disclosure describes techniques that employ user-defined values of properties of sections of an electronic presentation. As described herein, a user may configure a presentation to include a plurality of sections. Each of the sections includes zero or more slides of the electronic slide presentation...
A technique that enables a portable device to be automatically associated with a plurality of computers. Information that a computer can use to authenticate a portable device and establish a trusted relationship prior to creating an association with the portable device is created and stored in a data store that is a...
A user request to display an application while the device is locked is received. In response to this user request, one or more images generated by the application are obtained and displayed while the device is locked. Additionally, an indication of an application to be displayed upon resuming operation from a power-...
A generic means for synchronizing information about a user s view of a document or other content within an application across native client and web applications is provided. Attendees of an online broadcast are enabled to see what the presenter is seeing within their own application. In addition meeting specific inf...
An electronic discovery (eDiscovery) application is used in managing an electronic discovery process across different electronic data sources using a central interface. The eDiscovery application assists in managing: authentication support for the different data sources; accessing the different data sources; placing...
Systems and method for routing search query results in a networked computing environment. An initial search query is reformulated into at least one sub query in accordance with one or more configurable rules. The sub query is sent to at least one information system or source and any potential hits associated with th...
The display of a content area is automatically adjusted such that the display of a virtual input panel (e.g. virtual keyboard gesture area handwriting area ) does not occlude content with which the user is interacting. After adjusting the display of the content area the content being interacted with is visible withi...
The claimed subject matter provides a system and/or a method that facilitates authenticating a data communication. An interface component can receive data related to a real time data communication between two or more clients. A verification component can employ a human interaction proof (HIP) to a client participati...
A flash storage device and a method for using the flash storage device to prevent unauthorized use of a software application are provided. An identifier may be encoded within specific sectors of the flash storage device. One bits of the identifier may be encoded as unusable ones of the specific sectors and zero bits...
INTERNAL SCROLL ACTIVATION AND CURSOR ADORNMENT
Mechanisms for allowing a user to scroll through a displayed viewer. Upon detected using input while the viewer is being displayed, the user input is identified is being a scrolling gesture. In response, a scrolling control is activated at an interior portion of the...
An exemplary system includes a front-end component, one or more distributed computation and storage (DCS) components, and a location services component. The front-end component is configured to receive requests for resources in a data center, associate each request with identifying information, locate resources for ...
The present invention extends to methods systems and computer program products for adaptively selecting electronic message scanning rules. Embodiments of the invention relate to dynamically (and potentially unpredictably) varying the depth/thoroughness of classifying electronic messages to protect against undesirabl...
A speech-to-text transcription system for a personal communication device (PCD) is housed in a communications server that is communicatively coupled to one or more PCDs. A user of the PCD, dictates an e-mail, for example, into the PCD. The PCD converts the user"s voice into a speech signal that is transmitted to the...
A pivotable events timeline is described. In embodiment(s), a pivotable events timeline can include event indicators of events associated with television media content. The event indicators can be displayed to indicate a sequence of the events along the pivotable events timeline. An event on the pivotable events tim...
Systems methods and software are described herein for enhancing features within program applications. In an implementation a user associated with a productivity application is identified and a service application associated with the user is identified. A service feature that corresponds to the service is enabled wit...
A method for generating an accompaniment for a recorded audio melody includes providing a recorded audio melody that includes segments; performing a frequency analysis of the recorded audio melody; summing the total duration of each fundamental frequency within a segment of the melody; based on the summing, computin...
Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A sends message 3 towards Node B and, shortly thereafter, Node B sends message X to Node A, Node A would like to know whether or not message X reflects Node B"s s...
An arrangement for exposing self-describing device-hosted services on a client device to a host application or processes over MTP (Media Transfer Protocol) is provided by which an MTP extension comprising new MTP commands enables the device-hosted services to be backwards and forward compatible with existing MTP imp...
Technologies are described herein for animating objects through the use of animation schemes. An animation scheme is defined using a declarative language that includes instructions defining the animations and/or visual effects to be applied to one or more objects and how the animations or visual effects should be ap...
Software deployment to server nodes within large-scale networked systems is provided using image-based deployment. A mostly immutable image is provided at a central service and transferred from the central service to the server nodes. The image includes a base image, which is immutable, and a delta image, which is w...
One or more techniques and/or systems are disclosed for providing a client application with access to a file based upon a local offline version of the file and/or web online version of the file. That is a file may be shared/synchronized from a remote source such as a web storage service. A web online version of the ...
SYNDICATED ADVERTISING AND COMMERCE THROUGH WIDGETS
An Internet host user posts, or embeds an advertising link, or widget into an interactive program located on a website. The advertising link is viewed by other users who visit the website and participate in the interactive program. A backend infrastructure provi...
Automatic extraction of data from and tagging of a photo (or video) having an image of identifiable objects is provided. A combination of image recognition and extracted metadata including geographical and date/time information is used to find and recognize objects in a photo or video. Upon finding a matching identi...
A system and method are disclosed for activating an electric device from a standby power mode to a full power mode. The system may include one or more microphones for monitoring audio signals in the vicinity of the electric device and a standby power activation unit including a low power microprocessor and a non vol...
A routing system receives an instant message (I M) from a user via an I M service. The I M contains a source address associated with the I M user and a destination address associated with a contact in the I M user's "buddy" list. A temporary mobile device number is allocated to the I M user. The I M is converted to ...
Various embodiments enable local web applications to communicate asynchronously with web based services and applications based on a local device's current state and a user's communications preferences. In at least some embodiments, a synchronization engine receives a message in a "Web Inbox" from a web based service...
ABSTRACT MULTI-LEVEL EVENT COMPUTING MODEL
High-order events may be generated and consumed in a cascading computing model. Low level information, such as changes in physical sensor readings, may be communicated to an application in the form of event messages that are generated by an operating system service. In one...
ABSTRACT
AUTOMATICALLY FINDING CONTEXTUALLY RELATED ITEMS OF A
TASK
Architecture for enabling a user to automatically recover documents and other information associated with work contexts and recover documents and other information artifacts associated with a specific project. The architecture enables monitoring ...
At a mobile communications device, a communication is received from a communication source. An indication of an environment type associated with the communication source is obtained, and a check is made as to whether the indication of the environment type associated with the communication source matches a current en...
Methods and computer-readable media for associating words or groups of words distilled from content, such as reported speech or an attitude report, of a document to form semantic relationships collectively used to generate a semantic representation of the content are provided. Semantic representations may include el...
Various embodiments provide message queue management techniques designed to reduce the likelihood of multi component applications becoming nonresponsive and enable recovery options for individual components if they do become nonresponsive. In at least some embodiments a message queue manager detects when a component...
Various embodiments enable a tab within a web browser user interface to be dragged out of an associated tab band in which it appears. When dragged outside of the tab band content can be rendered within a window associated with the tab. This permits side by side viewing of content in the primary web browser user inte...
Video from a video camera can be integrated into a still image with which it shares common elements to provide greater context and understandability. Pre processing can derive transformation parameters for transforming and aligning the video to be integrated into the still image in a visually fluid manner. The trans...
ABSTRACT COMPUTING SYSTEM WITH VISUAL CLIPBOARD
A visual clipboard system and method are provided, in which drag-and-release operations are employed to move copies of a displayed object onto and off of a predefined clipboard area. When a copy of a displayed object is placed on the predefined clipboard area, the dis...
ABSTRACT MESSAGE COMMUNICATION OF SENSOR AND OTHER DATA
A service may be provided that reads sensors, and that communicates information based on the sensor readings to applications. In one example, an operating system provides a sensor interface that allows programs that run on a machine to read the values of senso...
Embodiments of camera-based scanning are described. In various embodiments, scanned documents can be created using images captured by a camera associated with a device. An image captured by the camera is processed to identify portions within the image that correspond to rectangular objects such as pap...
An optical structure useful in a see through head mounted display apparatus allows is provided. A first and a second partially reflective and transmissive elements are configured to receive the output of any number of optical sources via an optical element. Each reflective and transmissive element is positioned alon...
A method (74) to furnish input representing gaze direction in a computer system operatively coupled to a vision system. In this method a first image of an eye at a first level of illumination is acquired by a camera of the vision system (78). The first image is obtained from the camera and a second image of the eye ...
Various embodiments are disclosed that relate to the presentation of images of shadows cast over a real world background by images of objects displayed on a see through display. For example one disclosed embodiment provides a method of operating a display device having a see through display screen The method compris...
Aspects of the subject matter described herein relate to offload reads and writes. In aspects a requestor that seeks to transfer data sends a request for a representation of the data. In response the requestor receives one or more tokens that represent the data. The requestor may then provide one or more of these to...
Techniques described enable efficient swapping of memory pages to and from a working set of pages for a process through the use of large writes and reads of pages to and from sequentially ordered locations in secondary storage. When writing pages from a working set of a process into secondary storage the pages may b...
Embodiments are directed to dynamically delivering virtual software applications and to allocating application data between local and network data stores. In one scenario a computer system establishes a data input/output (I/O) filter configured to intercept data file requests being sent from a virtual software appli...
Techniques are provided for the caching of content prior to the content being requested. A request for desired content may be received from a client application at a caching server. The request may also indicate additional content related to the desired content that may be subsequently requested by the client applic...
Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease which allows the client to cache the directory metadata locally and service requests received from the same application which originally requested the director...
A web page behavior enhancement (WPBE) control element is provided on a rendered web page enabling a user to perform actions on at least a portion of the web page content such as customizing editing sharing analyzing exporting and/or annotating the content. The processed content may be presented on the original web ...
A Web service synchronization protocol is provided that sets forth the metadata and messaging by which endpoints roam, share and synchronize common information with one another in a multi-master networked computing ecosystem. A general SOAP-based protocol is defined for synchronizing data between two endpoints where...
Technologies are described herein for rendering documents containing three-dimensional objects. A client computer receives a request to display a document. If a program utilized to create the document is not available to display the document, the client computer transmits a request to a server computer to render the...
Technologies are described herein for coreference resolution in an ambiguity-sensitive natural language processing system. Techniques for integrating reference resolution functionality into a natural language processing system can processes documents to be indexed within an information search and retrieval system. A...
A unified messaging (UM) application benefits from platform independence and human intelligibility of extended Markup Language (XML). A finite state machine (FSM) of the UM application is created utilizing an XML feature to create a valid menu state based upon a UM software component. For a UM software component tha...
One or more techniques and/or systems are disclosed for rendering online ads on a webpage. A first inter frame communication channel is created which comprises a first communication channel between a first cross domain frame and a host page such as the webpage. The first cross domain frame comprises content from a d...
ABSTRACT DYNAMICALLY TRANSFORMING DATA TO THE CONTEXT OF AN
INTENDED RECIPIENT
[0061] A sender can create a message for transmission to an intended recipient.
During creation of the message, the sender may insert data into the message that is expressed with reference to the context of the sender. When the sender ...
An image such as a depth image of a scene may be received, observed, or captured by a device. A grid of voxels may then be generated based on the depth image such that the depth image may be downsampled. A background included in the grid of voxels may also be removed to isolate one or more voxels associated with a f...
Creating a distributed application includes selecting a group of components from a list of components available on a remote server cluster. Data required to install the selected components is received from the remote server cluster. A list of instructions is created in response to the received data. The list of inst...
Search queries containing multiple modes of query input are used to identify responsive results. The search queries can be composed of combinations of keyword or text input image input video input audio input or other modes of input. The multiple modes of query input can be present in an initial search request or an...
An indication of a remaining battery life currently available based on a current resource setting for a resource of a computing device is displayed. A user input to change the resource to a new resource setting is received and in response to the user input an indication of the remaining battery life currently availa...
Technologies are described herein for controlling components associated with a room using a mobile phone. A gateway is configured to receive a command from a mobile phone. Upon receiving the command the gateway determines whether the command is a room command or a presentation command. If the command is a room comma...
Temporarily sensitive information can be stored in the non-volatile storage of a TPM, from which it can be securely, and irretrievably, deleted. Additionally, information stored in a TPM can secure information stored on communication ally dis connectable storage media such that, when communication ally disconnected,...
Embodiments of transparent display configuration modes are described. A portable device includes a handheld base movably coupled to a display device that is configurable to open and close over the handheld base. The display device displays an image and the display device includes a first display surface through whic...
A system and methodology that enables a mobile device user to privately retrieve information while engaged in an active communication session is provided. The innovation enables a user to prompt lookup and retrieval of information (e.g., calendar appointments, contact information, task information) without interrupt...
A connector is provided for electrically coupling a battery with a battery-powered device. The connector includes a first dual-contact assembly and a second dual-contact assembly. Each dual-contact assembly includes a positive contact for contacting a positive PP3 terminal of a PP3 battery, and a negative contact fo...
End users of a multi-factor authentication service can utilize an account management service, and third-party website can register to utilize the multi-factor authentication service. Registering a third-party website can comprise the multi-factor authentication service receiving a valid digital identity certificate ...
Media fragmentation may be provided. First, a request for a manifest may be received from a cl ient. Then, in response to the received request for the manifest, the manifest may be sent to the client. Next, a request may be received from the client for a file fragment. The request may indicate a start time and an en...
A formula detection engine and associated method. The formula detection engine locates formulas within a fixed format document portion by identifying formula seeds. The formula detection engine creates and expands a boundary around the formula seed to define a formula area. To eliminate overlap with surrounding norm...
User presence is detected in a notebook that includes multiple different documents. The user identity and location within the notebook can be displayed to other users to facilitate collaboration.
Page tables in the last level of a hierarchical page table system are scanned Tor candidate page tables. Candidate page tables are converted to large pages, having a page table entry in a level before the last level of the hierarchical page table system adjusted to be associated with the newly created large page. Up...
ABSTRACT VIRTUALIZED STORAGE ASSIGNMENT METHOD
Various aspects are disclosed for building a device driver stack in a virtual machine partition that does not physically control the device represented by the stack. In an embodiment, a secondary interface and driver for an I/O device may be instantiated. Information f...
Atomic multiple modifications of streams is provided. Streams are selected for the application of an atomic multiple modification. A lock is acquired on the meta-data associated with the streams. Each stream is de-coupled from its name. Multiple modifications are applied to the selected streams. After performing the...
A computing device having a software defined radio (SDR) wireless network interface is automatically configured to support a wireless service in response to a request from the user to access the service. The computing device may determine the appropriate profile and obtain it by querying a remote database. The query...
ABSTRACT
REDUCED DC GAIN MISMATCH AND DC LEAKAGE IN OVERLAP
TRANSFORM PROCESSING
In certain embodiments, overlap operators are applied during encoding and/or decoding of digital media, where the overlap operators have reduced DC gain mismatch and/or DC leakage between interior overlap operators and overlap operat...
ABSTRACT
EXTERNAL ENCRYPTION AND RECOVERY MANAGEMENT WITH HARDWARE ENCRYPTED STORAGE DEVICES
Hardware encrypting storage devices can provide for hardware encryption of data being written to the storage media of such storage devices, and hardware decryption of data being read from that storage media. To utilize exi...
ABSTRACT
INTERACTIVE DESIGN ENVIRONMENTS TO VISUALLY MODEL, DEBUG AND EXECUTE RESOURCE ORIENTED PROGRAMS
In scenarios involving a data set accessible through a protocol, operations sets may be formulated for performing various operations on the data set, and may be expressed as resource scripts according to a scri...
An advertising avatar provides an engaging advertising experience. To create an advertising avatar, a user provides information that may be used to target advertisements to the user. The information is stored in a user profile and associated with an avatar ID. Additionally, an avatar image is created for the adverti...
A cloud computing environment may use a virtualization layer within a stateless cloud computing process to capture store and retrieve state information generated by a stateful application executing within the process. The virtualization layer may monitor various state storage systems to identify changes to stateful ...
ABSTRACT
TRANSACTION PROCESSING FOR SIDE-EFFECTING
ACTIONS IN TRANSACTIONAL MEMORY
A processing system includes a transactional memory, first and second resource
managers, and a transaction manager for a concurrent program having a thread
including an atomic transaction having a side-effecting action. The first...
Disclosed are systems and methods that enable a workbook author to break a workbook out into a set of logically separate pieces, referred to herein as "workbook parts." Calculation dependencies between the workbook parts may be maintained, so that all the calculations are correct across the entire spreadsheet. An or...
Online documents services are provided by application servers for editing by users. Documents are stored in component based structures in an application server s local memory to provide granularity in coauthoring and conflict resolution. Component level locking is utilized to minimize simultaneous user edit based co...
A middleware system is provided that is situated between the user applications and the various content databases that are to be searched in order to simplify the creation of user applications for mobile devices that use location-based services that employ ontology-based search systems. The middleware system exposes ...
Embodiments provide a schema for representing data usage plans and data usage statistics. The data usage plan describes threshold values associated with network connections of computing devices of the user. A web service dynamically generates data usage statistics for the computing devices to represent data consumed...
Retrieving content items based on a social distance between a user and content providers. The social distance is determined based on, for example, user interaction with the content providers. The content providers are ranked, for the user, based on the determined social distance. Prior to a request from the user, th...
A reduced capability subset of an application referred to as a "starter application" is provided on a computer device prior to purchase and intended for use by a user purchasing the computer device. The starter application may monitor input from the user when the starter application is executing to ascertain opportu...
Methods, systems, and computer-readable media for facilitating personalization of web content is provided, while protecting privacy of the user data utilized to personalize user's experience. A privacy vault may collect user data including user activity data, demographic data, and user interests submitted by user. I...
Techniques and technologies for routing communications based on Quality of Service (QOS) related information. More particularly, this document discloses techniques and technologies for selecting communications paths which partially overlap other communication paths for which QOS related information has been measured...
Methods and systems are disclosed in which inherited activation opens a secure communication path from the host operating system (OS) to the guest (virtual machine) OS. The license state of the software on the host is passed through this channel and software installed in the guest uses this information to inform its...
ABSTRACT TRUSTED AND CONFIDENTIAL REMOTE TPM INITIALIZATION
Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.
In one embodiment an application updater may cleanly update a computer application without causing a fault or a reboot of either the system or the process. A processor may execute a predecessor version of a computer application. The processor may install a successor version of the computer application on a user acco...
An electronic messaging client caches copies of a subset of electronic messages available in a remote store in a local store of a user device. When the user device is in an online state the client provides for the blended presentation of electronic messages such that a user can concurrently view information about th...
In one embodiment, receives a user gesture indicating an edit to be performed on a target object within a model. The model is based on an underlying schema including constraints that define relationships between objects in the model, including the target object. The computer system determines that at least one of th...
The manipulation system described herein provides a common platform and application-programming interface (API) for applications to communicate with various multi-touch hardware devices, and facilitates the interpretation of multi-touch input as one or more manipulations. Manipulations map more directly to user inte...
Various embodiments provide an add on advisor that is designed to assist users in managing add ons for a browser and/or other application programs. In at least some embodiments the add on advisor can be implemented to detect newly installed add ons and provide notifications to a user of the detected add ons. The not...
Data compression and key word recognition may be provided. A first pass may walk a text string, generate terms, and calculate a hash value for each generated term. For each hash value, a hash bucket may be created where an associated occurrence count may be maintained. The hash buckets may be sorted by occurrence co...
Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client that requests the certificate. The client creates a certificate request, and then has the TPM create an attestation identit...
The inertia system provides a common platform and application-programming interface (APr) for applications to extend the input received from various multi-touch hardware devices to simulate real-world behavior of application objects. To move naturally, application objects should exhibit physical characteristics such...
Methods are disclosed for managing configuration variables and settings within a note taking application such that application features are adjusted globally across an entire note taking application regardless of the particular device from which application content is accessed. The configuration variables and settin...
A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall and connected indirectly through an access device. The client computer is configured to attempt communication with a device on the network. Based on the response, t...
A system that facilitates different levels of operating system (OS) boot so as to provide users with rapid access to certain mobile device functionalities, security, applications, etc. is provided. An OS can be loaded in phases or stages commensurate with policies, preferences, actions, context, etc. Similarly, a pa...
Embodiments described herein are directed to the constructing software applications based on data models and automatically reconfiguring runtime object graphs according to data model edits input by a user. In one embodiment, a computer system performs a method for constructing at least a portion of a software applic...
Partition management for a scalable, structured storage system is provided. The storage system provides storage represented by one or more tables, each of which includes rows that represent data entities. A table is partitioned into a number of partitions, each partition including a contiguous range of rows. The par...
User interfaces are provided that allow for the display of a target element that may be used to adjust a gamma value of a display device. The target element includes three layers. A bottom static layer is alternating light and dark lines, which in one instance may be black and white lines of equal height. A gray sta...
Tabs or other display elements that do not comply with traditional "window" requirements can be individually presented to a user when the window containing such tabs or other display elements is hidden or obscured. The user can be enabled to perform tab-specific actions, such as closing a particular tab, or viewing ...
A multiple access level lock screen system allows different levels of functionality to be accessed on a computing device. For example when a device is in a locked state a user can select (e.g. by making one or more gestures on a touchscreen) a full access lock screen pane and provide input that causes device to be f...
Computerized methods, systems, and computer-storage media for establishing and managing a virtual network overlay ("overlay") are provided. The overlay spans between a data center and a private enterprise network and includes endpoints, of a service application, that reside in each location. The service-application ...
Architecture that provides Internet Protocol security (IPsec) certificate exchange based on certificate attributes. An IPsec endpoint can validate the security context of another IPsec endpoint certificate by referencing certificate attributes. By facilitating IPsec certificate exchange using certificate attributes ...
Computer readable media computer systems and computing devices method of facilitating presentation of actions and providers associated with entities. The method includes determining a query intent of a received query. Entity sets having an entity that matches the determined query intent are recognized. Each entity s...
Techniques for performing a process during a real time collaboration by multiple users or clients on a spreadsheet file are disclosed herein which may permit calculations to be performed locally by at least one of the clients. By doing so, increases in performance are realized since only data updates need to be prov...
A system for identifying attributes associated with content of an e-mail message and alerting a user includes a client device programmed to allow a user to create an e-mail message including at least one recipient and a message content, a server programmed to check an attribute of the e-mail message, and to send the...
A location related entity ranking technique is described that allows a user see the ranking of location related entities near a desired location in response to a query. The technique can leverage the searches performed by a community of mobile device users at a given location and at a given time to infer the locatio...
Concepts and technologies for creating and accessing room based computing environments are disclosed. Resources are categorized and/or bundled into categories or bundles of resources. Resources are associated with the room based computing environment and various data relating to the resources is stored including dat...
PERSONALIZABLE CARDS SHARED VIA A COMPUTERIZED CARD SERVICE
Systems and methods for sharing personalizable cards via a computerized card service are provided. One disclosed method includes, at a card client program executable on a computing device, creating a personalizable card having extensible data, and sendin...
Embodiments provide an architecture to enable composite, autonomous composite applications and services to be built and deployed. In addition, an infrastructure is provided to enable communication between and amongst distributed applications and services. In one or more embodiments, an example architecture includes ...
Techniques for adapting error control codes (ECCs) based on memory conditions in a channel. A wireless communication system may be adapted to detect and quantify memory in a channel, such as memory resulting from multipath fading, and adjust an ECC to reduce the possibility of errors impacting communication in the c...
A collaborative authoring application provides an authoring environment in which two or more users can edit a document concurrently. Each user edits a copy of the document, sends updates to a master copy of the document, and receives updates from the master copy of the document. The authoring environment generally i...
Displaying potential search-engine queries in a portion (e.g., a portion allocated for a web advertisement or within an inline frame) of a web page along with the content of the web page is described herein. The potential search-engine queries are determine by first analyzing either the underlying content of the web...
Systems and methods that optimize memory allocation in hierarchical and/or distributed iata storage. A memory management component facilitates a compact manner of dentifying approximately how often the memory chunk is being used, to promote efficient )peration of the system as a whole. Each memory location can be ch...
The present invention extends to methods, systems, and computer program products for configuring assurances within distributed messaging systems. A defined set of message log and cursor components are configurably activatable and deactivatable to compose a variety of different capture assurances, transfer assurances...
Adaptive filtering techniques are set forth that improve video playback performance. A color similarity metric is computed for source pixels undergoing an image transform operation to determine color values of a target pixel location. The value of the color similarity metric defines what algorithm is used to determi...
A profiling system provides customized, relevant, and targeted experience to customers of its clients throughout various touch points in an online marketplace. The profiling system utilizes gathered data on customers such as online marketplace behavior, subscriber information, usage, and the like to determine releva...
A conversation may be established using any supported type of communication modalities, including voice, video, desktop sharing, IM, application sharing , and the like. During the conversation, a user may transfer all or part of the modalities of the conversation at the same time to one or more destinations. The tra...
A battery receptacle system is provided to accept various types or sizes of batteries in different orientations. The battery receptacle system includes a first radial notch for positioning a first positive terminal of a first battery to electrically connect with the first positive contact at a first position, and a ...
Various embodiments related to infrared vision for a liquid crystal display (LCD) device are disclosed herein. For example, one disclosed embodiment provides a display system, comprising an LCD device and a display backlight configured to illuminate the LCD device by directing visible light toward an interior surfac...
Cloud computing platforms having computer-readable media that perform methods to manage virtual hard drives as blobs are provided. The cloud computing platform includes fabric computers and blob stores. The fabric computers execute virtual machines that implement one or more applications that access virtual hard dri...
A method for establishing a multimodal telephone call is provided. On a first computing device a telephone call is received from a second computing device. On the first computing device a response is sent to the second computing device that a telephony session is established between the first computing device and th...
A user interface that when selected triggers the automatic sharing of a spreadsheet object in a spreadsheet with a chosen network service (e.g. social network blog or some other network location). For example cells tables charts and other objects of the spreadsheet may be selected to be shared using the user interfa...
A process for controlling radio transmission and/or reception (2) to enforce certain constraints (4) with either single or multiple radio communication is disclosed. In one embodiment, the enforcement control may be by the corporate administrator (such as an Information Technology (IT) department) (9) that is respon...
Searching is assisted by recognizing a selection of text from a document as an indication that a user wishes to initiate a search based on the selected text. The user is provided with query suggestions based on the selected text and the query suggestions are ranked based on a context provided by the document. The us...
Described is a technology by which access to a resource is determined by evaluating a resource label of the resource against a user claim of an access request, according to policy decoupled from the resource. The resource may be a file, and the resource label may be obtained by classifying the file into classificati...
A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity. The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising s...
There is disclosed a multiple input multiple output (MIMO) antenna system comprising first and second folded or compacted loop antennas (12 121). The antennas each have a longitudinal extent and are mounted substantially parallel to each other on a dielectric substrate (3) having a conductive groundplane (31 32). ...
A method of batching multiple sets of responses on a server and sending the
responses to a client in a single batch (i.e., a “chained” or “packed” batch). The sets
of responses may be each be obfuscated and/or compressed. Once the batch is
received by the client, each set is processed individually. The client may...
Real time media optimization may be provided. First a remote session may be established with a remote computing device. Then during the remote session non real time media data may be exchanged with the remote computing device over a server path. Moreover real time media data may be exchanged with the remote computin...
A connection state system is described herein that allows a client to resume a connection with a server or a different replacement server by remotely storing client state information in association with a resume key. The system provides a resume key filter operating at the server that facilitates the storing of vola...
A method and apparatus for operating a mobile communication device in a sleep mode. The mobile communication device displays a time in an easily readable format at a low- light intensity, provides an alert to a user at an alarm time in a particular manner specified by the user, changes the buttons on the mobile comm...
Users are enabled to perform tasks such as creating new content, searching for items, communicating with other users through a simplified access interface, at the same time defining a location for the access interface. A user may begin typing at any location on a canvas. The system ranks possible outcomes, suggestin...
User-authored notes on shared documents may be provided. A shared document may be stored and at least one note may be associated with the document. When a user displays the document, the associated not may be retrieved and a user interface element may be provided to allow the user to view the note.
...
A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity. The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising s...
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that facilitate providing suggested sites in accordance with target sites are provided. Web-browsed data is locally stored on a user device and uploaded to a suggestion engine. Additional web-browsed data is communi...
Text messages are used to interact with objects in a spreadsheet. For example text messages may be used to enter/receive data in the spreadsheet. One or more text messages may be associated with a spreadsheet. Text messages may be associated with cells tables charts and other objects of the spreadsheet. When the spr...
Location information is integrated with spreadsheet formulas and operations. Location information may be used in filtering data detecting data sources performing calculations and the like. The data may be filtered by location individuals places and other location based information. The location information may be in...
Webpage domain monitoring is described. In an implementation, one or more web pages are obtained at a client, with each said web page including a plurality of content that is provided, respectively, via a plurality of domains. The plurality of domains that were used to provide the plurality of content is identified ...
Methods and systems of merging a first document with at least a second document to generate a third document. Each of the first and second documents includes at least one data unit. Each data unit is associated with a unit identifier and an edit identifier. The unit identifiers of each of the documents are compared ...
Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, e...
Techniques for grouping individual processors into assignment entities are discussed. Statically grouping processors may permit threads to be assigned on a group basis. In this manner, the burden of scheduling threads for processing may be minimized, while the processor within the assignment entity may be selected b...
Method and computer storage media for efficiently deploying an operating system are provided. A virtual hard drive file is received by a computing device. Upon receipt of the virtual hard drive file, the computing device is enhanced to expose and mount the virtual hard drive as a drive and boot option for the comput...
A wireless computer that pairs with a remote audio video presentation device such as a television. As a result of the pairing a communication channel is established for the computer to transmit audio video content for presentation through that device. Additionally as part of the pairing the computer and remote devic...
The present invention extends to methods systems and computer program products for decomposing and merging regular expressions. Embodiments of the invention decompose a regular expression into multiple simple keyword graphs merge those keyword graphs in a compact and efficient manner and produce a directed acyclic g...
A touch screen input device is provided which simulates a 3-state input device such as a mouse. One of these states is used to preview the effect of activating a graphical user interface element when the screen is touched. In this preview state touching a graphical user interface element on the screen with a finger ...
A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are c...
Embodiments described herein are directed to syndicating an online service to at least one syndication partner of a syndicator. In one embodiment, a computer system determines that a syndication relationship has been established between a syndicator and a syndication partner, where the syndication relationship is es...
A network address of a computing device is obtained and an unencrypted request is sent to a resource access manager of a particular network. If both a response is received from the resource access manager and the computing device has a network address within a desired range of network addresses then a determination ...
A computing device with a software defined radio. The software defined radio has an architecture with separate components to provide control functions and data processing functions. The control components configure the data processing components so that the software defined radio provides desired operating character...
Aspects of the subject matter described herein relate to maintaining consistency in a storage system. In aspects, one or more objects may be updated in the context of a transaction. In conjunction with updating the objects, logical copies of the objects may be obtained and modified. A request to write the updated lo...
Systems, methods and computer-readable storage media are disclosed for accelerating bitmap remoting by extracting non-grid tiles from source bitmaps. A server takes a source image, identifies possibly repetitive features, and tiles the image. For each tile that contains part of a possibly repetitive feature, the ser...
Architecture for communicating data values that enables visually impaired persons to perceive a non-image indicator corresponding to the data values. For example, an organized data set such as a chart or a graph can be displayed on a computer monitor or other user interface output component. A user employs a mouse o...
Quarantining data received while a computing device is locked. While the computing device is locked, content items such as images, notifications, voice memos, telephone numbers, and the like are stored in a first memory area. The content items are transferred to a second memory area, separate from the first memory a...
Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments client side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction and have those bounda...
A cloud computing monitoring system has an alert capturing system and a message transfer system that provides performance tracking and alert management to a local monitoring system. The alert capturing system may operate as part of a managed code framework and may capture and route alerts that may be transmitted to ...
The subject disclosure relates to systems and methods for intelligent code differencing employing code clone detection technology. A large complex source code change (e.g. moving and renaming functions across source files) may involve edits in multiple source files. As such developers and/or code reviewers may have ...
Systems methods and computer media for providing advertisement hints as well as keyword search query results graphical user interfaces are provided. A keyword search query area is capable of receiving a keyword search query from a user. At least one search result area displays an Internet web page link and correspon...
Concepts and technologies are described herein for supporting intelligent user interface interactions. Commands accepted by applications can be published or determined. Before or during access of the application the commands can be presented at clients to indicate commands available for interfacing with the applicat...
Techniques for an electronic montage system are described. An apparatus may comprise a logic device arranged to execute a montage application comprising an authoring component operative to provide a presentation surface having multiple presentation tiles receive control directives to associate content files with pre...
Architecture that employs multi-row entities to store solution components using columns, properties and logic that track solution components by storing different versions (states) of the component into multiple rows. Component modification includes adding and/or modifying multiple rows, thereby facilitating support ...
As described herein, a client system is automatically configured to access message objects in a plurality of mailboxes stored at a server system. The client system sends an autodiscover request to the server system. In response, the server system sends to the client system an autodiscover response that contains an a...
This document describes tools associated with soft keyboard control functions. In some implementations, the tools recognize a keyboard launch gesture on a touch sensitive screen and present a preview of a keyboard on the touch sensitive screen responsive to the launch gesture. The tools can also display the keyboard...
The claimed subject matter provides a system and/or a method that facilitates servicing a portion of a trade card via a web service. A web service can provide a portion of data to enhance a trade card, wherein the portion of data is at least one of a portion of trade card document-specific data, an intelligent gadge...
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical source computing machine to a physically different destination machine. For example, migration of TPM secrets allows migration of a virtual machine from one physi...
The claimed subject matter relates to an architecture that can facilitate advertising models in connection with pyramidal volumes of advertising space. In particular, a pixel at one plane of view of an image can be associated with four pixels at a lower plane of view and so on. Advertising rights with respect to the...
Various embodiments are described herein that relate to determining an intent of a user to initiate an action on an interactive display system. For example one disclosed embodiment provides a method of initiating an action on an interactive display device the interactive display device including a touch sensitive di...
Feature capabilities of conversation clients are conveyed to participants in a conversation such that real time decisions can be made and a common set of capabilities are selected to be used in the conversation. User interfaces of participating clients are then adjusted to reflect those capabilities. Further decisio...
A dual display mobile device comprises a first device with a first display and a second device with a second display. The mobile device can operate as a mobile cell phone. In a closed configuration of the mobile device, the first display is exposed and the second display is hidden. In an open configuration, both dis...
Systems, methods and computer-readable storage media are disclosed for offloading content retrieval and decoding in pluggable content-handling systems. This may be accomplished by the server sending the client a frame that comprises video as two parts - the un-decoded video data, and the rest of the frame. The clien...
A computing device configurable as a wireless network access point that can be controlled from multiple applications. The computing device provides an interface through which applications may input commands to change the state of the access point. The interface responds to these commands and other events, such as as...
Techniques to automatically syndicate content over a network are described. An apparatus may comprise a client computer having a processing system with a processor and computer-readable medium. The computer readable medium may store program instructions for a syndication manager component communicatively coupled to ...
User script code that is developed to be run in a host application, for example, as a macro can be transformed into debuggable code so that the host application may continue to operate during a debugging stop operation. Traceback methods can be created that call back into the host application to allow the host appli...
A virtual machine storage service can be use a unique network identifier and a SR-IOV compliant device can be used to transport I/O between a virtual machine and the virtual machine storage service. The virtual machine storage service can be offloaded to a child partition or migrated to another physical machine alon...
Technologies are described herein for creating and editing dynamic graphics via a World Wide Web ("Web") interface. A Web service is provided for generating dynamic graphics in response to requests received from client computers. In response to requests from client computers, the Web service generates requested dyna...
Techniques for presenting changing visual content, including video, animation and so on, as an overlay are discussed. Changing visual content, included in a visual presentation, may be identified from other visual elements included in the visual presentation. The changing visual content may be manipulated based on a...
Contents of a copy of a server file may be saved to a down load file, a base file, and a working file. An indication may be received from an application that the application has edited the working file and a copy of the edited working file may be saved to an upload file. A server computer may be queried to determine...
A request may be received to trigger an animation action in response to reaching a bookmark during playback of a media object. In response to the request, data is stored defining a new animation timeline configured to perform the animation action when playback of the media object reaches the bookmark. When the media...
Architecture that facilitates the attachment of multiple visualization types (e.g., charts) to the data of a grid and the presentation of the visualization next to the grid. The infrastructure allows each data view to be associated with a set of visualizations. These visualizations are rendered along with the grid (...
Use of scientific models to generate graphical virtual environments is described. In an embodiment at least two different scientific models are used. Input data which is representative of a real world environment is used by a first scientific model, such as a climate model, and data output by the first scientific mo...
Methods are provided for utilizing the achievement or the success a gamer has during online game play to unlock offers or coupons sponsored by an advertiser. The value of an offer or coupon may increase based upon the game-play-based achievement attained. By having the variable value, the gamer is incented to play m...
Techniques to manage and display related communications are described. A system may comprise a communication management tool (CMT) operative on a computer, the CMT comprising a threading component operative to associate a plurality of communications from a plurality of communication types with a conversation thread,...
A debugging pipeline may be developed to create a debugging experience for computer code operating in an execution environment, using a debugging tool outside of the execution environment. A producer can publish a debugging pipeline, configured to link the producer to a consumer (e.g., a debugging tool) by exposing ...
There is disclosed an antenna device made up of at least first second and third conductive metal plates arranged in a parallelepiped configuration. The third plate defines a lower plane and the first and second plates together define an upper plane substantially parallel to the lower plane. The first and second plat...
Tools and techniques for media portability and compatibility for different destination platforms are provided. These tools may receive commands to launch a media portability capability, and may receive source media as input for transformation. These tools may also receive indications of profile settings for specifyi...
Embodiments for providing differentiated access based on authentication input attributes are disclosed. In accordance with one embodiment, a method includes receiving an authentication input at an authentication authority using an authentication protocol. The authentication input being associated with a client. The ...
Embodiments of the present invention relate to systems and methods for configuring computing devices to join a peer group. A peer group may be created on a subnetwork by a computing device. When a new computing device enters the subnetwork, it may join the peer group and be given access to the shared resources on th...
A mobile device management system is provided. The mobile device management system may include a device management client configured to be executed on a mobile computing device. The device management client may include a client scheduler module configured to contact a device management server via a computer network ...
Data formatting rules to convert data from one form to another form are automatically determined based on a user s edits. A machine learning heuristic is applied to a user s edits to determine a data formatting rule that may be applied to data. For example a user may make edits that add/remove characters from data c...
System of evaluating security of script content. A processor executes computer- executable instructions for defining a policy for the script content in a web page. The script content provides interactions between a user and other content within the web page. The defined policy indicates an execution boundary of the ...
This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing device in a cryptographically secure manner without requiring the movable component to perform a complex cryptographic fun...
Systems, methods and computer readable media are disclosed for targeting a recommendation to a first user of an online multi-player gaming environment based on tracked data of a second user with which the first user has a relationship on the online multi-player gaming environment. In addition to the general system, ...
A presentation state is received from the presenting application. The presentation state may represent a current state of the local presentation. A request for the presentation state is received from the viewing application. In response to receiving the request for the presentation state, the presentation state is p...
Various embodiments related to the revealing of truncated content on a scrollable grid are disclosed. One disclosed embodiment provides a computing device comprising a display, a processor, and memory comprising instructions executable by the processor to display a cell of a grid of content at a first, smaller size ...
Described herein are embodiments for setting, managing, and monitoring connection policies for a plurality of network paths from a first endpoint to a second endpoint. In embodiments, a set of candidate addresses from a first endpoint and a set of candidate addresses from a second endpoint are received. Each candida...
Methods and computer-storage media are provided for rendering three-dimensional (3D) graphics by tessellating objects using novel structures and algorithms. Rendering utilizing "patches," configurable functions that include a specified number of control points, allows for computation on a per-patch or per-control-po...
Location of a communication network subscriber is determined employing confidence metrics such as remote vs. local computer usage primary user in a multi user computing environment likelihood of forgery and comparable ones. A fine grained location determination is then made based on the metric results and directory ...
Extensible architecture and data flow in a web based diagram visualization service is accomplished by enabling a diagram update engine to launch custom data modules. Data modules for data sources that are not inherently supported are created by third parties through a specially defined interface (e.g. .NET® assembli...
Embodiments are provided for selecting and utilizing multiple recognizers to process an utterance based on a markup language document. The markup language document and an utterance are received in a computing device. One or more recognizers are selected from among the multiple recognizers for returning a results set...
Determining and apportioning the environmental impacts of a data center provides useful business intelligence for data center consumers. In one embodiment, apportioned carbon footprints are determined by identifying a data center and an application, determining the carbon footprint of a data center, and apportioning...
A video encoder uses previously calculated motion information for inter frame coding to achieve faster computation speed for video compression. In a multi bit rate application, motion information produced by motion estimation for inter frame coding of a compressed video bit stream at one bit rate is passed on to a s...
Application settings are roamed across multiple computing devices. Provider modules on the computing devices are run to retrieve application settings to be roamed and to roam those application settings across the multiple computing devices. Application setting changes initiated on a particular computing device are a...
Various embodiments for software application verification are disclosed. Software application verification applies digital rights management to applications that run protected content on a playback device. In this way, protected content may be provided to approved applications and withheld from applications that hav...
Shared television sessions are described. In embodiment(s), television content can be received via a tuner of a tuner device. A shared television session can be established between rendering devices that share the tuner of the tuner device to receive the television content. A tuner configuration input can be receive...
The described implementations relate to energy-aware server management. One implementation involves an adaptive control unit configured to manage energy usage in a server farm by transitioning individual servers between active and inactive states while maintaining response times for the server farm at a predefined l...
Video sharing is described. In an embodiment, mobile video capture devices such as mobile telephones capture video streams of the same event. A video sharing system obtains contextual information about the video streams and uses that to form a video output from the streams, that output being for sharing by other ent...
Systems methods and computer storage media for generating contextual queries are provided. The system includes a search engine to receive user queries and contexts a query understanding component to generate a semantic representation of the query and a data source command generator to transform the semantic represen...
User generated targeted advertisements is described. In embodiments, a selection of an advertisement template for a targeted advertisement can be received when initiated by a user. Advertisement content to incorporate in the advertisement template can be received, as well as selections of recipients to receive the t...
This document describes tools capable of enabling a media device to assign available resources to media content prior to receiving a request to display that media content. In one embodiment, the tools determiner a next media content to be requested and available resources on a media device to display that next conte...
A mechanism for delegating trust to activate a target program from the vendor (or its intermediary) to a customer (or its intermediary) using an issuance license. The customer may then activate using their own authentication implementation. Also, a method for formulating an issuance license that permits such delegat...
Various embodiments related to a rear projection display screen configured to reduce an intensity of light at a viewing angle at which the light is less likely to be viewed by a user are disclosed. One disclosed embodiment provides a diffusing screen comprising a sheet-like structure transparent to one or more wavel...
A request is received for a rendered document corresponding to a document. The document is retrieved from a storage device. The document is transformed into the rendered document. One or more server font files associated with the rendered document are generated. The rendered document and the server font files are st...
A method is disclosed that includes assigning a service address to a service of a private network. The service of the private network is accessible, via a gateway, by a client computer. The method also includes turning off duplicate address detection at the gateway. The gateway is associated with a public network ad...
To increase command-access efficiency and to optimize a user"s available user interface work space, an improved user interface is provided for displaying logical groupings of selectable software functionality controls that are associated with one or more selected top-level functionalities. Upon selection of a top-le...
A user interface (UI) system calculates movements in a multi layer graphical user interface. The UI system receives user input corresponding to gestures on a touchscreen. The UI system calculates a movement of a first layer in a first direction (e.g. a horizontal direction) at a first movement rate. For example the ...
A user interface (UI) system calculates movements in a multi layer graphical user interface. The UI system receives user input corresponding to gestures on a touchscreen. The UI system calculates a movement of a first layer in a first direction (e.g. a horizontal direction) at a first movement rate. The UI system ca...
An extension point virtualization system uses operating system provided reparse points to provide minimal extension point registration. Reparse points preserve application isolation while removing the scale problem of writing custom extension point proxies for each extension point. Instead the system can use a singl...
Configuring a computing device to capture content, and distributing the content to one or more content destinations at a point of capture. The user select the content destinations from a list of destinations, or the content destinations are selected automatically based on previous user activities or selections. Conf...
Techniques to automatically identify participants for a multimedia conference event are described. An apparatus may comprise a content-based annotation component operative to receive a meeting invitee list for a multimedia conference event. The content-based annotation component may receive multiple input media stre...
Different incentives can be provided to a user for the user to take different routes. Information related to a user"s specific situation can be gathered and a reward can be associated with a route. A user can input an intended destination and different routes can be taken, where the routes have various characteristi...
Systems and methods that facilitate remote wake up are described that provide for efficient and transparent wake up of target hosts by remote hosts. In various embodiments, a separate address can be used by a target host for wake up network traffic, which is different from a regular address associated with a target ...
Architecture that facilitates the combining and presentation of location information with presence information in a communications system. The location information can be virtual location information published from a location source and/or associated location systems to a presence system. The presence system then ma...
Described herein are various techniques and principles for determining how to assign control of peripherals and assigning control of peripherals. In some embodiments determining how to assign control of peripherals comprises reviewing connections of peripherals to the computing device and evaluating rules to determi...
An anti-cheating system may comprise a combination of a modified environment, such as a modified operating system, in conjunction with a trusted external entity to verify that the modified environment is running on a particular device. The modified environment may be may be modified in a particular manner to create ...
A dynamic projected user interface includes a light source for generating a light beam and a spatial light modulator for receiving and dynamically modulating the light beam to create a plurality of display images that are respectively projected onto a plurality of keys in a keyboard. An optical arrangement is dispos...
A user"s online activity is tracked and offers associated with online advertisements presented to the user are identified. Information regarding these offers are provided to a payment service, which associates the information with an account for the user. When the user performs an activity using a payment card or ot...
[0049] Technologies are described herein for editing a document using a transitory editing surface. A word processing program displays a document in a window. Upon detection of the placement of an insertion pointer within a paragraph of text in the document, an editing surface is created overlaying the paragraph in ...
Embodiments of the virtual machine power metering system and method measure the power consumption of individual virtual machines. Power meter measurements for a physical host server are converted into individual virtual machine power meters that measure the power consumption of each individual virtual machine residi...
Embodiments provide navigable and other information to users. In an embodiment a handheld computing device can be configured to provide a navigable map that includes a number of map list items corresponding to aspects of an underlying data structure. In one embodiment a process includes displaying a number of linked...
Methods and apparatus for congestion control in computer networks achieve high burst tolerance low latency and high throughput with shallow buffered switches. A method for controlling congestion includes transmitting a set of data packets on a network connection from a first computing device to a second computing de...
Architecture that suppresses the unexpected appearance of words by applying appropriate restrictions to long-term and short-term memory. The quickness of adaptation is also realized by leveraging the restriction. The architecture includes a history component for processing user input history for conversion of a pho...
Some embodiments are directed to an information protection scheme in which devices users and domains in an information space may be grouped into zones. When information is transferred across a zone boundary information protection rules may be applied to determine whether the transfer should be permitted or blocked a...
A router module receives a client request. In response to receiving the request, the router module obtains the network address of a server module to fulfill the request. The router module then determines whether it is executing on the same physical computer as the server module. If the router module determines that ...
An approach is provided for generating composite media and delivering the composite media to a client application. Data is received from one or more external sources, and a portion of the data is selected to be used in the composite media according to the time period of delivery of the client application, user infor...
A mechanism is provided for enabling subscribers of an enhanced communication system to switch endpoints during a conversation add or remove modalities invite new participants while continuing the conversation seamlessly. Active endpoints associated with a participant in a conversation may publish their states to a ...
A data center includes a plurality of computing units that communicate with each other using wireless communication such as high frequency RF wireless communication. The data center may organize the computing units into groups (e.g. racks). In one implementation each group may form a three dimensional structure such...
Training data may be provided, the training data including pairs of source phrases and target phrases. The pairs may be used to train an intra-language statistical machine translation model, where the intra-language statistical machine translation model, when given an input phrase of text in the human language, can ...
Techniques are described to implement a user interface for a display of a mobile device. In an implementation, the user interface may include a chromeless menu configured to be displayed when menu-based user input to the mobile device is available; a system tray configured to be displayed on the display when a notic...
A cloud management system is described herein that provides the ability for an application to span two or more clouds while allowing operation management and troubleshooting of the distributed application as a single application. The system provides infrastructure that communicates across datacenters for execution a...
A user interface for portable storage devices is disclosed. The user interface includes an icon that is displayed as part of the portable storage device. The icon can provide storage information, and synchronization, backup, and file transfer animations. The following visual cues can be provided: indicating the amou...
Tools and techniques are described for web-based multiuser collaboration. These tools may provide methods that enable users to collaborate remotely on documents using respective browsers. These methods may send representations of portions of a given document to the browsers, and associate portions of the documents w...
Techniques are disclosed herein for controlling playback of digital media. In one aspect, while playback of the media content is progressing as normal a snapshot such as a thumbnail is displayed to show the user a representation of the media content that is associated with a seek location. In another aspect, the fun...
Architecture that enhances the visual experience of a slide presentation by animating slide content as "actors" in the same background "scene". This is provided by multi-layered transitions between slides, where a slide is first separated into "layers" (e.g., with a level of transparency). Each layer can then be tra...
A layout animation system is described herein that performs smooth transitions for properties of a layout, regardless of whether the layout properties are discrete or automatically calculated. Before a transition is executed, the layout animation system extracts and stores the positioning, sizing, and visibility of ...
Service initiation techniques are described. In at least one implementation, a computing device receives a selection of text that is displayed in a user interface by an application. Selection is detected of one of a plurality of services that are displayed in the user interface. Responsive to the detection, the sele...
A broker module of a computing device receives requests from an isolated application to access one or more items of an item source. In response to a request storage item objects representing items of the item source are generated and returned to the isolated application for each item of the item source that the isol...
Content may be collected annotated and propagated in a unified process. In one example a mobile device such as a smart phone is used to collect information. The information may be text video audio etc. The information may be sent to a reaction service which may return an annotation of the information. The annotation...
A touch sensitive computing system is provided, including a first touch sensitive display and a second touch sensitive display. The displays are operatively coupled with a processing subsystem, and with a memory subsystem which stores a plurality of content pages. User interface instructions are stored in the memory...
Advertisements are selected for presentation on a search results page based on the presence or absence of user activity within the search results page. When a search results page is provided to an end user the search results page is tracked for user activity. If user activity is detected a user context is identified...
Native IPv6 capabilities are provided to an IPv4 network node, device, or endpoint using a hardware interface that supports network communication under a Direct Access model. The Direct Access model supports IPv6 communication with IPsec and enforces Network Access Protection ("NAP") health requirement policies for ...
A smooth streaming system provides a stateless protocol between a client and server in which the server embeds incremental control information in media fragments. The server provides uniform media fragment responses to media fragment requests that are cacheable by existing Internet cache infrastructure. The smooth s...
Technologies are described herein for providing users of a messaging application with controls that perform one or more selected actions with a message. Any number of default custom action controls may be displayed in a gallery. The selection of a custom action control performs various actions to an active message. ...
In embodiments of HID over simple peripheral buses a peripheral sensor receives inputs from a peripheral device and the peripheral sensor implements an HID SPB interface to interface the peripheral device with a computing system via a simple peripheral bus (SPB) in an HID data format. The peripheral sensor can also ...
An integrated symbols user interface (UI) provides a collection of different symbols for inputting symbols into messages such as email message IM messages and SMS text messages. The integrated symbols UI may group symbols in a number of different category panes. Additionally the integrated symbols UI may provide a h...
A method and a system are provided for issuing a number of different types of time-based licenses associated with software products. The system may include an activation server, which may maintain licensing information in a licensing database, and a licensing platform, which may request issuance and renewal of time-...
In accordance with one or more aspects of the platform or user sensitive advertising, appropriate ads to be served for playback via a platform are identified based at least in part on one or more platform rules for the platform. The timing of when the appropriate ads are to be served can also be based at least in pa...
An exemplary data package for a network-based instant messaging system includes descriptive data about a user of the instant messaging system and data indicating a network location of a gadget to render the descriptive data, the location accessible by one or more other users of the instant messaging system. Various ...
System(s) and method(s) are provided to compensate an agent in exchange for the agent"s intent in transacting with a service platform. Compensation can be effected in online and offline domains, and intent can be conveyed online or offline. Compensation is funded through advertisement spending, and advertisement imp...
Multiple formulas are associated with a single cell of a spreadsheet. A base formula represents the actual value extracted from a data source. Adjustment formulas represent formulas for calculating adjustments to the value contained within the cell and other formulas can represent different calculation scenarios. Ea...
The management of applications in a computing environment often involves a significant number of computing operations, such as acquiring the application, deploying data objects in various locations, and configuring the application with respect to the deployed device. Conventional computing environments may provide i...
A social networking activity reporting system ("SNARS") and techniques notify a user of a client side electronic device about updates ("activity items " or "AIs") from the user s social network. A relevance formula including at least one time dependent portion and at least one time independent portion calculates a r...
Described is a technology in which video shots are clustered based upon the location at which the shots were captured. A global energy function is optimized, including a first term that computes clusters so as to be reasonably dense and well connected, to match the possible shots that are captured at a location, e.g...
The disclosure provides a system and method for managing and sequencing the transmission of digital content items from a network- accessible content service to a portable digital content device. The content service includes a cache management subsystem and provides storage for a plurality of playlists which are vari...
Systems methods and computer-readable storage media for identifying queries
having a version-intent and presenting search results in accordance with the version-intent are
provided. Subject-versions associated with retrievable documents are identified and associated
therewith as subject-version tags. When a sea...
Media and system are provided for customizing ads for delivery based on features in a web page. Text in a web page is evaluated to determine the sentiment of the web page. The sentiment can be based on the overall web page or on individual blocks of text within the web page. Based on the sentiment, an ad is created ...
HIGH-FIDELITY RENDERING OF DOCUMENTS IN VIEWER CLIENTS
Tools and techniques are described for high-fidelity rendering of documents in viewer clients. Methods provided by these tools and techniques may detect whether client systems have a plug-in installed for rendering high-fidelity content, in response to detectin...
Architecture for extracting document information from documents received as search results based on a query string, and computing an edit distance between the data string and the query string. The edit distance is employed in determining relevance of the document as part of result ranking by detecting near-matches o...
Embodiments of the invention relate to techniques for classifying received e mails and e mails to be sent. In some embodiments a set of e mail zones may be defined and e mails may be classified into one of the plurality of zones. An indication of the zone into which an e mail has been classified may be displayed in ...
Technologies pertaining to the creation of personalized data for an individual including personalized data based on a social networking participant s social networking data entity extraction and automatic collage generation are described herein. In one implementation the personalized data is used to provide a person...
The disclosed architecture allows markup language (e.g., HTML) pages to facilitate the insertion of content (e.g., text) into an application to which an input method is attached. In this way, a plug-in developer can implement any UI look and behavior using a web page language (e.g., HTML), communicate with a backend...
Architecture for a communication system providing a user experience that includes a conversation environment and a meeting embodiment in a single application. A navigation menu enables the user to select between multiple communications environments, including a conversations environment. Multiple conversation thread...
Technologies are described herein for inserting a multimedia file through a web-based desktop productivity application. A request for the multimedia file is received from a client computer over a network. A request for the multimedia file is transmitted to a server computer over the network. The request for the mult...
When viewing a document a user may switch between detailed reading of the document and glancing at the structure of the document in a single smooth flow of actions. In one example a document is shown with a navigation bar that has a thumb. Before the user clicks the thumb the document is shown at its current positio...
A virtual application may be configured with several extension points within a host operating system. The virtual application may be configured with a private namespace in which various components such as registry settings dynamic linked libraries and other components may reside. During configuration links may be pl...
Techniques and apparatuses for providing power-aware thread scheduling and dynamic use of processors are disclosed. In some aspects, a multi-core system is monitored to determine core activity. The core activity may be compared to a power policy that balances a power savings plan with a performance plan. One or more...
An online content system is provided, including a plurality of user accounts maintained at a network-accessible online service, where associated with each user account are a plurality of content items. A catalog service is operable to provide offline metadata for the plurality of user accounts, whereby, for the plur...
Various embodiments provide a standardized schema that can be used by site developers to define a site map and its associated hierarchy. In at least some embodiments, a corresponding user interface can be created within an application such as, for example, a Web browser, to allow the user to specify locations at whi...
Systems and methods are provided for the production of seamless, geo-referenced orthographic images that can comprise a composite of two or more underlying images. Illustratively, an exemplary image processing environment comprises an image processing engine and an instruction set comprising at least one instruction...
Embodiments of the present invention provide a schema to describe the structure of a data store that may be used to query the data store. The schema may include a property description describing static and contextual attributes of a property of the data store. The schema may also include a property reference describ...
A media interaction system is described herein that allows hosted applications to consume and/or produce rich media content independent of the format of the media content, while still maintaining the security of the host. The media interaction system accepts raw, uncompressed media data from a hosted application, an...
A document is simultaneously opened by different clients for a collaborative review of the document. Each of the clients may make comments to the document at the same while the document is also being edited. Comments made on the document by one client are automatically synchronized with the other clients that are si...
Examples are related to systems and methods for controlling access to document files on a document server. One example system includes document files stored on a document server, at least one of the document files referencing a file lock, and a document access processing module. The example document access processin...
The claimed subject matter provides systems and/or techniques that facilitate and/or effectuate efficient stream sharing for multi-user sensor data collection. The system includes mechanisms that locate within a query a specification that includes spatial regions over which data is required, based on the spatial reg...
Example systems, methods, and data structures are directed at synchronizing documents. One example data structure includes receiving a request from a first client to edit a document, and sending short-term check out metadata to the first client to begin an editing session. The data structure includes a plurality of ...
Coalescing schedules that use a resource to extend battery life. Each of the schedules is defined to execute at a recurrent activation time within a defined tolerance. After receiving notification of an event, the schedules are accessed to identify the schedules that may be executed early based on their activation t...
The present invention extends to methods, systems, and computer program products for synchronizing clocks in an asynchronous distributed system. Embodiments of the invention facilitate creation of a trustable and practical common time (time of day) reference across a set of peer nodes (observers), such as, for examp...
A flexible logging system is described herein that operates with a web server to provide activity logging in a way that is customizable to include a variety of data fields, can capture both client and server log information to a single location, and can provide data to an analysis engine directly to provide near rea...
Systems, methods and computer readable media are disclosed for manipulating virtual objects. A user may utilize a manipulated by the cursor controller, such as his hand, in physical space to associate with a cursor in a virtual environment. As the user manipulates the controller in physical space, this is captured b...
Architecture that includes a platform independent configuration driven presentation composition engine. The composition engine that allows dynamic generation of multiplatform user experience (UX) based on a data contract. By composition the user can select the parts interactions and constraints between the interacti...
Embodiments described provide web site design features and functionality, but are not so limited. In an embodiment, a computing system includes a design component that can be used to author rich web site templates. A user can use and modify aspects of a web site template as a model for a particular web site or other...
Data can be provided via devices based on levels of functionalities of the devices. In one example, a broker receives content from a data source and sends the content to devices in a network for presentation to a user. The devices may have different functionalities and the broker may modify the data content in accor...
Various embodiments of systems and methods to implement a context-based state change for an adaptive input device are provided. For example, a method is disclosed that may include receiving a state input indicating a change in a system state, changing adaptive input device data in response to the state input, the ad...
Embodiments related to mobile content delivery are disclosed. One disclosed embodiment provides a method of facilitating mobile content delivery on a mobile network. The method comprises receiving a purchase request from a network client at a mobile marketplace system; prompting the network client to provide a billi...
Tools and techniques are described for linking visual properties of charts to cells within tables. Methods provided by these tools enable users to select visual properties that are associated with graphical displays of chart data, and to link these visual properties to respective cells within the tables. User interf...
Data visualization platform optimization may be provided. Applications may
provide data values and request creation of a visualization from a data visualization
platform (DVP). The DVP may composite a plurality of geometry records associated with a subset of the visualization"s data values. The application may ren...
A user may select an attachment for an electronic message from a most recently used (MRU) list of files. For example when a user is composing an electronic message they may select a file to attach to the message from the MRU list. The recently used files that are included within the MRU list may be related to or mor...
Automatically summarizing electronic communication conversation threads is provided. Electronic mails text messages tasks questions and answers meeting requests calendar items and the like are processed via a combination of natural language processing and heuristics. For a given conversation thread for example an el...
Relationships between linked and/or embedded documents as well as documents sharing data source(s) are captured and rendered through virtual documents. Virtual documents are created representing linked / embedded documents and data sources associated with a relevant document. Relationships between real and virtual d...
Techniques relating to managing multimedia transmissions in terminal services scenarios are described. In an example, a method sends a user-interface component from a server to a remote client. The exemplary method further streams a media component for presentation on the remote client in combination with the user-i...
Various embodiments related to a multi-section light guide and computing devices comprising a plurality of wedge light guides are disclosed. For example, one disclosed embodiment comprises a multi-section light guide having a monolithic wedge-shaped body comprising a plurality of logical light guide sections. Each l...
Multi axis navigation techniques are described. In implementations a user interface is output by a computing device the user interface includes a first axis and a second axis that include parameters that are navigable via one or more gestures. One or more items are chosen by the computing device for concurrent displ...
[0062] Technologies are described herein for caching and exposing pre-send
data relating to the sender or recipient of an e-mail message. A mail client program is configured to cache recipient and configuration mail tips at a client computer. The configuration mail tips may be retrieved from a server computer and c...
In accordance with embodiments of the present invention, systems and methods for providing targeted advertising content to a user in an automobile based on location are provided. More specifically, a computing device within the automobile receives advertising content from endpoints at various locations. The advertis...
Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. ...
A system and method for deploying software from a central location to a plurality of remote install sites. The system includes a network-accessible server system and a plurality of computing devices. Based on delivery of a general application deliverable from the server system, a runtime-based application is install...
Systems methods and computer readable media for updating a component utilized by an application within a distributed computing environment. An inventory of components relied on by applications within a distributed computing environment is created and maintained to facilitate identifying applications utilizing a part...
Technologies are described herein for ranking visualization types. In order to rank the visualization types, visualization metadata is generated for each of the visualization types and data set metadata is generated for the data set. A suitability score is then computed based upon the visualization metadata and the ...
Example embodiments of the present disclosure are related to scrolling the view of a virtual desktop on a client. The client can be in communication with a server that has a display driver. The server can be configured to transmit signals indicative of images to the client and the client can be configured draw the i...
A media content programming, delivery, and consumption model is provided by which consumers can receive programming that is personalized to their tastes and interests and discover new media content that they will likely enjoy, without having to put in a lot of effort or needing to be technically adept. The received ...
A computing device includes instructions that, when executed by a processing unit, cause the processing unit to: create a business data catalog module that accesses and manipulates data residing on an internal data store and an external data store, wherein the business data catalog module receives a request for data...
Methods for measuring resonance of an ad with a user. Ads are delivered to a user during a commercial break of a program being delivered by a content provider. Each ad is associated with a unique identifier and at least one tag describing an attribute of the ad. Input from the user is received during presentation of...
In applications that display a representation of a user, it may be reasonable to insert a pre-canned animation rather than animating a user's captured motion. For example, in a tennis swing, the ball toss and take back in a serve could be a pre-canned animation, whereas the actual forward swing may be mapped from th...
Tools and techniques for migrating applications to compute clouds are described herein. A tool may be used to migrate any arbitrary application to a specific implementation of a compute cloud. The tool may use a library of migration rules apply the rules to a selected application and in the process generate migratio...
Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifier generated by th...
Notes and other input may be entered directly onto computer based content. The notes may be taken on a portable computing device that contains metadata from the computer based content. The metadata and input are stored and once the portable computing device is in communication with the second computing device displa...
Techniques for managing virtual ports are disclosed herein. Each such virtual port may have different associated features such as, for example, privileges, rights or options. When one or more users are in a capture scene of a gesture based system, the system may associate virtual ports with the users and maintain th...
Operating system states capture and loading technique embodiments are presented that involve the capture and loading of baseline system states. This is accomplished, in one embodiment, by storing the states of a computer's operating system memory that it is desired to restore at a future time. No changes are permitt...
An exception notification system is described herein that provides an early notification that a software exception has occurred before exception handling code has run. The exception notification system receives a registration request from program code to register a handler to receive an early notification when an ex...
A launching mechanism for context based menus is provided. A launcher indicator may be provided at a fixed or dynamic location on a user interface enabling a user to activate a context based menu through a variety of touch or gesture actions as well as keyboard mouse or similar device inputs directly related to the ...
In a composition model for large-scale extensible applications, applications are constructed in a modular fashion. The modules integrate with each other by producing and consuming functionality that conforms to a common definition. Producer moduks, and consumer modules are kept independent of one another, and are li...
A method for providing fault-tolerant network communications between a
plurality of nodes for an application, including providing a plurality of initial communications pathways over a plurality of networks coupled between the plurality of nodes, receiving a data packet on a sending node from the applicatfdh, -the s...
A computer participates in a system for licensing use in a metered fashion
using individual licenses cryptographically linked to the computer and a particular
I 2 £ service provider or underwriter. The computer may have a cryptographic Junft,?
secure memory, sanction and metering functions as part of a secure...
A processing unit for use in an electronic device includes standard instruction processing and communication interfaces and also includes functional capability in addition to or in place of those found in an operating system. A secure memory within the processing unit may contain a hardware identifier, policy data
...
Remoting a display. A method that may be practiced, for example, in a networked
computing environment including a local computer system running one or more applications and a remote computer that displays graphical information to a user for the one or more applications at the local computer system. The remote comp...
A computer adapted for pay-as-you go or other metered use has a policy for|
determined what measurements to take to detect fraud as well as steps to take when fraud is found. To optimize between good performance and sufficient tests to reduce the risk of fraud, a policy is developed based on observation of the user...
Type-ahead keypad input is described. In an embodiment, keypad inputs that
are entered as characters of a search term on a keypad of an input device, such as a television remote control, are received by a television-based client device. A user interface displays the keypad inputs as they are received, and displays ...
In a distributed computing system including at least one server and at least one client, the server simulates and executes a client-side script that generates the initial content of a Web page. Specifically, the server simulates a client-side execution environment to run the client-side script that generates the ini...
Supplementing the traditional means of exposing a server service through a URL that maps to a physical file with a special extension containing the service, a pseudo virtual path mapping directly to the service is provided to clients requesting the service. The pseudo virtual path includes a special token that ident...
A script application framework is provided to abstract common scripting patterns and to provide a structure for scripting. The script application framework encapsulates scripting logic into script components, manages lifetime of script objects, and builds relationships among different script objects. The script appl...
Implementations of the present invention relate to a communication framework that is readily adaptable to a wide variety of resources intended to be accessible through a firewall. In general, a communication framework at a gateway server can provide a specific connection to a requested resource in accordance with a ...
A port listening service operating in at system level is assigned to listen on a static port. The static port can index a plurality of unique IDs associated with a plurality of applications operating in a session level. The server application can then provide to a client the unique connection ID, the IP address of t...
In a distributed computing system containing multiple entities such as servers and clients, an object passed between the entities is attached with metadata identifying the type of the object and/or types and values of properties associated with the object. Before the object is passed to an entity in the distributed ...
Various embodiments permit policy updates, such as DRM policy
to be delivered and updated for a given piece of protected content. In at least some embodiments, various protocols can be extended to permit policy updates to be represented and carried by the protocol. In one embodiment, Hypertext Transport Protocol or...
Video editing and video playback utilizing a render-ahead queue for storing rendered video frames. The render-ahead queue facilitates the smooth playback of video in forward and reverse timeline direction, avoiding video glitches that occur when video frames are rendered at a rate that is less than the timeline rate...
A host computer system obtains a request for an aggregated view of content in a computer network corresponding to a criterion. The host computer system queries networked computer systems to identify data objects according to the criterion. Each responding computer system provides an identification set of specified d...
Architecture that provides the ability to intelligently page (slice) hierarchical datasets through viewing operations of a hierarchical view. This further provides the capability to make additions to/deletions from the hierarchy view and manage the parent/child relationship of view records without ever sending the e...
One or more transition images are displayed during a transition period between a display of slides within a presentation. The displayed transition images include images of different slides that are contained within the presentation. The transition images provide the audience with a glimpse of slides that are display...
This document describes tools capable of managing digital content based on a user"s identity. By so doing, the tools free people from the limitations of their storage media and devices. If a user"s CD breaks or hard drive fails, the tools permit a user to continuing accessing his content. If a user wants to use a ne...
A party associated with a digital license is identified from a digital license bound to a user's user ID. This digital license identifies a set of rights for a software product. A determination is made as to when an additional sale associated with the software license is made, and an indication that the party is rec...
Established multimodal conversations are enabled to be parked within an enhanced communication system such that a subscriber of the system can be notified through a variety of means and enabled to retrieve selected or all modalities for continuing the conversation. Different modalities may be parked together or sepa...
An authentication system combines device credential verification with user credential verification to provide a more robust authentication mechanism that is convenient to the user and effective across enterprise boundaries. In one implementation, user credential verification and device credential verification are co...
Platforms and techniques for defining, authorizing/authenticating, distributing, and presenting dynamic device experiences using a number of hierarchically-related, declarative language data structures, such as extensible markup language ("XML") elements or attributes. A dynamic device experience is presented when t...
ABSTRACT OF THE DISCLOSURE
MAPPING UNIVERSAL PLUG AND PLAY DISCOVERED ITEMS TO AN SMB
LOCATION
An arrangement is provided in which a Univeral Plug and Play (UPnP) device exposes a service for mapping a UPnP discovered content item to a server message block (SMB) location. The service is arranged to expose an SMB ...
System(s) and/or method(s) ("tools") are described that present content in a
user interface tailored to trait(s) of the content. The tools can analyze content to determine its traits, classify the content based on its traits, and present the content in a user interface tailored to the classification. The tools can ...
A system is disclosed for collaborative downloading that uses both the WLAN and the WWAN in combination, in an attempt to bridge the range-speed dichotomy. Devices in close vicinity band together their WWAN links, with the high-speed WLAN serving as the glue, to boost the effective wide-area bandwidth available to t...
A computer system having secured network services is presented. The computer system comprises a processor, a memory, and a network action processing module. The network action processing module processes network actions from one or more network services executing on the computer system. The computer system is furthe...
A security system is described which controls the access of applications to system resources in the field of interactive multimedia. The system establishes a framework for application security, including a signature system, and further provides file formats that support security. Signed applications are afforded hig...
Merging search results is required, for example, where an information retrieval system issues a query to multiple sources and obtains multiple results lists. In an embodiment a search engine at an Enterprise domain sends a query to the Enterprise search engine and also to a public Internet search engine. In embodime...
ABSTRACT
DATA PROCESSING OVER VERY LARGE DATABASES
A system that facilitates data processing includes a receiver component that receives an SQL query. A partitioning component partitions the SQL query into multiple tasks and provides the tasks to multiple cluster nodes for processing. The system enables very large...
Pre-populated search results in electronic program guide (EPG) data is described. In an embodiment, EPG data includes asset information which corresponds to a media content asset where a value is associated with a descriptor category to describe the media content asset, and a tag is associated with the value to pre-...
ABSTRACT
[0060] Methods are disclosed for controlling mobile computing devices such as laptops, PDAs and cellular telephones, based on their location. A mobile computing device may include a software-rendered map of defined geographic regions, location handlers for defining behavior of a mobile device in a given ge...
Indexing documents is performed using low priority I/O requests. This aspect can be implemented in systems having an operating system that supports at least two priority levels for I/O requests to its filing system. Low priority I/O requests can be used for accessing documents to be indexed. Low priority I/O request...
A computer-implemented method of providing security in a help system includes receiving a call from a calling application to access active content. A determination is made, based on predetermined criteria, which execution mode to use to access the active content. The active content is then accessed in the determined...
A hybrid positioning system for continuously and accurately determining a location of a mobile device is provided. Samples of GPS locations from a pool of mobile devices and accompanying cell tower data WLAN data or other comparable network signals are used to construct a dynamic map of particular regions. The dynam...
A scheduler in a process of a computer system allows an external execution context to execute on a processing resource allocated to the scheduler. The scheduler provides control of the processing resource to the external execution context. The scheduler registers for a notification of an exit event associated with t...
A membership interface provides procedure headings to add and remove elements of a data collection, without specifying the organizational structure of the data collection. A membership implementation associated with the membership interface provides thread-safe operations to implement the interface procedures. A blo...
For interlaced B-fields or interlaced B-frames, forward motion vectors are predicted by an encoder/decoder using forward motion vectors from a forward motion vector buffer, and backward motion vectors are predicted using backward motion vectors from a backward motion vector buffer. The resulting motion vectors are ...
User-defined agents and connectors are defined to process messages for a messaging application. The user-defined agents are configured to extend the capabilities of the messaging application. Each user-defined agent is associated with a connector that is configured to route messages for a particular address space ac...
This patent application relates to an agile network architecture that can be employed in data centers, among others. One implementation provides a virtual layer-2 network connecting machines of a layer-3 infrastructure.
FIG.1
Intuitive and user friendly user interface (UI) techniques are provided for navigating street view applications on a mobile device enabling users to view different angles and segments of available street level images. Additionally retrieval and presentation of street view images are managed to mitigate delays in ret...
Simulated high resolution multi view video based on video input from low resolution single direction cameras is provided. Video received from traffic cameras security cameras monitoring cameras and comparable ones is fused with patches from a database of pre captured images and/or temporally shifted video to create ...
To reconstitute a ghosted file for use, a single ghosting filter on a computing device locates ghosting information in the metadata of the ghosted file and locates within the ghosting information an identification of a particular ghosting manager of the computing device, where the identified ghosting manager is resp...
A platform supports an unmanaged secured workgroup, without a server, for common user access and secure resource sharing among the computers in the group. User accounts are synchronized by replicating and modifying the accounts at each computer of the unmanaged secured workgroup. A computer advertises a change in ac...
Example embodiments allow a local network client to access information about a shared gateway to determine its actual amount of bandwidth consumption. The client can also obtain the total capacity of such shared gateway. Using its knowledge of its own bandwidth consumption, it can determine the other local network c...
Smooth transitions between rich media (e.g., animations of visual elements of a UI) are provided when a "second" animation is started on a property of a visual element for which a "first" animation is already running. When the second animation is started, an animation system causes a current value of the property th...
ABSTRACT
In an electronic file system, preview information is provided to the user during a drag operation of a selected object onto a target object. The information indicates what type(s) of action is to be taken should the selected object be dropped onto the target object. The action(s) to be taken may depend upo...
In accordance with one or more aspects, a first device receives a digital certificate of a second device. The first device generates a digitally signed temporary domain join request and sends the request to a domain controller. The domain controller generates, for the first device, a temporary domain certificate all...
A program creation system is described which generates a data manipulation program based on input output examples. The created program may include a collection of subprograms together with a collection of corresponding selection conditions. When a new input item is received a program execution module uses the select...
A system for online collaboration includes an application for online collaboration the application including an application feature set a control module programmed to receive a request from a user to access a tenancy associated with the application on the system the tenancy including a site provisioned for a tenant ...
A method and a processing device may be provided for copying animation effects of a source object to one or more target objects of a presentation. The source object and the target objects may be included in presentation templates, or presentation slides of presentation files. The one or more target objects may be in...
Methods systems and computer-readable media for remotely submitting content to a website without navigating to the website are provided. The website is a content-sharing website that accepts public content submissions and makes the content available to multiple users. Initially a client application may download r...
Techniques are described for performing decryption using a key-specific decryption engine. A message including an encrypted data portion is received. The encrypted data portion is formed by performing a symmetric encryption operation using a symmetric key. The encrypted data portion is decrypted using a key-specific...
Limited devices have memories that are typically too small to store a complete font having an extended character set. The ability to handle necessary characters can be provided by leveraging connectivity of a limited device to a PC or server without requiring significant bandwidth or substantially reducing performan...
Previously, Poisson blending has been used for image blending including cloning an object onto a target background and blending pairs of source images together. Such Poisson blending works well in many situations. However, whilst this method is always workable, we have found that discolorations sometimes occur. We r...
An virtual character such as an on-screen object, an avatar, an on-screen character, or the like may be animated using a live motion of a user and a pre-recorded motion. For example, a live motion of a user may be captured and a pre-recorded motion such as a pre recorded artist generated motion, a pre-recorded motio...
Systems, methods and computer readable media are disclosed for gesture shortcuts. A user's movement or body position is captured by a capture device of a system, and is used as input to control the system. For a system-recognized gesture, there may be a full version of the gesture and a shortcut of the gesture. Wher...
A method and system are disclosed in which a group of people are able to replicate the physical world experience of going with a group of friends to pick a movie, watch the movie together, and provide commentary on the movie itself in the virtual world on a virtual couch while each user is sitting in different physi...
An object set may be redundantly stored by a set of computers, each configured to store a local representation of corresponding objects. When a computer changes the object set (e.g., by adding or altering an object), the updated object may be synchronized across the computers by iteratively forming and using an ad h...
Embodiments are provided for utilizing server pre-processing to deploy static renditions of electronic documents in a computer network. An electronic document may be published from a client computer to a first server computer in the computer network. During publication, the first server computer may create a static ...
Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more embodiments client side code can be utilized to allow developers associated with a website to define boundaries associated with user interaction and have those bounda...
Aspects of the subject matter described herein relate to checkpoints for a file system. In aspects updates to the file system are organized into checkpoint buckets. When a checkpoint is desired subsequent updates are directed to another checkpoint bucket. After global tables have been updated for updates in the curr...
A method and system are disclosed in which a group of people are able to replicate the physical world experience of going with a group of friends to pick a movie, watch the movie together, and provide commentary on the movie itself in the virtual world on a virtual couch while each user is sitting in different physi...
A presentation state that includes a presentation and other information is synchronized between one or more client computers executing a presentation client application. A client computer executing the presentation client application receives the presentation state including the presentation and is assigned a role. ...
User feedback such as "crowd sourcing" is utilized for supplementing and correcting augmented location information like augmented maps and/or street view images. User feedback on missing or incorrect information is elicited through "treasure hunt" style augmented reality games monetary or similar rewards and compara...
The present invention is directed to personalizing an advertisement. In an exemplary embodiment ad rendering instructions are received that when executed prompt retrieval of user specific information (e.g. profile images birthdays anniversaries etc.) of a user. The user specific information might be retrieved from a...
A quantization factor is determined using information from a histogram of transform coefficients that are produced from a transformed video frame. The histogram is used in estimating an encoded frame size of the video frame that is currently in the process of being encoded. The quantization factor used in the quanti...
Systems and methods for providing search results to a mobile computing device are provided herein. One exemplary method includes receiving a search request from the mobile computing device, where the search request includes location data identifying a location of the mobile computing device. If the search request in...
The present invention provides a user interface for providing press-to-talk-interaction via utilization of a touch-anywhere-to-speak module on a mobile computing device. Upon receiving an indication of a touch anywhere on the screen of a touch screen interface, the touch-anywhere-to-speak module activates the listen...
[0057] A search index structure which extends a typical composite index by incorporating an index which is optimized for fast retrieval from storage and which eliminates data which is specific to phrase searching. Other data is represented in a manner which allows it to be calculated rather than stored. Associating ...
A virtual environment can be configured to coordinate life cycles of virtual machines and application programs executing therein. In one implementation, the virtual environment includes an application layer and a virtual machine layer. The application layer communicates with the virtual machine layer to coordinate a...
A receipt store may be provided as a service. Electronic payment receipts generated in any type of transaction may be delivered to the receipt store. A customer may subscribe to a particular receipt store, to be used as a repository for that customer"s receipts. The customer may carry a device that is used to commun...
[00101] A system for commoditizing data center networking is disclosed. The system includes an interconnection topology for a data center having a plurality of servers and a plurality of nodes of a network in the data center through which data packets may be routed. The system uses a routing scheme where the routing...
The claimed subject matter provides a system and/or a method that facilitates capturing a portion 2-dimensional (2D) data for implementation within a 3-dimentional (3D) virtual environment. A device that can capture one or more 2D images, wherein the 2D image is representative of a corporeal object from a perspectiv...
ABSTRACT VIRTUAL CONTROLLER FOR VISUAL DISPLAYS
Virtual controllers for visual displays are described. In one implementation, a camera captures an image of hands against a background. The image is segmented into hand areas and background areas. Various hand and finger gestures isolate parts of the background into i...
Various techniques and tools for coding and decoding interlaced video are described, including (1) hybrid motion vector prediction for interlaced forward-predicted fields, (2) using motion vector block patterns, (3) selecting between dominant and non-dominant polarities for motion vector predictors, (4) joint coding...
ABSTRACT
MANAGING ASSOCIATIONS IN AD HOC NETWORKS
A first wireless devices establishes an association with a second wireless device by sending a connection request packet to a previously-discovered second wireless device. The second wireless device identifies the received packet as a connection request and respond...
A system, method, and data structure for testing packages are described. Tests may be combined into testing packages at testing packages user interface (301) to make testing of computer systems easier for developers. Testing packages may be sets of one or more testing procedures that may be applied to computer syste...
Embodiments are provided for synchronizing file partitions utilizing a server storage model in a client-server computer network. Edits to content of an electronic document may be received at a client computer. The content may be included in a first partition of a file stored on a server computer. The first partition...
Various embodiments provide techniques for scrubbing variable paths in content. By way of example and not limitation, scrubbing can include receiving user input that defines a scrub path and navigating a data path through content based on the scrub path. According to some embodiments, a data path can include one or ...
Architecture that employs an overall grammar as a set of context-specific grammars for recognition of an input, each responsible for a specific context, such as subtask category, geographic region, etc. The grammars together cover the entire domain. Moreover, multiple recognitions can be run in parallel against the ...
Aspects are introduced for indexing files and file references within a file container (e.g., a list file, zip file, cabinet file, and so forth). An intelligent protocol handler is created for accessing file containers and selectively indexing their contents in order to prevent duplicate entries of files in search re...
Mechanisms and techniques for database fragment cloning and management are provided. A database object, such as a table, rowset or index, is divided into fragments. Each fragment is cloned to create cloned fragments, which operationally are substantially identical to one another. One or more of the cloned fragments ...
Systems methods and computer storage media having computer executable instructions embodied thereon that present images customized for a user. In embodiments a search query input by a user and user data associated with the user are referenced. The search query and/or user data is utilized to select one or more image...
A display screen magnifier is controllable by a user to magnify selected portions of a desktop including windows open on the screen. A moveable magnifier frame is provided, within which a magnified image is presented. The magnified image corresponds to screen content located within a magnification region underlying ...
A request is received from a software component of a software product to access a value of a public setting of the software component. A check is made as to whether the request conforms to an appropriate format for the public setting. If the request conforms to the appropriate format, then the requested access is pe...
Architecture that facilitates the conveyance of a trust level when the caller makes a call, the trust level in dependence on the state of the caller system. The callee (call recipient) receives notification of the trust level and can use this information in the communication such as to request verification from the ...
Embodiments of the invention provide a method, system, and media for presenting advertisements (or other information) based on user interaction with web page. One embodiment of the method includes determining that programmatic code that describes the web page is to be dynamically modified before it is presented on a...
An avatar along with its accessories, emotes, and animations may be system provided and omnipresent. In this manner, the avatar and its accessories, emotes, and animations may be available across multiple environments provided or exposed by multiple avatar computing applications, such as computer games, chats, forum...
Technologies are described herein for improving a user experience during the rendering, or repainting, of a graphical interface. A user interface related transaction can be initiated in response to a requested user operation. One or more windows associated with the requested operation can be identified. User interfa...
The described method and system enables a client at a branch office to retrieve data from a local hosted cache instead of an application server over a WAN to improve latency and reduce overall WAN traffic. A server at the data center may be adapted to provide either a list of hashes or the requested data based on wh...
Techniques to provide geo targeted advertising are described. A technique may include displaying a map to an advertiser at a first zoom level. The advertiser may stay at the first zoom level or change to a second zoom level. The advertiser may also create a user defined area of the map. The advertiser may select an ...
Embodiments provide application and/or resource access control features of an online computing environment but are not so limited. In an embodiment a computer implemented method provides access control features for an online application environment based in part on the use of a number of directory service instances ...
Described is a technology by which private content maintained behind a firewall (e.g., in a "mesh") may be searched, browsed, and accessed via an index that exists outside of the firewall. Searching of the index may include checking permissions of a user against permissions associated with metadata in the index, e.g...
The present invention extends to methods systems and computer program products for end to end optimization of data storage and transmission of data. Details of how data is stored within a data store are exposed to clients and applications. Clients and applications are enabled to makes requests to data stores to obta...
A computing system includes one or more input device user interface runtime applications to dynamically display images on a dynamic input device. The one or more input device user interface runtime applications are executed in a currently active desktop. The computing system further includes a dominant application c...
Computer-readable media, computerized methods, and computer systems for intuitively surfacing a teaching animation that demonstrates a manual gesture recognized by a writing-pad tool are provided. Initially, the writing-pad tool is interrogated to determine a context of a computing environment associated with a touc...
Font animation technique embodiments are presented which animate alpha-numeric characters of a message or document. In one general embodiment this is accomplished by the sender transmitting parametric information and animation instructions pertaining to the display of characters found in the message or document to a...
Technologies are described herein for providing multi-modal communication through modal-specific interfaces. In one method, a communication in a first modality is received from a first interface across a computer network. The communication is converted into a second modality. Upon converting the communication into t...
A layer of abstraction for use by access control lists is provided for the creation and maintenance of user permissions on computer resources. First, a set of permissions can be associated with any number of computer resources. Also, computer resources can store references to any number of sets of permissions, and w...
A media asset recommendation service is described. In embodiments, friends of a user are identified in a social graph that is associated with the user, and interactions with media assets by the friends of the user are compiled. Friend interaction data for each of the media assets can be determined from the media ass...
Point of origin information for image data may be inaccurately registered against a geographic location absolute. A process for aligning image and highly accurate model data adjusts a point of origin of the image data by matching elements in the image with corresponding elements of the model. In a street-level image...
In a transient storage device (TSD) (100) with multiple authentication silos (302, 304, 406, 308, 310), a host computing device connected to the TSD (100) is configured by the TSD (100) to discover and act upon various types of authentication information in the silos. One or more logical combinations of authenticati...
A system is presented for structured coauthoring of a document, the system comprising a server. The server includes one or more documents organized into sections, a document permissions module that stores user access permissions for each section of a document, a document update processing module that processes reque...
Methods, systems, and computer-readable media for reconstruction a three-dimensional scene from a collection of two-dimensional images are provided. A computerized reconstruction system executes computer vision algorithms on the collection of two-dimensional images to identify candidate planes that are used to model...
Described is a user interface that displays a representation of a stereo scene, and includes interactive mechanisms for changing parameter values that determine the perceived appearance of that scene. The scene is modeled as if viewed from above, including a representation of a viewer's eyes, a representation of a v...
ABSTRACT OF THE DISCLOSURE ENVIRONMENT STATE CHANGES TO ALTER FUNCTIONALITY
In an embodiment, environmental functionality of the system software may be changed by altering guarded system data which may affect behavior of the system software. A user may provide state change information for altering a state of the sy...
A block transform-based digital media codec more efficiently encodes transform coefficients by jointly-coding non-zero coefficients along with succeeding runs of zero-value coefficients. When a non-zero coefficient is the last in its block, a last indicator is substituted for the run value in the symbol for that coe...
Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key...
Providing non-voice capabilities relating to a phone call at a computing device includes receiving a request to begin a telephone call from a first telephone to a second telephone, wherein the requesting is performed using messaging between computing devices connected via a computer network, and wherein the messagin...
Embodiments herein change the way item syncing is handled and tracked between two devices. Changes to items are tracked in accordance with well defined property groups and each group is tracked independently of the other. For example, one group could contain large data items, e.g., attachments, while another group c...
Methods of providing a document relevance score to a document on a network are disclosed. Computer readable medium having stored thereon computer-executable instructions for performing a method of providing a document relevance score to a document on a network are also disclosed. Further, computing systems containin...
Table styles provide a way to format an entire spreadsheet table quickly and easily. According to described implementations, table styles can be created and customized for repeated use in a spreadsheet application. As a result, a user does not have to manually modify multiple formatting options for each table includ...
In accordance with one or more aspects, different pages of a digital book are displayed in each of two display areas of a device using a book display model. In response to a request to semantically zoom out, the digital book is displayed in a broader context, the broader context using a context display model rather ...
Synchronized distributed media assets is described. In embodiments, a global media catalog of global metadata is maintained for media assets that are accessible by client devices registered to a user. The global metadata corresponds to the media assets that are located remotely from one or more of the client devices...
A social graph playlist service is described. In embodiments, a social graph that associates a user and friends of the user is maintained. The social graph is based on parameters that define a social relationship between the user and the friends of the user. Interaction data that identifies recently played media ass...
An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storag...
Visualization frameworks may include solvers. The solvers may be used to determine the properties of view components of view compositions. In some instances, the solvers may be explicitly composed using a relational structure, such as a dependency tree. In some instances, the solvers may be implicitly composed based...
Logic and state information suitable for execution on a programmable hardware device may be generated from a task, such as evaluating a regular expression against a corpus. Hardware capacity requirements of the logic and state information on the programmable hardware device may be estimated. Once estimated, a plural...
A block transform-based digital media codec more efficiently encodes wide dynamic range transform coefficients in two parts: a normalized coefficient and bin address. The normalized coefficient relates to a grouping of coefficient values of the wide dynamic range into bins, whereas the bin address is an index of the...
A block transform-based digital media codec uses a transform coefficient prediction that takes into account a dominant directionality of the digital media data (e.g., an image with strong horizontal or vertical features), and further operates compatibly with a two-stage transform. For DC and DCAC coefficients from a...
An online media content service is adapted for use with a personal media player (125) to provide targeted media content (131) to the player (125) on a rental basis and is architected to enable users to access music using new models. The targeted media content (131) includes content that has special context or meanin...
Mechanisms for automatically generating code that tests capabilities of a test computing system to simulate a message exchange pattern. The code generation computing system uses a message exchange pattern definition to generate the simulation code. For each state in which the message exchange pattern definition allo...
The present invention provides for a channel model capable of generating a runtime communication channel with pluggable modular channel components. These channel components implement one of a set of standard interfaces that allow processing details of communication semantics between components to be represented in a...
Methods, systems, and computer products are provided for exposing the programming of an application user interface to allow modification of the associated user interface to include adding, removing, disabling, enabling and repurposing new or existing user interface components.
ABSTRACT
DKVICK TO PC AUTHENTICATION FOR REAL IIMK
CO M MU NIC AITONS
A mcfhod tor securely pairing an II' phone uitil a compuling device during VoIP conimuniealion on an fP ncnvork comprising a plurality of IP phoncs and computing devices is disclosed. The method pairs an IP phone with a computing deviee. the IP...
The transfer of raw data from a source data structure to a target data structure that represent the same item. During the data transfer, if there is a given field in the target data structure that does not correspond to a field supplied by the source data structure, the transfer mechanism determines whether or not i...
Described are security critical data containers for platform code, comprising a Get container and Set container that allow data to be marked as security critical for critical usage of that data, but left unmarked for non-critical usage. The number of critical methods in the code is reduced, facilitating better code ...
The present invention extends to mapping between object oriented and service oriented representations of a distributed application. A computer system accesses an annotated object oriented representation of a service, which is annotated with service description attributes mapping included objects to corresponding ser...
Strategies are described for performing retry analysis in an environment which involves the transmission of media information from a source module to a target module. In the context of the source module, the retry analysis determines whether the source module should satisfy the retry requests issued by the target mo...
A mixed-media service collection for multimedia platforms allows simultaneous access to various mixed-media services for rendering multimedia content, depending on current client conditions. In one implementation, in response to the client accessing a service collection, for example, by changing channels, only some ...
The present invention provides for an automated, user friendly way of constructing and using a binding object. A developer is presenting and selects binding elements that will ultimately be used to create a runtime communication channel for transporting a message between a client and service endpoint. After receivin...
The present invention extends utilizing abstract descriptions to generate, exchange, and configure service and client runtimes. A computer system parses compiled code and potentially optional configuration information for implementing a service and converts the compiled code and any configuration information into an...
A social networking service is integrated with a traditional communication service. The communication service may include an instant messaging service, an electronic mail service, a content page management service, or other communication service. The communication service provides one or more interfaces allowing a u...
Preserving session state correlation in a distributed computing environment in which a service module instance receives messages from a general input buffer. The general input buffer is not accessed by a service module instance one the service module instance is determined to be recycled. After the service module in...
An efficient technique is disclosed for determining a portion of a document corresponding to a captured image. When a user employs a pen to create a stroke in a document, images of the document are captured by a camera mounted on the pen. While the location of some of the images will be determined from, for example,...
A system for presenting a visual representation of a computing system is disclosed. The system comprises a matching engine that accesses a data store of patterns that can be used as composable design elements to map components of a computing system to a pattern. The system further comprises a visualizer that present...
An improved system and method for a context-awareness that may be used to adapt an execution environment is provided. A framework with interfaces for setting, tracking, and getting context information about the execution environment of a computer system includes a context engine and a unified data store for ag...
A system and method for controlling a stylus-based computer based on the location of a stylus is described. In some aspects, removing a stylus from storage may turn on the computer system. In other aspects, power consumed by a digitizer may be modified in accordance with the location of a stylus.
...
A method of efficently setting posterior probility parameters for a switching state space model begins by defining a window containing at least two but fewer than all of the framess. A separate posterior probability parameter is determined for each frame in the window. The window is then shifted sequentially from le...
One or more models of memorability are provided that facilitate various computer-based applications including those centering on the storage,retrieval,and processing of information, applications that remind people about items they risk not recalling or overlooking,and facilitating communications of reminders.In one ...
A computer-readable medium having a data structure for storing document data in a serialized binary format so that the document data is accessible to other applications. A document structure is generated that includes root node data. The document is stored in a serial binary data format. The serial binary forma...
Detection of code-free files is described. According to one implementation, an input file is parsed to recognize a file format. Contents of the input file are checked according to the recognized file format, if available, in an effort to determine whether executable code might exist within the input file. A status i...
Embodiments of the present invention relate to methods, systems, and computer-readable media for providing software applications to a mobile device. A server receives a request for an application identified in an application catalog stored on the server. A push message is generated based on the request for the appli...
A computer-implemented speech recognition system comprising:
a microphone to receive user speech;
a speech recognition engine coupled to the microphone, and being adapted to recongnize the user speech adn provide a textual output on a user interface; and wherein the system is adapted to recognize a user changing t...
A documents indexing system utilizes two indexes. An infrequent word index is maintained separately from a frequent word index to map the locations of words that occur infrequently in the indexed documents. The infrequent word index may be stored and partitioned differently than the frequent word index to promote ef...
A system for document retrieval and/or indexing comprising:
a component that recieves a captured image of at least a porton of a physical document; and
a search component that locates a match to the document, the search is performed over word-level topological properties of generated images, the generated images b...
Mechanisms in which upon receiving a message, the message is passed through one or more receiving path components that are positioned in the receiving path of the message prior to being passed to a dispatching component. One more of the receiving path components may modify the message to include information that may...
A computerized interface for data presentation, comprising:
a sorting component to determine categories relating to one or more items for display; and
a cluster component that groups the categories according to discretized states in order to control visible output to the display.
A method and system are provided for projection a three dimensional image. A projection system may include a holding tank for storing a reservoir containing a projection medium and a projector including a plurality of valves for projecting the medium from the holding tank. The projection system may also include an i...
A process and apparatus for determining the location of a captured array from a larger image is described. A non-repeating sequence may beb folded into a non-repeating array in which the array is unique for every neighboring window of a given size. A portion of the array of the neighboring window may be captured and...
A method and system for initiating a communications session with a restriction is provided. A communications system allows a user to place a restriction on a session to be conducted with another user. If the other user does not agree to the restriction or if the other user's system does not support the restriction, ...
Embodiments of the present invention relate to methods, systems, and computer-readable media for mobile device messaging. Mobile device messaging comprises collecting from an originating system information including content data to be sent to the mobile device. One or more short messages are generating for encapsula...
The present invention provides a method and system for finding and accessing a contact quickly and easily by filtering and searching through all of the sontacts stored in the device based on user input. The filtered contacts may be readily accessed by various applications that use the contact information. When filte...
The present invention provides a method and system of pinning adn displaying pinned items. Pinned items are displayed such that they are visually distinguishable and prioritized higher than related non-pinned items. For examle, pinned contacts are displyed at the top of the contact list and are visually distinguisha...
A speech processing system adapted to receive an input related to one of speech and text and process the input to provide an output related to one of speech and text, the speech processing system accessing a module derived from a phone set having a plurality of phones for a tonal language, the phones being used to m...
A method for power management of a network including a plurality of computing devices, comprising:
identifying an order of flows between one or more computing devices within a prescribed time period; and
reducing a number of wakeups for at least one computing device by increasing a number of adjacent flows that s...
A computer implemented method of suggesting tasks to a user based upon their graphical user interface (GUI) browsing behavior is provided. In the method, a GUI element is selected or identified based upon the user's browsing behavior, for example based upon the user hovering a pointer over the GUI element. Base...
A method for populating a list of GAL contacts on a device, comprising: automatically selecting global address list (GAL) conacts for a user that are unique from the user"s personal conacts;
preparing the GAL contacts; and
providing the GAL contacts to a device.
A computer-implemented method for user interface testing, comprising:
taking a first snapshot recording pixels presenting a user interface on a target device during a first automation execution;
taking a second snapshot recording pixels presenting the user interface on the target device during a second automation ...
Managing applications associated with an operating system. An application object is defined as a primitive of the operating system. An identity property of the application object identifies at least one application associated with the operating system and a metadata property of the application object declares...
A method for facilitating a search for content from disparate resources, the method comprising:
displaying a unified search entry interface in response to a request to search for content;
determining at least one relevant resource from a plurality of disparate resources in which to search for occurrences of a sear...
A database security system, comprising:
a component that employs a structure query language (SQL) to cluster one or more sets of data set rows with similar security characteristics and treat the clustered rows as a named expression.
Techniques are disclosed for controlling the behavior of a data entry user interface, such as a data input panel, based upon the status of an insertion location. For example, both the position and content of a data input panel are provided based upon the detected characteristics of the insertion location. Further, a...
A system and method for masking dynamic regions of a user interface that assist in testing of the static user interface layout. The masking regions are used to eliminate the regions of the user interface layout that are expected to change during a verification process. The present invention allows a user to add mask...
A method and system for automatically determining the differences in a mobile device user interface throughout a development cycle. A test automation is run to exercise a target device"s user interface. While the user interface is exercised, an extension is activated that takes snapshots of hte user interface output...
Determininstic rule-based dispatch of the data structure to a group of one or more methods. After accessing the data structure to be processed, a lis of rules is evaluated to identify multiple rules that apply to the dispatch of the data structure. Each of these multiple rules specifies a different group of one or m...
A system for summarizing audio information, comprising:
an analyzer to convert audio into frames
a fingerprinting componentto convert the frames into fingerprints, each fingerprint based in part on a plurality of frames;
a similarity detector to compute similarities between fingerprints;
a heuristicmodule to ge...
A method and apparatus are provided for visually emphasizing all of the numerical data contained in an electronic document. A determination is made as to whether a request to emphasize all of the numerical data in the electronic document has been received. If such a request is received, all of the numerical data wit...
An invention is disclosed whereby a wireless network node, equipped with two or more radio transceivers statically tuned to non-interfering frequency channels, can make decisions regarding which channel to use when communicating with a neighboring wireless node. A multi-radio unification protocol implemented in a wi...
An application includes a plurality of features. A transaction is engaged with a retailer to obtain a product license corresponding to the application. The product license defines at least one feature of the application that may be employed. A base copy of the application is obtained from a distributor and is actuat...
The user interfaces, methods and systems described herein facilitate user interaction with an ad space by conveying additional advertising content via a preview pane and facilitate charging for this functionality. By way of example, a user is provided with one or more ads from a plurality of different advertisers in...
ABSTRACT
SECURITY LANGUAGE TRANSLATIONS
WITH LOGIC RESOLUTION
Security language constructs may be translated into logic language constructs and vice versa. Logic resolution may be effected using, for example, the logic language constructs. In an example implementation, translation of a security language assertion...
Techniques for processing handwriting input based upon a user's writing style. Some techniques employ the style in which the user writes a single character, while other techniques alternately or additionally employ a group of allographs that form a handwriting style. Some implementations of these techniques, such as...
ABSTRACT DISTRIBUTED HARDWARE STATE MANAGEMENT IN VIRTUAL MACHINES
Mechanisms are disclosed herein that manage operations in virtual machine environments. A first partition can have a proxy driver object corresponding to a driver object in a second partition. The driver object can control a physical device, but bec...
In an electronic document such as a map, an entity lookup system associates primitive data with entity data though parallel or corresponding grids of a primitive quadtree and an entity quad-tree. A key is assigned to grids in the primitive quad-tree in association to particular grids in the entity quad-tree.
...
ABSTRACT DIFFERENCE ANALYSIS FOR ELECTRONIC DATA INTERCHANGE (EDI)
DATA DICTIONARY
A tree based EDI data dictionary difference analysis tool is provided that performs an analysis of tree structures of EDI building blocks that compose EDI schema to determine and display change histories for particular versions, or ...
The user interfaces, methods and systems described herein facilitate user interaction with an ad space by conveying additional advertising content via a preview pane and facilitate automatically generating the content of the preview pane. By way of example, an electronic advertisement is conveyed to a user in an ad ...
A color management system is described herein. Various embodiments of a method described herein can include receiving source color content that is associated with a source device, and transforming the source color content into destination color content for rendering on one or more destination devices. Various embodi...
The present invention combines speech recognition tutorial training with speech recognizer voice training. The system prompts the user for speech data and simulates, with predefined screenshots, what happens when speech commands are received. At each step in the tutorial process, when the user is prompted for an inp...
A convolutional neural network is implemented on a graphics processing unit The network is then trained through a series of forward and backward passes, with convolutional kernels and bias matrices modified on each backward pass according to a gradient of an error function. The implementation takes advantage of para...
An architecture for presenting web content that modularizes the various components of that content. A "wire frame" defines spatial regions of a page of content. The regions are called "slots." A "view" defines a mapping or binding between the slots in a wire frame, and objects that generate content. A rendering engi...
The value of one or more selected nodes in a data format definition
may be substituted with a variant placeholder. At runtime, when an input token stream is generated from the data format definition, each variant placeholder will be replaced with a random value, thereby providing targeted variant input.
...
In a main computer system coupled to an auxiliary
display device, described is an interface set for
implementation by an auxiliary display device driver, to couple the driver to an auxiliary display platform. Commands received from the auxiliary display platform may be handled by code external to the driver...
Hierarchical virtualization is disclosed, where such virtualization can be accomplished with a multi-level mechanism. The hierarchical virtualization includes using a hypervisor that maintains a first partition and using a virtualization stack within the first partition to create and control a second partition. Mult...
A call forwarding system forwards telephone calls based on presence information of a user as reported by computing devices associated with a telephone number. When a telephone system receives an incoming call directed to one of the telephone numbers of the user's computing devices, it sends an incoming call event to...
A first trusted component on a first computing device performs cryptography, evaluation, and enforcement and is tied thereto, and a first user-machine certificate associated with the first computing device is tied to a user. Correspondingly, a second trusted computing device perform cryptography, evaluation, and enf...
A computer implemented method of converting existing content files into an active content wizard executable file is provided, along with systems and tools for doing the same. In the method, an existing content file is converted into a corresponding file in an active content wizard schema. A database of user in...
1. A wireless user input device for communicating a user input to a computer, comprising:
a) a user input detecting element that detects a user input;
b) a kinetic energy converting device that converts kinetic energy supplied to the user input device by the user to electrical energy;
c) a transmitter in communic...
Flexible attributes are attached to network requests that may be executed asynchronously. Any number of criteria may be attached to network requests. The requests are queued until the associated criteria are satisfied. Once the criteria are satisfied, the request is executed. Applications that make the reque...
In a system capable of real-time communication with one or more contacts at one or more other systems, a method of tracking real-time communication data, within a single contact tracking application that tracks real-time communication data for real-time communication using any of a plurality of diverse real-time com...
Integrating design, deployment, and management phases for a system in accordance with certain aspects includes using a system definition model to design a system. The system definition model is subsequently used to deploy the system on one or more computing devices and, after deployment of the system, the system def...
A method and system for automatically displaying content of a window on a display that has changed orientation is described. The content of a window, such as a dialog box, that has been authored for a particular size is repositioned and resized such that the window is viewable in its entirety when the display screen...
A clock radio receives receives over a network, instructions from a remote device that are configured to sound a local alarm on the clock radio. The clock radio may also receive audio alarm data to be used by the clock radio in sounding the alarm. A user can "snooze" the local alarm and have it sounded at a later ti...
Detecting a stall condition associated with processor instructions within one or more threads and generating a no-dispatch condition. The stall condition can be detected by hardware and/or software before and/or during processor instruction execution. The no-dispatch condition can be associated with a number of...
A method and system for aggregating contact information of contacts from multiple contact sources is provided. The aggregation system collects contact information for a user from various contact sources. The aggregation system stores the collected content information in a contact data store. The aggregation sys...
A dispute resolution system for requesting a service provider to provide services so that the service provider can demonstrate to a service intermediary that a service consumer requested services. A service consumer that wants to start requesting services of the service provider registers with he service intermediar...
The invention provides an apparatus and method to establish media sessions for media streams crossing a network boundary. The system includes a media relay controlled by a media configurator control module. The media relay reserves media paths (that include ports in the network boundary), opens the media paths, clos...
PROBLEM TO BE SOLVED: To provide a method and system for identifying a configuration parameter of a "sick" computer system that is at fault for causing an undesired behavior.
SOLUTION: In one embodiment, a troubleshooting system collects "suspect" values for "suspect" configuration parameters used by a "sick" appl...
A hierarchical software update distribution system and method for distribiting software updates is presented. The update distribution system includes a root update service node and at least one update service node. In an update distribution system, each update service node, except the root update service node, has o...
A method and system for protecting an application that implements a communication protocol against exploitation of a communication-based vulnerability is provided. A protection system provides a protection policy that specifies how to recognize messages that expose a specific vulnerability and specifies actions to t...
A method for loading a graphic onto a computer comprising the steps of:
entering a search term associated with the graphic into the computer directing communications between the computer and a selected one of a plurality of graphic libraries;
identifying the graphic in the selected graphic library based on the sea...
A graphical user interface for creating a data summary table includes a field pane including a list of a plurality of fields, and a layout pane including a plurality of zones. The zones represent areas of the data summary table, and the layout pane allows a field of the plurality of fields from the field pane to be ...
A named object view of a report is generated from an electronic data file. Objects in the file to be published are identified in the file. A named object view of the report associated with the file is generated by publishing the identified objects. A viewer at a client is presented with the named object view of the ...
A system for manipulating a user interface element, the system comprising a computing device (100), a processing unit (102), a system memory (104) characterized by a screen reader automation utility (201) automatically determines whether the element supports a control pattern by programmatically requesting from the ...
A method and system for providing to a user a set of alternative query suggestions is disclosed. The method, system and computer readable medium product in accordance with embodiments of the invention includes generating an index of all words in a corpus of documents available to the application, generating a p...
A system combines 2D and 3D modeling in rendering shapes: and includes: a 3D modeling factory to generate a 3D model of selected shape parameters or features; a front face factory to generate 2D text and text effects, and some 2D shape effects; a ground plane factory to generate effects that are rendered on a ground...
Systems and methods for annotating documents in provided in a collaborative application with data from disparate information systems are provided. The collaborative application enables the annotation of a document with data provided by another application. Particularly, the collaborative application enables a user t...
An application program interface (API) for a data platform. The a generic data access component that exposes at least one of stores, sessions, transactions, and query services of the data platform, which data platform is associated with a data store. A data classes component of the API provides canonical, applicatio...
A data store is provided for storing, relating and for allowing use of data associated with a computer-generated document. Data for structuring information associated with a document, such as document metadata, is maintained in the data store where relationships between different pieces of data are maintained i...
The present invention is a tree ordering component within a sentence realization system which receives an unordered syntax tree and generates a ranked list of alternative ordered syntax trees from the unordered syntax tree. The present invention also includes statistical models of constituent structure employed by t...
Computerized testing of an object to identify one or more call sequences that give rise to exceptions. A set of potential operations (consisting of methods and associated parameter values) is automatically generated. A parameter generator may supply interesting parameter values that may more likely result in a thro...
Work item rules for a work item tracking system are provided. Work item rules may be accessible, usable and subject to interpretation by multiple software entities. Further, work item rules may be configured to be subject to creation and change by users, for example, by exposure to users through a user interface. A ...
The subject invention provides a system and/or a method that facilitates-adapting at least two disparate file systems. A file system adapter can provide uniformity and/or seamless integration between a first file system and a second file system. The file system adapter can employ a file-backed item that is enri...
A network security module for protecting a computing device from a security threat on a network, the network security module comprising:
a computing device connection connecting the network security module to the computing device;
a network connection connecting the network security module to the network; and
a s...
A system that generates a per user abstraction of a store from a connection point. Filtering a view set of a hierarchically secured containment hierarchy based on the access permissions of the principal is one of the novel features of the invention. The invention can offer a collection of primitives that can ...
A technique for providing one class of users of an application a view of what a typical user in another class of users of the same application is visually experiencing is provided. A client application that is interacting with the application provides a user an option of having a PIP view of what a typical user in o...
The present invention provides a mechanism that allows an administrative event to trigger or cause the generation of a dynamic web service during initialization of legacy application components. Similar to other types of static tooling approaches, the dynamic approach—as supported herein—uses available metadata desc...
Prior to sending a message to an extensibility point, the message is
wrapped with a wrapper object associated with the extensibility point. The wrapper object can be validated by the extensibility point when the extensibility point is ready to commence its operation on the message. Validation of the wrapper o...
A method and system are provided for controlling multiple types of media devices. The method and system also facilitate communication between a computing device and one of a plurality of types of media devices. The system includes device retrieval modules controlled b the computing device for retrieving information ...
A computer for processing information to produce desired results, comprising: a computer-readable medium for storing services, the services including expressions that represent names by literalizing processes and processes by deliteralizing names; and a microprocessor for executing services as processes, the process...
A network security system for protecting computing devices connected to a communication network from an identified security threat, the system comprising:
a network security module interposed between a computing device and the communication network; and
a security service that publishes security information fo...
A browsing system and method for browsing allows multiple users to access and view hypertext documents on a shared display. A browsing system includes a hypertext document converter configured to convert a component in a hypertext document to include alternate component activation tags. A hypertext display controlle...
Architecture that facilitates interfacing non-integrated applications. The disclosed architecture comprises a set of APIs and conventions used to enable integration between tools that were not previously architected to be integrated. This provides the basis for server-based partner integration and client integration...
A method and system for using a color scheme to communicate information associated with an event and related to the integration of software and hardware of a computing device creates a seamless user experience. A hardware element of the computing device is illuminated based on a color scheme associated with a corres...
Precision and reliability of localization estimates derived from conventional localization systems are improved through a system and method for post-processing of initial localization data, even in environments which may include noise, reflections, or other interference. Such localization systems include conventiona...
Systems and methods for enhanced runtime hosting are described. In one aspect, the runtime identifies any abstraction interface(s) exposed by a host application. The abstraction interface(s) correspond to respective execution environment functionality implemented by the hosting application. During execution of runt...
A system for automating data processing is presented. The system comprises an end-user programming module that is integrated with an underlying file system and that maps an event of a computing system to at least one automatic action that is defined by an end user. The system also includes an event handler that resp...
An algorithm identifies a salient video frame from a video sequence for use as a video thumbnail. The identification of a video thumbnail is based on a frame goodness measure. The algorithm calculates a color histogram of a frame, and then calculates the entropy and standard deviation of the color histogram. The fra...
Subject matter includes exemplary systems and related methods for fully scalable encryption of scalable multimedia. A scalable bitstream encrypted using the subject matter maintains full functionality of scalable features in the encrypted form. The exemplary scalable encryption allows transcoding, rate shaping, and ...
Blending colors of source and destination primitives by a graphics processing unit is disclosed. The graphics processing unit executes a blending program that blends the primitives. The graphics processing unit receives the blending program from a central processing unit or a graphics application program. For exampl...
A multi-merchant purchasing system is configured to identify downloadable products selected by a user for purchase. The identified downloadable products are offered by multiple merchants. The multi-merchant purchasing system enables the user to purchase all of the downloadable products in a single transaction. Speci...
Generally described, embodiments of the present invention provide a system and
method for protecting a computer from malicious attacks and buffer overrun (intentional or
unintentional). In particular, embodiments of the present invention protect the contents of
block headers of data blocks and enable the ability ...
Various embodiments of the present invention are directed to systems and method for detecting conflicts and applying conflict resolutions during manual and automatic conflict resolution operations. Several embodiments are directed to preventing both: (a) non-convergence of conflict resolutions, where partners can en...
A method and apparatus are provided for enabling application program compatibility with display devices having an increased pixel density. According to one method, a call including one or more parameters is directed toward an application programming interface for performing a screen input or output function is recei...
A system and method for serialization and/or de-serialization of file system, item(s) and associated entity(ies)is provided. A file system "item" comprises a core class which can include property(ies). An item can be simple or compound (e.g., includes other item(s) embedded in it). Associated with an item can be ent...
Systems and methods provide for the rewriting and transformation of a code unit through an extensible, composable, set of code rewriters that can be implemented at various phases throughout the development, deployment, and execution of the code unit. The described systems and methods provide a powerful way for progr...
Improved query optimizer using implied predicates. The system facilitates allowing a query optimizing component to introduce into a query. Extra predicates that facilitate the following; render the same results as the original query; are used as dictated by rules passed to the optimizing component-these rules specif...
A method is provided for using an identity service for protecting identity information during an electronic transaction. The method includes registering an identity client, wherein the identity client possesses an associated multi-component identity. The method further includes regulating access to the multi-compo...
A system and method for displaying a base character in response to user input and displaying characters related to the base character to allow the user to select one of the displayed characters for a message string.
Various embodiments of the present invention are directed to a storage platform comprising: a data store in which data stored therein is defined in terms of items, elements, and relationships, wherein an item is a unit of data storable in the data store and comprises one or more elements, an element is an instance o...
The present invention relates to systems and methods for providing a notification when subsequent query results from a registered database query change due to a database change. The systems and methods employ a service broker to facilitate storing database query registration information associated with a registered ...
A method and system for avoiding the overwriting of drivers by subsequent versions or other commonly named drivers includes generating a unique identity for every eligible driver package. Driver files from the driver package, or the entire driver package itself, are then installed in a subdirectory location in a com...
receiving a call requesting execution of a protected service within a runtime area;
requesting permission for the execution;
analyzing the request for permission; and
basing status of the permission on the analysis.
A portable recall device configured to be carried by a wearer comprising:
a camera; and
at least one accelerometer operably connected to the camera, the accelerometer triggering capture of an image by the camera based on detection of a capture condition followed by detection of a stable condition by the at least o...
A method, application interface, and medium is provided for presenting a variety of data representations in a screen-area inset. The inset(s) can be one or more bounded portions of a graphical user interface. The inset offers a picture-in-picture type of functionality to present videos, data, pictures, audio, and ot...
Real time availability data (free/busy data) is provided for potential meeting attendees and/or assets. An availability service is queried for availability data for one or more attendees and/or meeting assets. The availability service determines the identity of an electronic mailbox server on which is stored current...
A graphical user interface for creating a data summary table includes a data summary table including a plurality of fields, and a filtering pane programmed to apply filters to items in the fields of the data summary table, the filtering pane including a field selector control, wherein the field selector control is p...
A user may easily read, browse, and jump through the messages contained within a thread. Different portions of the message may be highlighted such that they are easily identifiable. The user may easily navigate through the thread by selecting a user interface element, such as an arrow button, to move to the next or ...
A common data model (CDM) that is a data model common to multiple application-specific data models. The CDM supports both PIM (Personal Information Manager end-user application data and line-of-business (LOB) data. Similarly, an SDM-type (system definition model) application can specify its model on top of the CDM. ...
A system and related techniques expose color printing resources to applications, utilities, operating system and other resources, to automatically detect output capabilities as well as to permit integrated print functions which preserve metadata and other context within the printing workflow. According to embodiment...
A system combines 2D and 3D modeling in rendering shapes and includes: a 3D modeling factory to generate a 3D model of selected shape parameters or features; a front face factory to generate 2D text and text effects, and some 2D shape effects; a ground plane factory to generate effects that are rendered on a ground ...
A style model implementation that is applied to objects within a user interface to define any attributes of the objects. The model is divided into two parts: a "runtime" which uses a style definition to affect the look and feel of the user interface, and a "design-time" which is the experience presented by WYS...
A system that provides graphics commands that represent graphics or an image, to a consuming process. The graphics commands are represented by a visual tree which includes objects and resources describing the objects. The objects and resources are communicated to a composition engine that creates an analogous compos...
A system and methods providing a rendering independent persistence of information is provided. In an illustrative implementation, data is provided having some predefined structure. In operation, the data is processed such that the data and it's associated sturcture are represented in a data format that is persistent...
Systems and/or methods are presented that may be used to enable operation of a command line having an upstream command and a downstream command where the upstream command may output data of a type that may be unacceptable as input to the downstream command.
A layout resizes intelligently without complexity. Objects or elements are attached to a virtual grid of row and cokimn gridlines, which are defined separately. The relationship between the objects and the grid is bi-directional so that moving one (gridline or object) will affect the other (object or gridline). In o...
A system data interface and related architectures are described, Various embodiments can provide one or more of the following capabilities: a generic data model, asynchronous client and server dispatch, cancellation, batching, transactional invocation, parallel invocation, interception or reflection. In one embodime...
A search of an index database or another search method is conducted to identify as a preliminary results listing one or more selected computer objects having selected identifying information stored in an index database. In addition, one or more selected computer objects of the preliminary search results are correlat...
A method of sharing pages between virtual machines in a multiple virtual mac includes initially allocating a temporary guest physical address range of a first virtual machine for sharing pages with a second virtual machine. The temporary range is within a guest physical address space of the first virtual machine. An...
A system and methods that expose a report as a schematized queryable data source is provided. In an illustrative implementation, an exemplary computing application processes data according to at least one report definition. The exemplary computing application cooperates with at least one data store and/or data sourc...
To authenticate a program on a computing device to a resource local to or remote from the computing device, a stored program security identifier (PSID) corresponding to the program is retrieved, where the stored PSID includes information taking into account the program itself, the execution setting of the progr...
Various embodiments of the present invention are directed to a multi-level virtualizer that is designed to remove much of the intercept-related functionality from the base-level virtualizer (that exists outside of each partition) and, instead, incorporate much of this functionality directly into each partition. For ...
An architecture for minimizing calibration effort in an IEEE 802.11 device location measurement system. The calibration technique is based upon a regression function that produces adequately accurate location information as a function of signal strength regardless of gaps in the calibration data or minimally availab...
A method and apparatus for updating a user interface for a business process in response to a change in the business process instigated by a user. The change is detected by the application and the affected user interfaces are updated to reflect the changed process without the need to recompile the application. Change...
A method of tracking formants defines a formant search space comprising sets of formants to be searched. Formants are identified for a first frame in the speech utterance by searching the entirety of the formant search space using the codebook, and for the remaining frames by searching the same space using both the ...
Exemplary embodiments disclosed herein may include a method and system for providing information to a user and safely disclosing identity information over the Internet comprising receiving information from a server, analyzing the information, presenting the analyzed information to a user for validation in a finite n...
For interlaced B-fields or interlaced B-frames, forward motion vectors are predicted by an encoder/decoder using forward motion vectors from a forward motion vector buffer, and backward motion vectors are predicted using backward motion vectors from a backward motion vector buffer. The resulting motion vectors are ...
A method, identification tag reader and computer program product for communication with an identification tag are disclosed. To communicate with the tag, identification data may be retrieved from an identification tag. A guest identification, compliant with at least a portion of a standard network protocol address, ...
An improved certificate issuing system may comprise a certificate translating incoming certificates and certificate requests from a first format into a second format. A certificate issuing engine may then operate on incoming requests in the common format. The issuing engine can issue certificates to clients accordin...
A computer implemented method of analyzing input text includes comparing trasitions in the input text and the transition in a rule engine. The method also includes determining whether the transition in the input text is found in the rule engine based on a character found in a morpheme in the rule engine and at leas...
A gradient-corrected linear interpolation method and system for the demosaicing of color images. The method and system compute and interpolation using some a current technique (preferably a bilinear interpolation technique to reduce computational complexity), compute a correction term (such as a gradient of a desire...
A data-binding engine is used to perform command binding. A data binding engine binds user interface controls such as buttons, menus, list boxes, etc; to commands exposed on an application model. A data source and data binding path may be specified in a markup language that defines how the commands are bound to UI e...
A method and apparatus for compressing query logs is provided. Multiple leves fo user-specifiable compression include character-based compression, token-based compression, and subsumption.An efficient method for performing subsumption is also provided. The compressed query logs are then used to train a statistical p...
Combined object level and property level key framing systems, methods, and user interfaces are provided in which a user can enter a mode where any change to a property is recorded as a key framing action (e.g., creation or edit) at the current time as indicated by a timeline. When a key frame is created in this mode...
The invention provides one or more modules that may be used to automatically configure a computing device to communicate over a network. When a polling computer is connected to a network, it monitors network traffic to determine the protocols being used on the network. These protocols are then installed and loaded...
Methods for providing instant messaging capability in conjunction with an online reference is provided. In one embodiment, the method may include receiving an indication to initiate display of online content, selecting at least one reference in response to the indication, the at least one reference being associated ...
The present invention provides Web Services over a mail transport. In particular, the present invention sends Web Service messages using MAPI (Messaging Application Program Interface) mail applications in order to support offline communications and extended processing time of service requests without creating additi...
A method of performing speech recognition, and a mobile computing device implementing the same, are disclosed. The method includes receiving audible speech at a microphone of the mobile computing device. The audible speech is converted into speech signals at the mobile computing device. Also at the mobile computi...
Disclosed is a theme property sheet system that supports presentation themes by coordinating values provided to elements used in a user interface. When an interface user expresses a preference for a particular presentation theme, that theme’s property sheet is given precedence over other mechanisms for setting prope...
In one aspect, an encoder/decoder receives information for four field motion vectors for a macroblock in an interlaced frame-coded, forward-predicted picture and processes the macroblock using the four field motion vectors. In another aspect, a decoder decodes skipped macroblocks of an interlaced frame. Skipped mac...
In a computer system having a display system displaying content and having a defined preferred interaction area on the display system in which the user interact with the computer system, a method comprising:
detecting a reposition action indicating that the desktop content is to be repositioned wiht respect to the...
A system that facilitates assisted form filling, comprising: a control component that receives untagged textual input information; a parsing component that populates a subset of a form based, at least in part, upon the untagged textual information; and a display component that displays the untagged textual informati...
A method and system for reducing the number of ports allocated by a relay server is provided. A connection system uses a bidirectional technique to establish a connection via the relay server between two endpoints (e.g., client computers) that can be used bidirectionally to send a stream from a first endpoint to a s...
A system and method for identifying and removing potentially unwanted software. A mechanism is provided that identifies suspect programs to a user and allows the user to prevent the suspect programs from running without actually deleting them. In one embodiment, scanner data identifying potentially unwanted software...
A speech recognition traning system for kanji-based languages is provided. The system loads a pronunciation aid for each and every ideograph in the training speech, but does not in fact display an ideograph until the training system recognizes a pronunciation difficulty. Once a pronunciation difficulty is identified...
computer-readable medium are provided for fitting text to shapes
(
within a graphic. According to the method, initial constraints are defined that comprise initial values describing how a shape and text within the shape should be laid out. Constraint rules are also defined for use in modifying the initial constrai...
Various embodiments of the present invention are directed to a data store composing Items, Elements, and Relationships. An Item is a unit of data storable in a data store and further comprises said Element and said Relationship. An Element is an instance of a type comprising one or more fields. A Relationship is a l...
A system 100 that facilitates determining a user's intent given a user search query comprises a search engine that is employed to search over a collection of objects within a data store to retrieve a user search result set. The objects within the result set are associated with queries that were previously utilized t...
An improved system and method for using a file system to automatically backup a file in persistent storage is provided. A storage aggregator may organize nonvolatile memory for use in aggregate to store backup copies of a file. A file system filter driver may receive a request from an application for storing a file...
In a client computing system, a method for receiving credentials that can be used to can authentic with a server computing system, the method comprising:
An act of receiving a limited-use credential;
An act of establishing a secure link between the client computing system and the server computing system;
An ac...
A rules-based grammar is generated. Segmentation ambiguities are identified in training data. Rewrite rules for the ambiguous segmentations are enumerated and probailities are generated for each. Ambiguities are resolved based on the probabilities. In one embodiment, this is done by applying the expectation maximiza...
A method of automatically adjusting the electronic ink height of an electronic highlighter device, comprising:
Selecting an electronic pen for functioning as an electronic heighlighter device:
Engaging the electronic pen with a computer-displayed object;
Determining the height of the computer-displayed object; ...
A method and system are related to updating objects over limited bandwidth networks. Objects are updated between two or more computing devices using remote differential compression (RDC) techniques such that required data transfers are minimized. In one aspect, efficient large object transfers are achieved by recurs...
Various embodiments of the present invention are directed to system and method for implementaion of multisets (to support embedded collection) in a database system.
The present invention relates to a method of manipulating a software application and processing data stored in a data source. The method includes receiving a natural language input and analyze the natural language input to identify semantic information contained therein. Portions of the natural language input are as...
A system for use in client/server computing comprising:
a) a client that interfaces with an applications program;
b) a server in communication with the client that responds to a request from the applications program communicated to the server by the client for services available through said server; and
c) a user...
A computerized interface for data presentation, comprising:
a lens component associated with a protion of a user interface display, the lens component defines an area to display information from at least one search result; and
a layout component that displays a detailed subset of information within the lens compo...
A method and apparatus are provided for storing parameters of a deleted interpolation language model as parameters of a backoff language model. In particular, the parameters of the deleted interpolation language model are stored in the standard ARPA format. Under one embodiment, the deleted interpolation language ...
A method comprising ;
Enumerating local credential and remote credentials in response to receiving an event notification; and
Synchronizing the local credential and remote credential.
A method of decoding an input semantic structure to generate an output semantic structure, the method comprising:
providing a set of transfer mappings:
calculating a score for at least one transfer
mapping in the set of transfer mappings using a statistical model;
selecting at least one transfer mapping based ...
Disclosed is a theme property sheet system that supports presentation themes by coordinating values provided to elements used in a user interface. When an interface user expresses a preference for a particular presentation theme, that theme's property sheet is given precedence over other mechanisms for setting prope...
Described are a system and method for highlighting a domain in a browser display. Briefly stated, a browsing software is configured to parse an address to identify an important portion, such as a domain name associated with content being displayed. The important portion of the address is then displayed in a high...
Instant messaging systems and methods are disclosed. The systems and methods allow users to play competitive and collaborative games using an instant messaging client application. The client application may create a user interface screen that includes an instant messaging region or window for exchanging instant mess...
A video encoder/decoder utilizes a bistream syntax that provides an independently decodable, partial picture unit, which may be in the form of a unit containing one or more contiguous rows of macroblocks (called a slice). This slice layer provides a flexible combination of error-resilience and compression efficiency...
Systems and methods are provided for an extensive content build pipeline. The exemplary content build pipeline is based on a code build process using a standard XIF file format containing reference to game content produced using various game content editors and tools. This standardized file format is capable of cont...
A method and system are provided for adding, removing, and managing a plurality of network policy filters in a network device. Filters are installed in a framework and designated as active or disabled. Each filter has a priority. When a new filter is to be installed into the framework, it is compared to installed fi...
A method for firewall-aware application to communicate its expectations to a firewall without requiring the firewall to change its policy or compromise network security. An application API is provided for applications to inform a firewall or firewalls of the applications needs, and a firewall API is provided that in...
The present invention is directed to a system, methods, and a computer-readable medium for efficiently performing a backup of data in a networking environment. In embodiments of the present invention, a backup of a file from a local computing device to a remote computing device is performed. However, the file m...
A system for managing at least two different classes of data comprising;
Special purpose heaps are created to store different classes of data which different rules apply. A library of functions is provided which is designed to respect the different classes of rules that apply to the different heaps, by storing dat...
A system that facilitates data perspective generation, comprising:
a component that receives user-specified input data including a target variable from a database; and
a generation component that provides automatic generation of at least one conditioning variable for a data perspective of the target variable, der...
Embodiments of the present invention provide the ability to accurately match a particular computing device within a networked computing environment with an identity of that computing device. According to one aspect, a method for identifying a client computing device in a networked computing environment is provided. ...
A method in a computer system for displaying allowed-to-authenticate information, the method comprising:
receiving a selection of a security object; retrieving allowed-to-authenticate information for the selected security object, the information identifying an entity, a resource, and an action wherein when the enti...
A computer-implemented method for populating an electronic form from an electronic image, the method comprising:
(a) identifying a size, orientation and position of a first object having any arbitrary orientation within the electronic image;
(b) identifying information elements from pixels within the electronic im...
A method of mitigating an amplification attack by a controller node on an and system in a network, the method comprising:
Detecting one or more candidate attack request packets received by an intermediary node in the network: and
Limiting response traffic of response packets communicated from the intermediary node...
1. A method of mitigating an amplification attack by a controller node on an end system in a network, the method comprising:
detecting one or more candidate attack request packets received by an intermediary node in the network; and
limiting response traffic of response packets communicated from the intermediary n...
A system for mapping payload data to spreadsheet lists, the system comprising:
a spreadsheet storage unit adapted to store spreadsheet data including at least one spreadsheet list;
a payload data storage unit adapted to store payload data; and
a mapping unit adapted to receive spreadsheet data from said spreadshe...
A method and system is generally directed to synchronizing the language used for applications and the language used for information provided across a network. The client language that is associated with the language used for applications on a computing device is detected along with the services language. The service...
Systems, methods, and computer-readable media are used to determine whether specific electronic pen gestures with respect to pen-based computing systems should be processed as "Press-and-hold" gestures(e.g., to activate right mouse button click actions). Such methods may include: (a) measuring two diffrent parameter...
The present invention is directed at a reflection-based shell that provides reflection-based processing of input parameters for a command. The reflection-based processing includes parsing, data generation, data validation, object encoding, object processing, documentation, and the like. The reflection-based shell pr...
A method of decoding an input semantic structure to generate an output semantic structure, the method comprising:
providing a set of transfer mappings; calculating a score for at least one transfer
mapping in the set of transfer mappings
using a statistical model; selecting at least one transfer mapping based on
...
A wireless technology(e.g., Wi-Fi) coexistence architecture and method are disclosed for managing potential conflicts between wireless technology interference sources. A coexistence driver maintains a conflict map identifying potentially conflicting wireless technologies on a computing device. Such technologies, due...
The present invention is directed to a method and system for use in a computing environment to monitor parameters and detect abnormalities. A monitoring system for monitoring a process may include a signature creation module for creating a signature representative of the process, a signature-updating module for cont...
Described is a computer-implemented system and method that detects .md differentiates scratch-out gestures from other electronic ink, e.g., entered via a pen. The system and method compare boundary-based criteria to differentiate, which elLininaf.es tho need to have a specially-shaped scratch-out pattern, instead a...
A method and system for auxiliary processing of information for a computing device. By simplifying the user managed power states to on and standby, the computing device preserves its execution context by default when the machine is powered down. As a result, the computing device is made available for use even when i...
A system and method for combinig the precision estimate of a database entry"s coordinate value such that the precision information is included as part of the one-dimensional index. This is done by constructing a hierarchincal index in which the size of the grid is related to the precision of the coordinate value. A ...
A method and system are provided for implementing a firewall architecture in a network device. The firewall architecture includes a plurality of network layers, a first firewall engine, and one or more callout modules. The layers send packets and packet information to the first firewall engine, maintain and pass pac...
A method in a computer system for enforcing a security policy, the method comprising;
providing a security policy;
compiling the security policy in to security program based on an instruction set of a
security virtual machine;
loading the security program into an instruction store of the security virtual mach...
Techniques are disclosed to provide randomized signal transforms and/or their applications. More particularly, a signal (e.g., an audio signal, an image, or a video signal)is transformed by applying randomly-selected basis functions to the signal. The applications of the randomized signal transforms include, but are...
A service package (302)is coupled to computing device (201) via a coupling such as network (310), Service package (302) may include any of a variety of sources such as a magnetic disk, an optical disk, flash memory, and a solid-state disk. Additionally service package (302) may be local (e.g. a disk that is accessed...
The present invention extends to methods, systems, and computer program products for using subqueues to enhance local message processing. Messages include queue IDs comprised of a parent portion and a suffix portion. The parent portion identifies a parent queue and I he suffix portion identifies a subqueue of t...
A method comprising: detecting a corruptio to data on a storage volume associated with a file system request; and repairing the corruption in real-time such that the storage volume remains online and active during the repairing.
A method of training a capitalization model for automatically capitalizing text, the method comprising:
collecting training documents that meet limitations that require the training documents to be associated with a particular user; and using the collected training documents to train the capitalization model.
...
1. A method for optimizing the use of paid placement space in a search results
Web page, the method comprising:
monitoring a performance of a paid listing placed for a fee in a search results Web page;
receiving conversion data associated with the paid listing, the conversion data representing sales revenue resul...
The present invention extends to associating and visualizing schematized business networks. Users can visualize and navigate a business network without having got understand or create associations between structures of different business layers. Users can configure the level of detail by zooming in and zooming out o...
A first image of a first software which can be combined with other images of other software such that any one or more of the images can be restored from the volume image, and methods relating thereto (Fig. 1). The method of making the volume image comprises c reating a first image from a first software, creating a s...
A request is received to view a virtual television channel. A user associated with the request is identified along with user preferences associated with that user. Content, such as television programs, music, and games, is identified that satisfies the identified user preferences. The identified content is ranked ba...
An application program interface (API) for sending and receiving endpoint registration data and peer-to-peer network cloud data has a registration call for adding endpoint data to a peer-to-peer network. The API may receive explicit data regarding address information or may be instructed to select and maintain suita...
Described herein is a technology facilitating the operation of non-native program modules within a native computing platform. This technology provides a mechanism for aligning-as necessary-parameters of data structures so that program modules or operating systems of different paradigms may use them. The data of para...
1. A method for an application on a computing device to write data from a source to a storage medium associated with the computing device, the method comprising:
the application issuing an application command to a file system of the computing device, the application command including an identification of the sou...
A user interface for facilitating recommending to a computer user a decision for downloading content, the user interface comprising:
a first trust option for allowing the user to cause the content to be downloaded; a second trust option for allowing the user to prevent the content from being downloaded; and a recom...
A system that concurrently provides multiple user interface (UI) mechanisms that facilitate control of an application state machine (e.g., unified message system). More particularly, the invention can create two relatively distinct user experiences, one via dual tone multi-frequency (DTMF) navigation and another thr...
A method comprising recording a video program;recording metadata associated with the video program; receiving updated metadata associated with the video program; and replacing the previously recorded metadata with the updated metadata.
The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands; combining the functionality a...
A security module and method implements data requests from a USB or other similar device, in which a secure component can communicate securely with a device without modifying the underlying USB bus protocol, or the device, even where the software controlling the bus is untrusted. A security module (physically separa...
A system for generating an ordered list of one or more media items selected from a library of media items. The system comprises a user-associated selection filter for generating a subgroup of media items from the library. The system further comprises a user-associated ordering filter for ordering at least a portion ...
The present invention employs user modeling to model a user"s behavior patterns. The user"s behavior patterns are then used to influence named enity (NE) recognition.
Apparatus, systems and methods for enabling an improved portable media player are provided. The apparatus provides improved media recording, synchronization, rendering and user interface experiences for a user, In various embodiments, portable media players are provided with a closed position for substantially prote...
The information management system such as might be used for a source code management system. The information management system is distributed throughout an enterprise and is operated to allow secure communications with remote sites connected to a central site over an unsecured network. A secure channel is created th...
A base table is scanned with a delete marker and an insert marker. The delete marker identifies a last change committed to the base table as part of a transaction prior to execution of a statement, and the insert marker identifies a last change committed to base table as part of the transaction during execution of t...
An autofill system comprising: a trained machine learning component that uses one or more sets of inputs to facilitate autofilling of web-based forms; and
an autofill component that selectively enters appropriate data into one or more form fields based at least in part upon information generated by the machine lear...
A system for dynamically detecting potential race conditions in a program having a plurality of threads adn one or more shared memory locations, the system comprising:
with respect to each shared memory location, (i) a mechanism for maintaining a set of cncurrent thread segments that access the location, and (ii) a...
A cancellation server for canceling cryptographic puzzles, the puzzles associated with identifiers, for use in a digital delivery system comprising an intended recipient of a digital object including a cryptographic puzzle, the cancellation server in connection with at least one database, and executing the steps of:...
The principles of the present invention provides for using directional antenns to mitigate the effects of interference in a wireless network. An antenna device includes an omni-directional antenna and at least one directional antenna. Each directional antenna(e.g., an electronically steered phased array antenna) can...
A method of recovering an application using a timeline-based computing enviornment, the method comprising the steps of:
periodically saving data items of the application for recovery, wherein the saved data items allow the recovery of the application at a point in time when the items were saved;
searching a time-b...
A distributed authentication model that operates within a protocol-based sphere of trust. Rather than being able to communicate with any one of the computing systems internal to the sphere of trust, the amount of authentication is reduced by having the external computing systems intitially communicate with a specifi...
Systems and methods are described for intelligent default selection of characters to be entered via and on-screen keyboard. Based on one to several criteria, a character most likely to be selected for entry via the on-screen keyboard during a search request is determined and a selector is positioned at that particul...
Shadow paging is a technique used to achieve atomic and durable transactions, and provides the ability to manipulate pages in a database. During a transaction, the pages affected by the transaction are copied from the database file into a workspace such as volatile memory, and modified in that workspace. When a tran...
A method of managing a synch operation during which business solutions entities are loaded into a mobile data store of a mobile computing device from a central data storage system, the method comprising:
a) defining subscriptions identifying entities to be loaded into the mobile data store during a synch operation;...
Shrinking a database file is performed by manipulating pages within the file such that all empty pages reside at the end of the file. Non–empty pages from the end of the file are written to empty pages at the start of the file. Repeating this process, the correct number of times, results in all of the empty pages re...
Secure communication between a keyboard and a component, such as a piece of software running on a computer. A first initial value is known to both the keyboard and the component. The keyboard and the component exchange nonces. The keyboard and the component each compute a second initial value and a third initial val...
Obtaining tokens with alternate personally identifying information. A method may be practiced, for example, in a networked computing environment including a client and a token issuer. The token issuer provides security tokens to the client that the client can use for accessing functionality of services in the networ...
A password recovery technique includes generating words by sequentially selecting a character for each character position of the word from a character string. The order of the characters in the character string is individually selected for each position of the word. Each sequentially generated word may be entered un...
Shared Federation Metadata. A data structures may be implemented in a networked computing environment including federation. A federation includes two or more organizations coupled in a fashion such that authentication and authorization statements span the organizations in accordance with a pre-defined policy. A comp...
The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands; combining the functionality a...
A system and a method for facilitating navigation of stored information. A user interface configured to receive a search input is provided. In response to receipt of a search input, a data store is assessed. The data store may contain various information elements, and each of these elements may be tagged with one or...
Described herein is a technology facilitating the presentation of digital video streams. An implementation, described herein, reduces the effective start-up delay in the presentation of the first frames of the video content that occurs when a system tunes into a video stream. This abstract itself is not intended to...
Creating an account via a mobile device. A request to create an account is received from a user via a mobile device. The request is received from the mobile device according to a wireless communications protocol. In response to the received request, a confirmation message is delivered to the mobile device for render...
An extraction, transformation and loading (ETL) designer module of a computerized financial system that is used to configure an ETL package for loading data elements from a financial table of a financial database into a reporter table in accordance with a predefined format. The ETL designer module includes a transfo...
A configurable switch that enables multiple CPUs to be connected to multiple I/O devices through a single switch. The switches can be cascaded to enable more CPUs and/or more I/O devices in the tree. The configuration is transparent to the enumeration of the bus and endpoint devices. A simple management input such a...
.
I
Methods of providing a document relevance score to a document on a network are disclosed. Computer readable medium having stored thereon computer-executable instructions for performing a method of providing a document relevance score to a document on a network are also disclosed. Further, computing systems ...
Mechanisms are disclosed that may allow certain memory access control algorithms to be implemented efficiently. When memory access control is based on controlling changes to an address translaion map (or set of maps), it may be nessessary to determine whether a particular map change would allow memory to be accessed...
The subject invention relates to systems and methods that perform consistency checks of user defined type (UDT) fragments utilizing a stream of data without wholesale copying of the data. Streaming consistency checks facilitate discovering invalid fragments as soon as possible such that the entire UDT fragment does ...
The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands, combining the functionality a...
The subject invention relates to systems and methods that automatically learn data relevance from past search activities and apply such learning to facilitate future search activities. In one aspect., ail automated information retrieval system is provided. The system includes a learning component that analyzes ...
The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands; combining the functionality a...
Systems and methods for post-cache substitution. To include dynamic content in a response to a client request, a substitution block is inserted in the cached content. When the cached content is written as the response to the client, a delegate associated with the substitution block is invoked to generate the dynamic...
The subject invention provides a unique system and method that facilitates creating a summary page of content associated with disparate sources of data. For example, a user can select one or more regions of one or more disparate web pages for which he/she desires updated information over a length of time. The s...
The principles of the present invention provide for providing contention free quality of service to wireless stations. A station indicator to an access point that higher priority data (e.g., time constrained data) is to be sent to the access point. The access point receives the indication and selects a slot time for...
A supplicant on a first computing system authenticating the first computing system to an authenticator on a second computing system in a manner that is independent of the underlying data link and physical layer protocols. The first computing system establishes a data link layer connection with the second computing s...
A development environment in which unit tests are prepared. The unit tests run in a host environment for more complete and accurate testing of program units. The development environment uses a test execution shim to access an adapter running in the host environment. The host adapter may invoke other program...
Methods are disclosed for estimating language models such that the conditional likelihood of a class given a word string, which is very well correlated with classification accuracy, is maximized. The methods comprise tuning statistical language model parameters jointly for all classes such that a classifier discrimi...
This invention generally relates to a network communication technology. An implementation, described herein, performs a time-aware, best-effort, hole-filling communications retry function over a communications network. It does so in a manner that assumes successful reception of data unless the receiver indicates dif...
A b- tree having information stored therein is utilized to facilitate positional access of elements stored in the leaves of the b-tree. The b-tree is structured such that for each non-leaf level value, a count is located to its immediate left and a value is located to its immediate right. These left and right counts...
A configurable switch that enables multiple CPUs to be connected to multiple I/O devices through a single switch. The switches can be cascaded to enable more CPUs and/or more I/O devices in the tree. The configuration is transparent to the enumeration of the bus and endpoint devices. A simple management input such a...
A system and method for eyes-free interaction with a computing device through environmental awareness. A smart computing device includes non-environmental impact settings that indicate what type of user impact will be recognized as an input. The smart computing device monitors environmental conditions to distingui...
A face model having outer and inner facial features is matched to that of first and second models. Each facial feature of the first and second models is represented by plurality of points that are adjusted for each matching outer and inner for the inner facial features of the first and second models using 1) the cor...
The subject invention provides for a system and method that facilitates detecting and preventing spam in a variety of networked communication environments. In particular. The invention provides several techniques for monitoring outgoing communications to identify potential spammers. Identification of potential spamm...
A device that is capable of producing an electronic program guide (EPG) having at least one entry that enables access to one or more images; wherein selection of hte at least one entry by user input causes the device to retrieve the one or more images and to present the one or more images on an associated display sc...
A method comprising:
identifying a first email address that is, in terms of a social network, zero-degrees removed from a user;
associating a first trust level with the first email address;
identifying a second email address that is, in terms of a social network, one-degree removed from the user; and
associatin...
The subject invention provides systems and methods that facilitate obfuscating a spam filtering system to hinder reverse engineering of the spam filters and/or to mitigate spammers from finding a message that consistently gets through the spam filters almost every time. The system includes a randomization component ...
Systems and methods are described for broadcasting interactive content without using triggers embedded in the broadcast content. When a viewer sees an item of interest while viewing a program, the viewer can initiate a request for information (RFI) about that item with a single button actuation. When the RFI is ente...
The subject invention provides a system and/or a method that facilitates tracking a data change to an entity within a data storage system at an entity level and at a sub-entity level. The data storage system can be a database-based file system, wherein an interface can receive at least one data change to an ent...
A location system for locating and determining the motion and velocity of a wireless device. The methods include direct inferences about whether a device is in motion versus static based on a statistical analysis of the variation of radio signal strengths over time. The system is trained according to a sparse set of...
A system that facilitates real-time information exchange between users in a conference environment, comprising:
at least two Data Clients that receive conference-related informationa nd present it to respective users, each Data Client comprising a user interface with a Presentation Chute icon therein; and
a Room S...
The present invention relates to systems and methods that facilitate dynamic programming language execution in a managed code environment. A class component is provided that declares an inheritance hierarchy for one or more tagged values associated with a dynamic programming language. During execution of the tagged ...
The joining of Web services is accomplished via a virtual contact through the use of safeties (802). The joining of Web services heightens the safe interoperability of Web services to create greater functionality than each Web service alone can provide (804), Web services are joined for interoperability (806) when t...
An automatic task generation mechanism provides generation of tasks such as maintenance task for a computer system. A set of tasks is set up along with rules for performing the tasks. The rules may be associated with metadata that allow the tasks to be mapped to the tasks. Events may be detected that are related to ...
The present invention relates to new and improved embodiments of systems and methods for displaying content within a spreadsheet graphical user interface. In one embodiment, a computer system has a graphical user interface that performs a method for displaying data within a spreadsheet application. The method compri...
Systems and methods are described for profiling the power consumption of software instructions executing on a processor. A power measurement circuit records power consumption levels of a processor executing various software instructions. A profiling tool tracks and identifies the instruction being executed on the pr...
The invention facilitates adpative compression of multi-level images, such as captured digital images of a whiteboard, etc., encoding a bitstream comprising a color image component and a black-and-white image component. Either or both of a color and a black-and-white image can be output to a user based on user desir...
A content-progress indicator for an EPG is described. In an implementation, a user interface (UI) for output by a client and for display by a display device includes a plurality of representation of content items and at least one pictorial representation. Each representation of a content item is selectable by a user...
An efficient method for renaming consecutive keys in a B-tree representing a hierarchical namespace, such as a file system, has an estimated time efficiency of O(logN), where N is the number of nodes in the B-tree. All the consecutive keys to be renamed are first excised from the original B-tree to form a trimmed B-...
The subject invention provides for an advanced and robust system and method that facilitates detecting spam. The system and method include components as well as other operations which enhance or promote finding characteristics that are difficult of the spammer to avoid and finding characteristics in non-spam that ar...
The subject disclosure pertains to relationships between items. Relationships between items can be defined external to the items themselves thereby providing a modular, flexible and extensible system. For instance, relationships between items can be defined in a class that includes methods for returning particular e...
A method is described which may be used to compress EPG data. EPG data may include a plurality of television programs. Each television program may have one or more values that respectively describe one or more television program characteristics. In one implementation, The EPG data is compressed by comparing the one ...
The invention provides a system and method for managing cached objects using notification bonds. A server is configured to manage original object. A client creates cached objects from the original objects and establishes notification bonds with the server. Each notification bond enables the client to obtain a notif...
The present invention involves a system and method that facilitate extracting data from messages for spam filtering. The extracted data can be in the form of features. Which can be employed in connection with machine learning systems to build improved filters. Data associated with origination information as well as ...
Methods and systems for quantization and data embedding are described. In at least some embodiments, a transform is applied on an image that is to be watermarked and statistics associated with the image are computed. The computed statics are quantized using a symmetric lattice, and a watermark is computed using the ...
A communications protocol is described that governs asynchronous exchange of data between a high level animation system and a low level animation system. The high level animation system has a variable, medium-frequency frame rate and is optimized for in teractivity. The low level animation system has a constant, hig...
A cyclic graph may be partitioned. The partitions of the cyclic graph may include an acyclic component of the cyclic graph and a set of partitioned links. The partitions of the cyclic graph may have a particular order. The elements of the cyclic graph may be serialized with a particular serialization order. The seri...
Candidate mapping are generated between two sets of short strings. A set of files related to the two sets of strings is chosen. Each string from the two sets of strings is searched for in the set of files. Any two strings that match the same file are presumed to be related, and are mapped together. These candidate m...
Metered data is accumulated and is indexed within a metering databse of a client according to a metering ID (MID)and a content-associated ID(KID. The client selects a particular MID and metered data in the metering database having the selected MID, and costructs a challenge based on the selected metered data and sen...
Predictive losslesss coding provides effective lossess image compression of both photographic and graphics content in image and video media. Predictive lossless coding can operate on a macroblock basis for compatibility with existing image and video codes. Predictive lossless coding chooses and applies one of multip...
Architecture for generating and maintaining terminal services connection from an external client to an internal internet client behind a firewall and/or router, the external user is first authenticated after which the external client is passed to a remote user portal. A listing of available internal computers is pr...
A system and method for automatic configuration upon installation of a network printer are disclosed. The techniques of the invention avoid the burden of manual configuration by users and system administrators. The network printer is associated with printer description files, a driver, a spooler, and a port monitor....
ABSTRACT VIRTUAIJZATION FOR DIVERSIFIED TAMPKR RESISTANCE
A conipuler-implemcntable method includes providing an instruction sel architecture that comprises Icatures to generate diverse copies of a program, using the instruction set architecture to generate diverse copies ol'a program and providing a virtual machin...
In a digital media system, a method of mapping digital media data in a first format onto a transport format, the method comprising:
obtaining digital media data encoded in the first format; arranging the obtained digital media data in a frame arrangement, the frame arrangement of digital media data having a size an...
High-fidelity transcoding techniques are described. For example, a video transcoder obtains re-coding data set elements for source format compressed video and uses the elements for coding decisions and/or equivalents parameters when compressing the video in a target format. This allows syntax elements and coding de...
ABSTRACT
DELIVERING INDIVIDUALIZED CONTENT OVER A
BROADCAST NETWORK
In various embodiments, a unidirectional broadcast network is utilized to provide digital content to users in a manner that allows users' computing devices to maintain synchrony with personal, relevant information. In at least some embodiments, t...
ABSTRACT DYNAMIC MODIFICATION OF VIDEO PROPERTIES
Aspects of the present invention are directed at improving the quaUty of a video stream that is transmitted between networked computers. In accordance with one embodiment, a method is provided that dynamically modifies the properties of a video stream based on netwo...
Sector menus track a pointer’s position as a pointing device is moved. Each sector menu is a geometric figure bounded by two radii and an included arc of a circle. Menu items are housed in segments formed from multiple radii cutting the sector menu. Users select menu items housed in segments by making a direction ch...
ABSTRACT UPNP AUTHENTICATION AND AUTHORIZATION
A secure handshake service is implemented among a plurality of UPnP (Universal Plug and Play) portable media devices and endpoints in an open network hosting one or more UPnP services. A first portable media device receives a first request for a hosted service from a s...
Methods, systems, and computer program products to serialize user interface objects having custom object types and serialization formats. A serialization manager may coordinate standard serialization providers to identify standard serializers for standard object types or serialization formats, and as needed, may be ...
In accordance vvilh the present invention, a system, method, and computer-readable medium for aggregating the knowledge base of a plurality of security services or other event collection systems to protect a computer from malware is provided. One aspect of the pivseui invention is a method thai proactively protects ...
Systems, methods, and computer products for deriving custom cache dependencies are explained. A framework that includes an extensible cache dependency base class that can be used to derive custom cache dependency classes for invalidating cache entries on some custom condition is disclosed. In some embodiments, a Web...
ABSTRACT OF THE DISCLOSURE RANGED LOOKUPS
A requester may request a ranged lookup operation with respect to an encrypted column of a database. An indexing structure may be used to perform the ranged lookup operation. The indexing structure may include multiple entries. Each of the entries of the indexing structure ...
ABSTRACT IDENTIFICATION AND VISUALIZATION OF TRUSTED USER
INTERFACE OBJECTS
A unique system and method that faciHtates visually identifying authentic UI objects, bundles, or windows is provided. A detection component can detect when user-based input has activated a verification mode with respect to one or more tru...
An architecture employed to create a high quality document, which is a
document that looks good given the type(s) of content to be displayed in the document and the size/dimensions of the displayed document. The architecture can utilize high level templates that broadly define layout constraints to adapt the cont...
A request to render encrypted content is received and a chain of licenses corresponding to the content is located. The chain includes a leaf license linked to the content at one end of the chain, a root license at the other end of the chain, and any intermediate license. The leaf license and any intermediate license...
Systems and methods providing computer-implemented content propagation for enhanced document retrieval are described. In one aspect, reference information is directed to one or more documents is identified. The reference information is identified from one or more sources of data that are independent of a data source...
Transmitter and receiver computing device are interconnected by a network. The transmitter transmits protected digital content to the receiver in a manner so that the receiver can access the content even though the content is directly licensed to the transmitter and not the receiver.
A system and a method for redirecting data packets, the system comprising a stateless bi-directional proxy for redirecting data packets, said data packets including a header and a body, said header including a source address that identifies the source of the data packet and a destination address that identifies the ...
Mechanisms for organizing messages across different message types. This may be accomplished by using a single integrated user interface (201) in which messages across a variety of different message types (211, 212, 213) are represented in a common way. For example, the user experience of placing a telephone call is ...
In a computing system that has access to a set of control points, the set of control points for generating an outline of a graphical object, the outline being utilized to determine how the graphical object is rendered, the position of some portions of the outline potentially being constrained to pre-determined locat...
Extensions or other software applications can have direct access to hardware from within a virtual machine environment. The physical addresses of hardware can be mapped into process space of the virtual machine environment. Similarly, I/O ports can be allowed to pass through into the virtual environment. The virtual...
A method comprising:creating a package that defines a document, wherein the document includes a plurality of parts that make up the document, wherein each of the plurality of parts has an associated name and an associated content type; and providing a plurality of drivers associated with the package, wherein the plu...
System and method for verifying relevance between terms and Web site contents are described. In one aspect, site contents from a bid URL are retrieved. Expanded term (s) semantically and/or contextually related to bid term (s) are calculated. Content similarity and expanded similarity measurements are calculated fro...
An automatic scripting of objects of various complexities in a relational database includes creating a hierarchical object tree from a single or multiple reference passed into the system. Duplicate object references are eliminated in the formation of the hierarchical tree. A dependency list is generated from the hie...
A computer-implemented method for a user interface directed to discovering and publishing presence information on a network, comprising:
determining whether a local user is present on the network;
determining whether a nearby user is present on the network;
instantiating a portion of the user interface for periph...
A facility for applying a software patch is described. Using an automatic patching agent, the facility receives the software patch. In response to receiving the software patch, without user intervention, the facility performs the following acts; First, the facility identifies an instance of an executable module that...
System and method for related term suggestion are described. In one aspect, term clusters are as a function of calculated similarity of term vectors. Each term vector having been generated from search results associated with a set of high frequency of occurrence (FOO) historical queries previously submitted to a sea...
Extensions to operating systems or software application can be hosted in virtual environments to fault isolate the extension. A generic proxy extension invoked by a host process can coordinate the invocation of an appropriate extension in a virtual process that can provide the same support API as the host process. F...
A data model for accessing data in a relational database in an OLAP system utilizes a multiple-hierarchy dimension. The dimension includes a set of attributes. Each attribute is bound to a column in the relational database. A logical structure is defined, indicating the relationships between the attributes. Hierarch...
A computer data structure applied to computer program objects in a tree hierarchy for rendering three-dimensional (3D) models, the data structure comprising:
an object tree hierarchy for rendering a 3D scene;a root object in the tree hierarchy collecting the objects for the 3D scene;one or more group objects in the...
A facility for augmenting software in a target computer system is described. The facility receives and augmentation specification in the target computer system. The augmentations specification specifies; (a) a function to be augmented, (b) a parameter of the function to be tested, (c) a test to apply to the specifie...
Systems and methods for mining service requests for product support are described. In one aspect, unstructured service requests are converted to one or more structured answer objects, Each structured answer object includes hierarchically structured historic problem diagnosis data. In view of a product problem descri...
A facility for automatically processing software patches is described. The facility receives in a computing system a distinguished patch package for modifying the behavior of a programmatic entity. The facility automatically extracts from the distinguished patch package (1) patch application information that identif...
An optimizer/normalizer is used to generate optimized intermediate language representation of an input query, such as an XML input query. A method of optimization of an input query in intermediate language form includes receiving the input query, examining the nodes in a left-depth first manner to identify code patt...
A method system, and apparatus are provided for collaborating on an electronic document. According to the method, a data structure may be maintained at each of the computer system participating in the collaborative session that represents the contents of a shared document. When user input is received at one of the c...
Systems and method for checking security goals of a distributed system are described. In one aspect, detailed security policies are converted into a model. The detailed security policies are enforced during exchange of messages between one or more endpoints. The one or endpoints host respective principals networked ...
An exemplary method of communicating between a host device and a rendering device for controlling a user interface of the rendering device includes generating messages, encoding the messages in a buffer as blobs of data and communicating the blobs of data to the rendering device. Various other exemplary methods, dev...
A system and process for generating a high dynamic range (HDR) image from a bracketed image sequence, even in the presence of scene or camera motion, is presented. This is accomplished by first selecting one of the images as a reference image. Then, each non-reference image is registered with another one of the ima...
A measure expression may include a relationship between measures defined by an arithmetic operation. A query may request a calculation of the measure expression over a selected range of attributes. The request may be processed by retrieving all rows comprising data within the selected range of attributes for each me...
The present invention relates to electronic messaging and, more particularly, to accessing different types of electronic messages through a common messaging interface.
For low fidelity devices without time-date fields, the present invention provides for formatting, identifying and storing time-date information (350) corresponding to remote property values in a standard format (305) on the remote device. The time-date information is parsable by several devices and used in resolving...
An exemplary method involves creating a master session over a first connection through a server; and creating a virtual channel over the connection, the virtual channel operable to communicate a feature session. The method may involve establishing a direct connection that bypasses the server, and switching communica...
A digital ink annotation process and system for processing digital documents and digital ink annotations therein. The process and system maintain an annotation’s position within a document such that the original intent and meaning of the annotation is preserved. This is true even if the document is edited, resized, ...
In a computing system that is in communication with one or more applications that are configured to utilize contact information, a method for providing a contact management system for managing contacts and their corresponding contact information for use by the one or more applications, the method comprising:
creati...
The deployment of packages and their dependents is provided. In an illustrative implementation, an interface operates to expose the components of a package and to determine the dependencies of the components. In operation, a scan is performed on the package components to identify those elements on which the componen...
A computer system and method generate a semantic representation of one or more XML language inquiries across relational and non-relational data sources. A semantic intermediate language representation explicitly describes the meaning of the one or more XML language inquiries. The semantic intermediate language may b...
1. In a computing environment, a method comprising,
receiving a function call via an interface, the function call comprising markup language data; and
interpreting the markup language data to cause data in a scene graph to be modified.
The debugging of breakpoints on pluggable components is provided. In a computing environment having extensible, pluggable components, systems and methods are provided to allow for the setting of breakpoints in the run-time of the components such that errors may be observed, tracked, and resolved. In an illustrative...
The invention deploys a message-based data transport platform, in which a communication engine controls the delivery of server or other backup data or other large quantity data to remote site based on message objects as fundamental units. Data sessions from one or more servers or other data sources may be buffered o...
A software development tool for programming natural language software applications is provided. The software development tool includes a programming language and a compiler. The programming language has a set of programming. The compiler is adapted to take a software programming constructs and to generate a software...
A method for selecting a wireless technology among multiple available wireless technologies on a computing device for establishing a network connection comprising the steps of
maintaining a wireless technology selection framwork comprising a set of factors, wherein one or more of the factors are incorporated into ...
Methods and systems provide approaches to start code emulation prevention at a granularity higher than the bit level. By operating at a level other than the bit level, processing capability requirements on both the encoder and decoder side can be reduced. In accordance with one or more embodiments, a start code emul...
User interfaces, methods, systems, and computer-readable media for activating and/or displaying text input systems on display devices may include: (a) displaying a text input system activation target at a user changeable location on a display device; (b) receiving user input directed to the activation target; and (c...
A software development architecture is provided for constructing a wide rang of software development tools. A software development tool can be created by integrating a specification specifying functionality specific to set of software development scenarios into a software development scenario-independent framework. ...
A system and process for providing translations of applications that may or may not have associated translation tables is described. Core translation tables may or may not be used in conjunction with application translation tables and community translation tables.
The present invention is generally directed to assisting users to position a pointer on a target. Embodiments of the present invention provide a system, method, and computer-readable medium that guide a pointer toward a target. After the pointer is located on a target, pointer movement continues to be adjusted so th...
The present invention provided a system, method, and computer-readable medium that adjusts pointer movement when an input device causes the pointer to intersect one or more alignment areas. Pointer movement is adjusted in the alignment areas to allow user to easily align GUI objects. The adjusted pointer movement is...
A computing system that incorporates an auxiliary processor to the main system processor. The auxiliary system utilizes a separate application runtime for processes and is capable of operating even when the primary system is in an off state. Methods for load-balancing are provided based on computing needs respective...
Techniques are disclosed to provide generic USB drivers. More particularly, a generic USB device driver architecture is described which enables development through a user-mode USB library that accesses a generic kernel-mode driver. In a described implementation, a method includes loading a kernel-mode generic device...
A method and system for controlling which content gets precedence and is replicated. A replica set is comprised of a set of resources. Each resource is associated with resource data and resource meta-data. For files-based systems, resource data includes file contents and attributes, while resource meta-data includes...
A method, computer readable medium and system are provided which generate model driven form user interfaces to represent data models. Using the method, to generate a form user interface to represent a data model, such as a business model, a selection is made to identify which of a plurality of different logical form...
A fast implementation of the 8-point WMV9/VC-9 transform is realized using a sequence of butterfly operations and matrix multiplies. A fast implementation of the inverse transform is realized by applying inverses of the butterfly operations with the matrix multiplies in reverse flow. These fast implementations permi...
Systems and methods are described that enable patching of security vulnerabilities in binary files. The detection and patching of vulnerable binary files is automatic, reliable, regression free, and comprehensive across networks on an unlimited scale. These advantages can be realized in various ways including, for e...
A method is provided for transferring control between a first network interface and at least a second network interface in a same multiple network interface device after the first network interface transmits an identifier generated by the first network interface. The method includes receiving a message from the seco...
Described is a mechanism for receiving new data at an auxiliary device associated with a main computer system, and processing that new data within the auxiliary device firmware to take some action. The receipt and processing of the data is independent of whether the main computer system is in a powered-up state (onl...
A method for modifying the operation of a device responsive to the detection of a remote device is provided. In the method, the remote device is detected, and communication with the remote device are established responsive to the detection of the remote device. A determination is made as to whether a feature of the ...
Methods and systems are provided for mapping content from a first or staring template to a second or target template. An analysis is performed of any content objects and content placeholders contained in the starting and target templates. One or more potential content mappings are generated for potentially mapping c...
A metadata management architecture. The architecture includes a property component that lists one or more properties related to a file, and a viewing component that present files having one or more of the related properties. A synchronization component provides immediate synchronization between property editing fi...
The techniques and mechanisms described herein are directed to controlling communication paths between conference members in a decentralized multi-party conference that supports a full mesh architecture. Several check points are tested in order to handle concurrency issues and to ensure quality of service. First, a ...
Resources of a video presenting network having plural outputs can be configured. A provisional configuration can be supported. Configuration of inputs can be performed separately from configuration of outputs. Interdependencies between network resources can be considered to restrict provided options to those co-fimc...
A method and system for ranking documents of search results based on information richness and diversity of topics. A ranking system determines the information richness of each document within a search result. The ranking system groups -documents of a search result based on their relatedness, meaning that they are di...
Methods and systems are described herein for extending configuration dependent extensible software programs. Classes of a core extensible software program may be extended by adding a configuration dependent extension. The extensions may be added statically prior to compiling the core version of a software program or...
A system and method for ensuring that having invalid or corrupt states are restricted from accessing network resources are provided. A quarantine coordination client (QCC) located on a client machine acquires statements of health from a plurality of quarantine policy client. The QCC packages the statements and provi...
Various embodiments of the present invention are directed to systems and methods for to an improved user interface shell for small computer devices (SCD)s that execute typical operating systems and application programs. Several embodiments of the present invention are directed to a shell task user interface (STUI) t...
The present invention extends to methods, systems, and computer program products for discovering, qualifying, and activating software add-in components. An add-in components manager discovers one or more add-in components at the computer system are of a specified type of add-in component requested by an applicatio...
In an administrative tool environment, user input is supplied to an administrative tool framework for processing. The administrative tool framework maps user input to cmdlet objects. The cmdlet objects describe a grammar for parsing the user input and input objects to obtain expected input parameters. The input obje...
Systems and methods of a Web service for remote terminal service application discovery are described. In one aspect, a Web service in an Intranet is provided. The Web service is coupled to a public network. The Web service facilitates remote client computer discovery over the public network of information correspond...
Modular content framework and document format methods and systems are
described The described framework and format define a set of building blocks for
composing, packaging, distributing, and rendering document-centered content,
These building blocks define a platform-independent framework for document
formats t...
A method and system for adapting a computing device in response to changes in an environment surrounding the computing device, or in response to the user"s stated preferences. The computing device includes one or more sensors that sense the environment. A changed characteristic of the environment is detected. A dete...
In accordance with various aspects, the present invention relates to accessing and publishing documents between two computer systems or nodes that are connected together in a network environment. The system and method for name resolution stores an identity information document containing a user-friendly handle signi...
A centralized user interface provides for sharing resources between a user and a contact that the user interface is centered around. When the user opens the view of the contact record, the user is provided with a section corresponding to resources shared by the user with the contact and another section for resources...
A user is able to informatively control how contact information is provided to one or more applications through the use of a persona interface object (210), corresponding personas (220) and contact information, and an information picker interface (300). The persona interface (210) identifies available personas (220)...
A system and related techniques manage the adding of digital images or other media to email messages using a comparatively straightforward insert-and-send scheme. A user may choose to insert or embed comparatively low-resolution v ersions o f i mages o r other media automatically published to a media server into an ...
A system and method for presenting a plurality of items of multiple types to a user. A universal data store is provided which contains a plurality of items. A portion of the items contain metadata stored in accordance with an item decoration schema. A shell presents items with corresponding metadata with an item dec...
Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A pr...
A method (900) of providing Resource-Event-Agent (REA) model based security includes identifying (905) an association (515) between a first object (505) and a second object (510), where the first object is the Agent type and the second object is any REA object. Then, an association Class (520) is created (910) for t...
A system and process for managing the presentation of windows on the display screen of a computing device is presented. This is a multiple-mode window presentation system and process that displays one or more of the peripheral GUI elements typically displayed on the display screen in addition to a window (402), such...
The present mechanism provides various capabilities for resolving strings within a command string. The present mechanism operates within an interactive operating environment by receiving a plurality of strings. For any string this is partially resolved, the mechanism initiates analysis for completely resolving the s...
A computer is provided with an isolated computing environment. The isolated computing environment is adapted to allow initial programming for use in manufacturing, distribution and sales. The isolated computing environment further allows an authenticated source or authenticated code to update the isolated computing ...
Described is a system and method in a wireless (Wi-Fi) network comprising a server, clients and various mechanisms that compute lists of other clients and resources that are physically nearby. Clients report Wi-Fi access points" signal strengths to a server, which uses that data to compute the proximity of resources...
Model-based application management arehitecture. A developer can describe an Application or service in terms of its constituent components. Desired states can be described in terms of functionality, configuration, security, and performance. The description is employed at application installation to configure managem...
Described is a mechanism for enabling an application operating as a web
application to transition to a client-side application without impacting a user"s
interaction with the application. The progressive installation transitions through
three states: a start-up state, a demand state, and an install state. During ...
The present mechanism provides a data driven command line output within an environment that supports a pipeline of object-based commands. Each object-based command inputs a parseable object for processing and outputs another parseable object for subsequent command processing. The mechanism is operative to direct for...
Various embodiments provide the ability to simultaneously spawn a search across multiple different data providers. In at least some embodiments, the simultaneous spawning of the searches takes place in the context of a tabbed browsing environment. There, individual tabs of a browser are each associated with a differ...
A task oriented user interface (208) increases ease of use of the system because the user is guided through the system. The tasks resemble how the user thinks he/she should do the job. This aids and assists the user in doing the job.
Described are techniques and mechanisms directed at enabling a markup transformation that is localizable generally stated, a transform receives as input two things (1) an input document containing markup, and (2) transformation instructions including an identifier of a particular element that has different values ba...
Techniques for secure federation of data communication networks are provided. The techniques employ an edge proxy server to route messages depending on a federation mode. In Direct federation mode, an edge proxy server of a network is configured to exchange messages with a specified set of entities, such as other ne...
A generic smart Tag module has a generic recognizer and a generic action handler. The generic module is provided for a platform with access to a repository having Smart Tag configuration information and recognizers and action handlers for each host application residing in the platform. The repository may be a shared...
A method and system of multi-channel echo cancellation using round robin regularization. The multi-channel round robin regularization echo cancellation method includes applying a plurality of adaptive filters, each having an inverse correlation matrix, to the multi-channel playback signal. Each of the plurality of a...
A system and method for empowering consumers in a retail environment. Among many oter features, the present invention provides a number of menu and item list features to enhance a shopper's experience in a retail environment. In addition, the invention provides an item-level location mapping feature. By the use of t...
Sharing data within an instant messaging session is described. A user participating in an instant messaging session request a data access key. The key, which provides access to data associated with the user, may then be transmitted via the instant messaging session to one or more other participants in the instant me...
Best practice guidelines are integrated into the design of database applications so that it is less likely that inappropriate values are set. A proposed value for a database objct may be compared to an archive of best practice guidelines. If the proposed value does not comply with best practice guidelines, a best pr...
The present mechanism allows commands entered on a command line in a command line operating environment the ability to execute in a first execution mode or an alternate execution mode. The command is executed in the alternate execution mode if the command includes an instruction to execute in the alternate execution...
A method describes user interaction in combination with sending a send item from an application of a computing device to a recipient. The computing device has an attestation unit thereon for attesting to trustworthiness. The application facilitates a user in constructing the send item, and pre-determined indicia are...
Trace and replay objects can be designed to automatically perform operations concerning database trace data upon invocation by custom computer processes. Trace data can be saved to any of variety of locations. It can be manipulated for the purpose of storage or replay. Trace data can be played back against any datab...
A method and system for ranking objects based on relationships with objects of a different object type is provided. The ranking system defines an equation for each attribute of each type of object. The equations define the attribute values and are based on relationships between the attribute and the attributes assoc...
Orthogonal pulse polarity modulation involves wireless communication in which the polarity of modulating pulses are set responsive to positive and negative character values of a corresponding code sequence. In a described implementation, data is converted to chip waveforms, spectrum lines are removed, and pulses are...
A dynamic software activation system allows activation and deactivation of an operating system based upon a desired business process. The dynamic software activation system allows a user to request usage of the operating system for a specific period of time, for a specific amount of usage, or in any other desired ma...
A software provisioning method and apparatus use a provisioning packet delivery mechanism having a database, a distribution service, and a confirmation service to receive, queue, and confirm delivery of provisioning packet to a computer. When the number of unconfirmed delivery requests exceeds a limit the distributi...
Plural levels of detail of a terrain are stored in memory in regular grids. In one such example, a terrain is cached in a set of nested regular grids obtained from the plural levels as a function of distance from a viewpoint. In one such example, the plural levels of detail of terrain comprise terrain elevation and ...
.
A pay-per-use or metered-use computer uses a balance manager to monitor usage and update a value balance according to a first usage schedule when the computer is in active use. When the activity level of the computer is reduced below a threshold, the balance manager may update the value balance according to ...
Systems and methodologies are provided for efficiently performing concurrent transactions by multiple users, and tracking data at a logical level beneath a physical level of the object being modified. Each transaction can copy a committed version of the data segment to be modified to its reswpective space, and can u...
A computer is adapted for pay-for-use operation by adding an isolated computing environment to a standard computer. The isolated computing environment may include a trusted non-volatile memory, a digital signature verification capability, a clock or timer and a logic circuit for triggering execution of a validation ...
A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing environment boots prior to any boot device associated with an operating system, runs concurrently with the operating system and monitors and measures the co...
A search system generate an index for database by generatively sampling the databases and uses that index to identify and formulate queries for searching the databases. The generated index is referred to as a domain-attribute index and contains a domain-level index and site-level indexes. A site-level index for a da...
The present invention provides Plug and Play (PnP) functionality for devices that are not supported by an operating system. In response to the installation of an unsupported device, the operating system sends the event to a device manager application residing in user mode code. Upon receiving the event, the device m...
A global optimization framework for optical character recognition (OCR) of low resolution photographed document that combines a binarization-type process, segmentation, and recognition into a single process. The framework includes a machine learning approach trained on a large amount of data. A convolutional neural ...
A number of members of a user defined type may be designated as delayable members. During an initial fetch of the type, the type may be returned from the database without the delayable members, thereby preserving valuable bandwidth and reducing the amount of time required to perform the initial fetch. Upon request, ...
A system and method are provided for correcting an image captured by a digital image capturig device. The method includes calculating a log of a desired correction value based on sample point and a target value for that point and calculating an approximation to the log of illumination based on an input pixel intensi...
A method for reactivation of software products includes activating a first software product associated with a reactivation policy group. A hardware identifier derived from the computer hardware configuration is bound with the first software product activation. A second software product is activated having an associa...
A method and system for measuring the similarity of objects based on relationships with objects of the same type and different types and similarities of those objects to other objects is provided. In one embodiment, the similarity system defines intra-type and similarity functions for each type of object. The simila...
Impact analysis provides the ability to determine the objects that a particular object depends on or uses, as well as determine the objects that are dependent on or use particular object. The term object may refer to tasks and/or object types, for example. Impact analysis is desirable for improving user productivity...
Evaluating an electronic document in connection with search. An external source provides data for use in evaluating an electronic document retrieved by a search engine. A first confidence level of the electronic document is determined based on the externally provided data. The first confidence level indicates a like...
A method for segregating traffic among a plurality of end stations associated with a single
network access point comprising: a first end station from among said end stations receiving
frames transmitted from said single network access point, some of said frames belonging to a
first subset of said end stations to ...
User interfaces arc defined by metadata for use with productivity suite applications in a wrapped window, a task pain, or some other suitable representation. Data can be bound to a data source in a one-way format such that changes from the data source propagate to property fields in the UI form. Data can also be bou...
A method, system, and apparatus for discovering and connecting to data sources are provided. A system is provided that includes a server computer operative to maintain a centrally managed repository of data connection definitions. A client computer is also provided including an application program capable of consumi...
A system and related techniques generate an update to control programming, such as firmware, to embed in an electronic document and transmit to a printer, facsimile or other output device. Compatible printer or other output devices according to embodiments of the invention may contain an intermediate language interp...
The principles of the present invention relates to appropriately rendering a graphical object when a corresponding outline lacks necessary control points. A computer system calculates the target width for a feature of the graphical object. The computer system calculates the position of a center line corresponding to...
A method, system and apparatus are provided for exposing and utilizing workbook ranges as server data sources. The system includes a client computer capable of executing a spreadsheet application program for creating a workbook including a range that includes data objects. The workbook may be published to a server c...
A monitoring service is provided that detects spyware or other unwanted software at the time it is installed and/or allows for the spyware"s removal. The service monitors "Auto-Start Extensibility Points" ("ASEPs") to detect spyware installations. ASEPs refer to the configuration points that can be "hocked" to allow...
A method stores, uses and suggests terms in a business solution software program having multiple languages (710). Instead of only searching for a general use of a term based on its text (741) and general use (734, 735), one can search for a term based on a specific use in a module. Each term is assigned its own uniq...
A type of an object that can be persisted in a database store is defined by a user (Figure 7). The type definition comprises fields and behaviors, each field having a respective data type. One or more fields of the type definition may be designated as containing data of a type that is to be stored as a file outside ...
A language schema that integrates multidimensional extensions (e.g., MDX) and data mining extensions (e.g., DMX) for performing data mining operations on data residing in OLAP cubes. The schema provides that the can not only be a relational query, rather a multidimensional query formed using MDX, for example, for e...
Techniques and tools are described for recording and reliably replicating graphical user interface (“GUI”) activity for various applications, including application that have dynamic user interfaces. The techniques and tools may be used in combination or separately. For example, a recording tool receives internal mac...
A web content management server allows for the automatic creation, management and publication of variant objects from a parent. The variant object is created as a copy of the corresponding parent object and may then be modified. Each object includes a pages list that identifies all associated objects and the content...
A method, system, and apparatus are provided for identifying unresponsive portions of a computer program. According to the method, program code that can potentially result in unresponsive behavior is wrapped in timers. A timer is started on a background thread at the beginning of the execution of a section of progra...
The present systems and methods disclose a system for personalizing computer functionality. End-users are provided with tools to easily write rich and complex preferences, for example, by using a plurality simple IF-THEN propositional logic. The preferences are then transformed into queries and executed efficiently ...
The operation of a data flow is improved by providing for validation of the consistency of the data flow with the external data files it works with, even in the face of changes in those external data files. Metadata is stored regarding the external data files. Because external data files may change, this metadata is...
The present systems and methods disclose a system for personalizing computer functionality. End-users are provided with tools to easily write rich and complex preferences, for example, by using a plurality simple IF-THEN propositional logic. The preferences are then transformed into queries and executed efficiently ...
A method, system and apparatus are provided for exposing and calling workbook models via remote function calls according to the system, a client computer executes a spreadsheer program for creating a workbook model. The workbook model may be published to a server computer along with data defining a function name and...
The present invention includes a system and method for transiting potential malware devices into sale program code. The potential malware is translated from any one of a number of different types of source languages, including, but not limited to, native CPU program code, platform independent .NET byte code, scripti...
A user control for dynamically ajdusting the scope of a set of content, information, adn/or data and a user interface (UI) for representing the same are provided. A scope control toll represented, e.g. by a selectable icon, may be accessible from all screens in the UI and may be applied to both traditional list-ty...
Methods and apparatuses for supporting a color management system that processes an image in accordance to a hierarchically-structured policy are provided. The policy may be modeled with a schema in which the policy is organized with a plurality of policy levels. Policy settings at a lower policy level may override p...
An exemplary method for performing a bit block transfer (bitblt) includes receiving one or more graphics parameters specifying the bitblt and generating a specialized bitblt function to perform the bitblt. The specialized bitblt function includes a one or more code blocks selected from a superset of code blocks base...
Methods and systems are provided for establishing a hierarchical relationship between a parent or master project schedule and sub-project schedules including tasks and phases required for completion of the parent or master project. When changes are made to data contained in a given parent or master project schedule ...
A network is audited by running task programs and evaluating the results of the task programs. Task programs are tools that are configured to retrieve information about a particular network device. A service is arranged to coordinate the scheduling, execution, and data collection and aggregation of each task program...
Search results of a search query on a network are ranked according to an additional click distance property associated with each of the document on the network. The click distance is measurement of the number clicks or user navigations from a pages or pages on the network designated as highest authority or root page...
The present invention provides several database formulas that can manipulate large sets of data. Each database formula is customizable and repeatable without user intervention. This, users may enter numerous options that can cover the user’s desire for data output in certain forms of formats, select a set of input d...
A computing system for the publication of actions associated with the current context of an entity, such as a business object is provided. The computing system has a component that stores entities, a component that stores the actions associated with the entities, and a software component that provides information ab...
Transport agnostic pull mode messaging service enables clients of diverse types to send and receive messages to one another while guaranteeing delivery of messages. Client specific adapters connect to a server and pull messages waiting for them in a queue. Clients may specify themselves as the recipients of the pull...
A method, system, and apparatus for providing information related to a location or geographic region. When a string is entered into an application program, the string is analyzed to determine whether the string relates to one or more locations or geographic regions. If the string relates to a location or geographic ...
A method system for the graphical formulation of filter queries is disclosed which enable data queries to be easily via selection form a menu. A signal is received to filter, or query, a data table. Next, the context of the signaled key field is analyzed, and a menu of filters based on that context is formulated and...
In an embodiment, techniques for sustaining session connections are provided. The techniques send heartbeat messages when not sending a message may cause the session connection to close because of a timeout condition. Heartbeat messages are valid transport layer messages that will be ignored by protocols at higher l...
A method of performing stretch-driven mesh parameterization. A method of performing stretch-driven mesh parameterization comprising, computing a spectral analysis to parameterize a mesh, and iterating a stretch optimization calculation to further optimize the initial parameterization
A method for rendering a chart associated with a document includes translating a chart object into a shape-based chart definition, wherein the chart object defines the chart with chart elements, and the shape-based shape definition defines the chart with shapes, and maintaining the chart object in the document to en...
A method and apparatus are provided for generating a document preview. According to the method, a preview handler provides an interface to one or more previewers. The previewers are software components capable of generating a visual preview for one or more document types. In response to a request from a host applica...
A set of index keys is included in an index search system that are associated with the scope of the search rather than the content of the documents that are the target of the search. These scope related index keys, or scope keys allows the scope of the search to be selected, reducing the number of documents that a s...
A technique for updating collection-valued and other complex structured columns in a nested table using a nested extension of an UPDATE statement that uses syntax and semantics to modify collection-valued columns in a way that is analogous to the syntax and semantics of the UPDATE statement that is used to modify sc...
A method of constructing a representation of an object (410) having at least one property includes identifying (905) at least one property group (460) associated with the object which has been chosen to represent the object. At least one property of the object belongs to each property group identified as being assoc...
Search results of a search query on a network are ranked according to a scoring function that incorporates anchor text as a term. The scoring function is adjusted so that a target document of anchor text reflect the use of terms in the anchor text in the target document"s ranking. Initially, the properties associate...
The present invention provides method and apparatus for supporting a legacy application programming interface (API) set between a component and a color management system. The legacy API set supports both the new capabilities as well as the legacy capabilities. The color management system determines the format type f...
Several embodiments of the present invention comprise a storage platform that provides a synchronization service that (i) allows multiple instances of the storage platform (each with its own data store) to synchronize parts of their content according to a flexible set of rules, and (ii) provides an infrastructure fo...
A system and method for facilitating communication between a mobile device and a network application are provided. A mobile device transmits a request for data change information that includes a time out interval. The network application receives the request and measures a time elapsed since the receipt of the data ...
Systems and methods for reboot less updating of a 1HV display driver are disclosed. According to such a method, first, the operating system stops the driver from running. Second, the system switches over to an interim or temporary display driver, which be a default driver provided with the operating system. Third, t...
Methods server usage information and organization information related to the market/organizational context in which the server is operated. Server information is collected from servers and is sent over a network. Server usage information may be obtained by receiving server information over a network and processing...
A system and/or methodology to track and organize database application data in response to a delete, insert or update procedure. More specifically, a system and/or methodology that employs a version-based retention and linkage approach with respect to triggering implementations is provided.
a method for dynamically applying a rights management policy to a message by allowing an administrator to associate certain rights management policies with certain senders and recipients of messages, with groups of users possessing certain common criteria which define the users and groups of users, with certain attr...
A system and process for generating, and then rendering and displaying, an interactive viewpoint video in which a user can watch a dynamic scene while manipulating (freezing, slowing down, or reversing) time and changing the viewpoint at will. In general, the interactive viewpoint video is generated using a small nu...
The present invention allows for a pre-licensing process for content that is subject to rights management in order to allow a principal (335) access to the content when the principal (335) does not have access to the rights management server (315). Rather than requiring the principal (335) to submit a rights account...
The present invention provides a framework to facilitate interoperability and interactions with a plurality of line-of-business (LOB) applications. In particular, maps are populated with application or system design information such as semantic and technical data. The maps are subsequently employed by the framework ...
Several embodiments of the present invention comprise a storage platform that provides a synchronization service that (i) allows multiple instances of the storage platform (each with its own data store) to synchronize parts of their content according to a flexible set of rules, and (ii) provides an infrastructure fo...
In a hierarchical taxonomy of document, the categories of information may be structured as a binary tree with the nodes of the binary tree containing information relevant to the search. The binary tree may be "trained" or formed by examining a training set of documents and separating those documents into two child n...
Verifying dynamically generated operations on a data store includes carrying out setup actions for access to the data store, the setup actions being based at least in part on a request for which the dynamically generated operations will be generated. The carrying out of setup actions includes permissions being set f...
A system for unifying heterogeneous multimedia tuners is described. The system is capable of producing a unified channel lineup and coordinating multiple diverse tuners to perform multimedia tasks associated with the unified lineup. In one implementation, tuner allocation policy allows behind-the-scenes tuner assign...
A system and method are provided for combining an instant messaging experience with a primary media experience in a multimedia system. The method includes providing an instant messaging user interface component and displaying the instant messaging user interface component as an overlay on a screen displaying the pri...
Rules architecture that facilitates data management of an application such that the application can be personalized by the end-user for the end-user. Included is a customization component that facilitates the exposing of an application generated event to an end-user. A rules component allows the end-user to create o...
A system and method for link quality routing uses a weighted cumulative expected transmission time path metric. A system for routing in a multi-hop ad hoc network, and a method for measuring the link quality of a route in the network, include assignment of a weight to a link in accordance with an expected transmissi...
A distributed computing system can be operated in a fault tolerant manner using a set of computing devices. A set of computing devices can tolerate a number of failures by implementing identical replicas of a state machine and selecting proposals. The set of computing devices participating in the distributed computi...
A method for performing a consistency check on a database backup of a database is performed without requiring a full recovery of the original database from the database backup. Instead, a database view may be used as a smaller storage requirement tool for providing a transaction-consistent view of portions of an exi...
A method of performing a snapshot query in a database undergoing recovery allows access to the database during rollback or undo operations (Figure 2). The method includes allowing the query to detect whether a redo lock is present on a data item and if so, waiting until subsequent rollback operations release the loc...
The present invention provides the ability to compare and enforce policies between trusted entities within a rights management system. For example, policies (355) between the two entities (325,330) may be received by either entity. They may then be compared to determine the compatibility of the two policies. If comp...
A workflow schedule authoring tool enables a user to author a workflow by arranging building blocks in a particular order. Building blocks may correspond to events, conditions or actions. Each building block is associated with source code that defines an action to be taken when the building block is processed. The o...
Indexed views or materialized views are used as a secondary index on a base table with multi-valued attributes. This provides for using the index to search in the nested data. Moreover, indexing is provided on the result of an unnest operation. Indexing a view on the result of an unnesting operation provides the abi...
A distributed computing system can be operated in a fault tolerant manner using a collection of auxiliary computing devices and more main computing devices than the number of faults the system can tolerate. A quorum of all of the main computing devices can be used. In the event of a failure, an alternative quorum fr...
A method and apparatus for receiving strokes of electronic ink in more than one language is provided. An input device is used to enter at least one stroke of electronic ink into a processing device. The processing device stores a language indication associated with the electronic ink, such that the language indicati...
A framework for a security system is described. The framework may be used to track which security engines are available to enforce security policies. A security engine is a software resource that enforces security policies designed to help ensure that a vulnerability of an application or operating system cannot be e...
The present invention includes a graphics software program that automatically creates graphical content when a user creates or modifies a hierarchical list of content data and chooses from one of a plurality of graphical definition choices for the graphical elements. In addition, the present invention includes a use...
A method for developing and managing workflow is disclosed. The method enables the development of workflows from workflow templates and/or preprogrammed components; associating a workflow with a schedule; modeling a workflow as a plurality of tasks and a plurality of human-to-human or human-to-computer interaction p...
Efficient hierarchical searching is based on object type (500, 510, 520, 530). By pre-computing additional information and storing it in a fast-lookup structure, it is possible to quickly identify objects (900) that satisfy an object (900) retrieval request. Furthermore, it is also possible to use this technique to ...
Embodiments of the invention involve a method of concurrent processing of chain calculations using multiple processors each having a separate recalculation engine in a spreadsheet program. The operations basically include first determining a number of available processors, then allocating a recalculation engine to e...
A method for disseminating resource information over a network, comprising:
receiving, at a source entity, a consumer"s request for resource information;
processing the request at the source entity to determine whether there are any resources designated as shareable over the network that meet the request and which...
A program (324, 320) that includes expressions written in a process-based language for representing protocol-based applications as processes is disclosed. A process kernel (320C, 306C, 304C, 308C) executes the expressions in the program. The expressions specify the interactions of processes by allowing a named organ...
The present invention provides a novel file (120) management approach. The schema-based file management (110) technique that can be integrated within an operating system to provide application developers an efficient and powerful develop utility to build applications. The applications employ uniformly across dispara...
A system and process for ensuring the smooth flow of electronic ink (1203) is described. Dynamic rendering (1201) is give priority over other event handlers. Priority may be the use of one or more queues (1205, 1206) to order when events occur and may be performing dynamic rendering (1201) prior to other steps.
...
The present invention relates to a system and method of data restoration, for instance, after the occurrence of a user error. In particular, snapshot database can be maintained that stores a copy of database data. The snapshot database does not have to store a complete copy of all data on a source database, but rath...
A system and process for computing a 3D reconstruction of a scene from multiple images thereof, which is based on a color segmentation-based approach, is presented. First, each image is independently segmented. Second, an initial disparity space distribution (DSD) is computed for each segment, using the assumption t...
In a protected media path for delivering content from a source to a sink, a source authority (SOTA) on behalf of the source decides with regard to a policy corresponding to the content that a particular type of action with the content is to be refused, and provides a particular enabler to an application. The provide...
Disclosed is a method for dynamically applying a rights management policy to a message by allowing an administrator to associate certain rights managements policies with certain senders (100) and recipients (208) of messages, with groups of users possessing certain common criteria which define the users and groups o...
The present invention describes an efficient and fast framework for implementing table-valued fonctions (TVFs) in a relational database server (Figure 2). The framework provides desirable extensibility properties and has the ability to minimize performance degradations by integrating tightly with the optimization in...
An electronic "To-Do" bar is provided in which displayed upcoming tasks, meetings, appointments and the like. The electronic To-Do bar is displayed in a lightweight menu of tasks, meetings and appointments and is displayed persistently in addition to other software functionality or user interfaces displayed on a use...
An improved system and method for personalizing recognition of an input method is provided. A trainable handwriting recognizer may be personalized by using ink written by the user and text authored by the user. The system includes a personalization service engine and a framework with interfaces for collecting, stori...
The present invention relates to a system and methodology to facilitate interoperability and compatibility between disparate data systems. In one aspect, a file transformation system is provided having at least one file associated with one or more unstructured properties. A file property handler manipulates the unst...
A method of conditionally formatting a display of data is disclosed that involves providing a preliminary display automatically showing the intended consequences of the condition applied to the data prior to making the condition actually apply to the data. This is especially useful in analysis of spreadsheet data by...
A method of generating a call sign. A method of generating a call sign comprising determining a distinguished qualifier, finding a distinguished salt, and hashing the distinguished salt with the distinguished qualifier.
A method and computer-readable medium are provided for previewing and performing actions on attachments to electronic mail messages. A first window pane is displayed that includes a list of e-mail messages and information identifying any attachments to the e-mail messages. When an attachment is selected, a preview i...
A method and system for detecting whether an outgoing communication contains confidential information or other target information is provided. The detection system is provided with a collection of documents that contain confidential information, referred to as "confidential documents." When the detection system is p...
Providing a rich user experience on a network client in which personal information management (PIM) data from a plurality of data sources is aggregated and displayed to the user. An aggregation system connects to data sources and maps attributes of PIM data in the data sources to a common object model. An object of ...
Methods and systems are provided for managing dependencies between projects in a project management application. The methods and systems utilize one or more project webs which are shared web-based collaborative workspaces for managing dependencies between projects.
Migration of a user state from a source computing device to a destination computing device using a state migration point (SMP) is disclosed. The destination computing device maybe the same as the source computing device but with a different operating system. The user state is securely stored by the SMP until the use...
Systems and methods that implement interactivity as part of a workflow itself. Data is passed in and out of the workflow to form an interactive workflow, via employing an interactive activity component. Such interactive activity component models suspension points within a workflow dcfmition, wherein user input and a...
Feedback and frame synchronization between media encoders and decoders is described. More particularly, the encoder can encode frames that are based on source content to be sent to the decoder. The encoder can determine whether the frame should be cached by the encoder and the decoder. If the frame is to be cached, ...
A delay of starting up of certain applications may result in improving the overall performance of a system. The applications to be delayed may be placed in a container object or box such that they can be tracked and that other applications dependent on the delayed applications can be appropriately handled.
...
An accounting method can insert changes that affect average cost calculations after
the initial average cost calculations. The method can go back in time and add in transactions that affect average cost and re-calculate average cost based on the added entry to all entries after the added entry.
...
[0092] A transmitting node may utilize a shared secret to secure at least an encapsulated address component of an outbound message, and a receiving gateway may utilize the shared secret to authenticate and validate the secured addressed component of the received message.
Systems and methodologies for integration of an anti virus AV Plug In(s) as part of an Item Store. The semantics for operation of the AV Plug In(s) are provided by the relational Item Store, via employing a metadata component and a scanning component associated with the Item Store. The metadata component can supply ...
Aspects of the subject matter described herein relate to resource replication systems. In aspects, a mechanism is described that detects when local resources are stale. Local resources may be stale when the time between a last successful synchronization activity and a current time exceeds a staleness value. If th...
A method and apparatus are provided for determining uncertainty in noise reduction based on a parametric model of speech distortion. The method is first used to reduce noise in a noisy signal. In particular, noise is reduced (304) from a representation of a portion of a noisy signal to produce a representation of a ...
Methods and systems enable content authors to achieve frame-accurate editing and, in at least some embodiments, reduce the amount of content that needs to be decompressed in order to operate on the frames. Some embodiments ensure that bit rate integrity is preserved so that bit rate conditions associated with stream...
A leaching chamber (20) has sidewall perforations (30) which slope downwardly from the interior to the exterior of the chamber, and which flare inwardly, so that the smallest perforation dimension is on the exterior surface of the sidewall (40). Mold cores (200) having inwardly retracting slides are used to form the...
An algorithm is provided for optimizing the layout of labels associated with a visual data object such as a chart. The labels are first placed into a chart definition file that defines the labels as a shape. An initial layout of the labels is created and scored. The shapes are then manipulated iteratively until an o...
Session description message extensions include information describing a multimedia presentation or a single media presentation. The session description message is typically sent from one device to another device to which the multimedia or single media presentation will be streamed. Several extensions are described t...
Systems and methods for data broadcasting and power management techniques for data broadcast receiving devices are disclosed. A data broadcast receiving device receives a broadcast schedule from a data broadcast server and correlates the broadcast schedule with profile information in the data broadcast receiving dev...
An object model is provided as a general framework for managing network services, such as firewall services. A user or an administrator of a computer may utilize the object model to manage and configure the firewall services. The object model isolates a user and/or an administrator from having to deal with the many ...
Systems and methods for automatically building up an equation entered into a computer system can include an input module that accepts input of the equation in a linear string format, and an interpret module that interprets the input and automatically determines when a buildup point is reached. Systems can further in...
ABSTRACT SHARED SPACE FOR COMMUNICATING INFORMATION
Embodiments provide a shared space for communicating information. In an embodiment a number of users associated with a computing environment can use a shared space to communicate information with one another. Each computing device of the computing environment can ...
ABSTRACT
MESSAGE FORWARDING BACKUP MANAGER IN A DISTRIBUTED
SERVER SYSTEM
[0067] A distributed server system may include a primary manager, one or
more backup managers communicatively coupled to the primary manager, and one or more workers communicatively coupled to the one or more backup managers. The one ore m...
In a method of entering text into a device a first character input is provided that is indicative of a first character of a text entry. Next, a vocalization of the text entry is captured. A probable word candidate is then identified for a first word of the vocalization based upon the first character input and an ana...
An "object extractor" (260) automatically identifies and segments repeating media objects in a media stream (210). "Objects" are any section of non-negligible duration, i.e., a song, video, advertisement, jingle, etc., which would be considered to be a logical unit by a human listener or viewer. Identification and s...
A foveated panoramic camera system includes multiple cameras oriented so that individual images captured by the cameras can be combined to form a panoramic image. Each of the cameras includes a lens having a focal length that corresponds to a field of view for the camera. A field of view for a camera overlaps with t...
Many media streams (210) con lain "objects" that repeat Repeating objects in a media stream are defined as any section of non negligible duration, i.e , a song, video, advertisement, jingle, etc , which would be considered to be a logical unit by a human listener or viewer An "object controller" (300) identifies suc...
A low-cost, steerable, phased array antenna suitable for use in wireless fidelity (WiFi) and other wireless telecommunication networks, in particular multi-hop ad hoc networks, is disclosed. Various embodiments of an antenna assembly that includes a plurality of linear phased array antennas fed by corporate feeds ar...
Search and information systems are provided that facilitate ranking of promotional material such as advertisements in view of personal information related to users who search for information from public databases. In one aspect, a search and information system is provided. The system includes a search component to l...
Systems and methods for supporting custom report layouts allow features that may be available to supported report layouts to also be made available to custom layouts. A custom layout definition may first meet a set of report definition criteria so that it is recognizable to report processing software. A design tool ...
Methods of using a soft keyboard are disclosed. A soft keyboard having one or more soft keys with a symbol displayed on the one or more soft keys is provided. A modifier may be applied to one of the symbols displayed on one of the soft keys by selecting the soft key and then providing a directional input. In an embo...
An improved user interface is provided for displaying a gallery of images showing different formatting options combinations that may be applied to a selected object. When a particular image is selected an associated formatting options combination is automatically applied to the selected object.
...
A blended result image is computed using guided interpolation to alter image data within a destination domain. The destination domain may be altered based on a guided interpolator that is either dependent or not dependent upon a source image. When blending a source region into a destination region of an image, guide...
A method and system for calculating the importance of persons based on interpersonal relationships and prioritizing communications based on importance of participants in the communications is provided. A prioritization system identifies relationships between persons and identifies the importance of a person to other...
Apparatus and methods for performing quantum computations are disclosed. Such apparatus and methods may include identifying a first quantum state of a lattice a system of quasi-particles disposed thereon, moving the quasi-particles within the lattice according to at least one predefined rule. Identifying a second qu...
The present comparison technique operates on objects having the same type, similar types, or different types. Multiple comparison objects may be compared against one or more reference objects. The comparison objects may be obtained from a prior cmdlet in a pipeline of cmdlets operating in an object-based environment...
A system and method for securely delivering the location information of a mobile device to a location consumer is presented. In operation, the mobile device user issues a license to a location consumer. The license identifies the location consumer and any conditions the mobile device user places on the license. The ...
Described herein is an implementation that produces a new representation of a digital good (such as an image) in a new defined representation domain. In particular, the representations in this new domain are based upon matrix invariances. In some implementaions, the matrix invariances may, for example, heavily use s...
The present invention relates to a computer readable medium having instructions that, when implemented on a computer cause the computer to process information. The instructions include a declarative logic module adapted to define a semantic object having at least one semantic slot and a procedural logic module adapt...
Techniques are disclosed to provide more efficient and improved border matting for extracted foreground images, e.g., without requiring excessive user interaction. Border matting techniques described herein generate relatively continuous transparency (or alpha values) along the boundary of the extracted object (e.g....
Techniques and tools are described for scalable video coding and decoding. For example, a 3D sub-band decoder receives video encoded using spatial-domain motion-compensated temporal filtering at a first spatial resolution. The decoder decodes at least part of the video for output at a second spatial resolution lower...
The described systems, methods, and data structures are directed at automatic configuration of transaction-based performance models Models of an infrastructure are created and automatically configured used data provided by existing management tools that are designed to monitor the infrastructure These automatically ...
A method and system for providing input into a computer includes receiving input speech from a user and providing data corresponding to the input speech. The data is used to search a collection of phrases and identify one or more phrases from the collection having a relation to the data. The one or more phrases are ...
The present invention relates to a system and methodology that applies automated learning procedures for determining document relevance and assisting information retrieval activites. A system is provided that facilitates a machine-learned approach to determine document relevance. The system includes a storage compon...
A system and method for implicit synchronization of user interface automation code with code of a computer program. A synchronization API is called that hooks into the message-qucuc of windows corresponding to the user interface. The synchronization API relurns when the relevant thrcads corresponding to the windows ...
Techniques and tools are described for scalable video coding and decoding. For example, a 3D sub-band video encoder includes an embedded base layer code as well as temporal sub-band transforms and spatial sub-band transforms. The placement of the base layer code among the sub-band transforms and the role of the base...
The subject invention provides for a feedback loop system and method that facilitate classifying items in connection with spam prevention in server and/or client-based architectures. The invention makes uses of a machine-learning approach as applied to spam filters, and in particular, randomly samples incoming email...
A "PeerStreamer" provides receiver-driven peer-to-peer (P2P) media streaming for loosely coupled P2P networks. Peers in the network perform only simple operations, may cache all or part of the streaming media, do not collaborate with other peers, may be unreliable, and may drop offline or come online during any give...
A multi-standard receiving device processes broadcast transmission signals that use multiple differing transmission standards. Processing entails conversion of the transmission standard"s protocol standard into a normalized transport agnostic representation in order to allow consistent manipulation of a broadcast tr...
[0068] A transrate manager on a host computer determines if there is a
limitation in network bandwidth and controls the bit-rate of streaming media content accordingly. The bit-rate is controlled by excluding types of video frames from the streaming media content and then reintroducing excluded types of video frame...
Representing a componentized workflow model via a declarative markup language. Each step of the workflow is modeled as an activity that has metadata to describe design time aspects, compile time aspects, and runtime aspects of the workflow step. A user selects and arranges the activities to create the workflow via u...
A "PeerStreamer" provides receiver-driven peer-to-peer (P2P) media streaming for loosely coupled P2P networks. Peers in the network perform only simple operations, may cache all or part of the streaming media, do not collaborate with other peers, may be unreliable, and may drop offline or come online during any give...
The present invention extends to methods, systems, and computer program products for securing audio-based access to application data. A client sends and a server receives a request for audio-based access to application data. The server sends a first audio challenge for a user credential in response to the request. T...
Active Content Wizards (ACWs) related to helping computer users perform tasks are executed using an ACW interpreter. In one aspect of the present invention, the interpreter provides multiple levels of user interaction for a given ACW script. In order to help focus the user"s attention, various methods are used to in...
The present invention relates to systems and methods that employ user models to personalize generalized queries and/or search results according to information that is relevant to respective user characteristics. A system is provided that facilitates generating personalized searches of information. The system include...
Implementations of various technologies, including methods, systems and apparatus, for managing a request from a user to access an object. In one implementation, a determination is made as to whether the user is denied or granted access to the object based on a policy (step a). If the user is neither denied nor gran...
Implementations of the present invention relate in part to optimizations to peer-to-peer communication systems. For example, one implementation relates to use of a smart transceiver that creates, caches, and manages communication channels dynamically between peers. Another implementation relates to use of a central ...
Features extracted from network browser pages and/or network search queries are leveraged to facilitate in detecting a user's browsing and/or searching intent. Machine learning classifiers constructed from these features automatically detect a user's online commercial intention (OCI). A user's intention can be comme...
A wireless input device may negotiate a predefined transmit receive schedule with a receiving device (i.e., PC, PDA, cellular device). To conserve power, the wireless components of the input device are powered down during periods of non-transmission. The wireless input device detects intermediate user input and corr...
A method may be practiced, for example, in a network computing environment including a client at a local site and a number of distributed services at a number of remote sites. The method includes pinging one or more distributed services at one or more remote sites. A message is received from a distributed service fr...
A measurable means to evaluate a given relevancy verification process to a human decision process is provided. For example, a cognitive concept relationship (CCR) system can be utilized to provide a relevancy verification evaluation that is independent of the relevancy quality of the test data employed to train the ...
A computer software construct has a plurality of components and Is built based on an architecture designed for the construct. The architecture includes a number of partitions and dependency rules, where each partition is for having at least one component associated therewith. Each dependency rule specifies whether a...
A client in a plurality of clients with a same network address or similar common identifier is designated a Peer Distribution Point (PDP) agent for distributing a software application divided into several packages to the plurality of clients. The plurality of clients are part of a client-server hierarchical system c...
SORTING SPEAKERS IN A NETWORK-ENABLED CONFERENCE
Systems, methods, and/or techniques ("tools") are described that sort speakers in a network-enabled conference. In some cases, this sorted list of speakers indicates which speaker is dominant. With this sorted list, a participant's communication device may provide co...
Generally described, embodiments of the present invention relate to applying and evaluating an unlimited number of conditional formatting rules to a given range of cells. Additionally, multiple conditional formatting rules may be evaluated to TRUE for the same cell contained in a user interface and multiple formats ...
A method, apparatus, and computer-readable medium are provided for merging data from multiple data sources for use m an electromc document The method mcludes receiving field names and field data from an initial data source, mapping field names from a subsequently added data source to the initial data source, buildin...
This invention relates to a process for the storage of culture, such as mycorrhizae, comprising in the steps of : (i) selecting the fungus, namely Laccaria Laccata; (ii) introducing the fungus into a medium selected from potato dextrose agar or MMN and having a pH of 7.0 to 7.5; (ii) allowing the fungus of age; (iv)...
A method and system for backing up and restoring data. First, a full backup is performed to create a full dataset. Thereafter, incremental or differential datasets may be created by incremental or differential backups, respectively. When a new full dataset is needed, instead of performing a full backup, a previous f...
The present invention extends to methods, systems, and computer program products for reliable messaging using clocks with synchronized rates. Embodiments of the present invention insure at-most-once delivery of messages. A source and a destination utilize clocks with synchronized rates. Messages are assigned Time-To...
Systems, computer-program-products, and methods for managing terminal services (TS) accounts and sessions for online utilization of hosted applications are provided A system is operative to monitor a supply of available TS accounts and create TS accounts in response to detecting that the supply of available TS accou...
A computer is adapted for self-validation using a dedicated validation circuit or process. The validation circuit may include a timing circuit for activating the validation process, a verification circuit for verifying the computer is in compliance with a pre-determined set of conditions and an enforcement circuit f...
A system and method for separating execution behaviors from test cases and consolidating execution behaviors in an execution behavior manager comprising or in communication with an execution behavior library. The method includes selecting an execution behavior for executing a step or action in a test case and sendin...
A system and method for verifying the systemic results of an action applied to an application and for providing the expected state of the application at any time or on demand, in which a verification manager determines an expected application state and a current application state of the application, a test case in c...
A method and system are provided for integrating partitions in a virtual machine environment. Specifically, a partition bus is provided, where the partition bus operatively connects partitions in such a way that it functions as a data transport mechanism allowing for data transfer and device sharing between partitio...
A computer-implemented method is disclosed. The method is for rendering a display associated with a task-oriented user interface. The method includes receiving a request to display a category view that includes an indication of a plurality of task categories. A system database is referenced to gain access to a colle...
Techniques are described for generating and validating signatures. In an implementation, a method includes generating a signature by utilizing a plurality of isogenies included on a private key and incorporating the signature and a public key on a product, in which the public key is configured to validate the signat...
A computer-implemented method is disclosed. The method is for enabling a user to efficiently navigate to a portion of a user interface configured to support performance of a particular task. The method includes receiving from the user an input that includes a description of the particular task. A result set is retur...
Translation architecture that facilitates translation between schema data and relational structures. The architecture includes a translation component that consumes schema data (e.g., an XML schema) that includes a schema structure, validates the schema structure, and persists in memory a representation of the schem...
ABSTRACT
REPLACING SYSTEM HARDWARE
-24-
A method and apparatus for managing spare partition units in a partitionable computing device is disclosed. The method comprises detecting if a spare partition unit is required for addition or replacement in a local operating system and if a spare partition unit is requi...
A mobile communications device with an integrated camera is directed towards text. A video stream is analyzed in real time to detect one or more words in a specified region of the video frames and to indicate the detected words on a display. Users can select a word in a video stream and subsequently move or extend t...
Solver state merging in parallel constraint satisfaction problem (CSP) solvers. Solver state during processing of a computational thread of parallel CSP solvers is represented as a set of support graphs. The support graphs are merged in a pairwise fashion, yielding a new conflict-free graph. The merge process is fre...
A system and related techniques automatically analyze Web search and other activity, to generate locality-selected results based on not just the user"s location, but also the business or other content provider"s location and the degree of local intent in the user"s query. The locality or region to the user may be id...
A computing device has instantiated thereon a protected media path for delivering content from a source to a sink. In the protected media path, a media base provides a protected environment in the computing device and includes a common infrastructure of core components effectuating processing of content from any par...
Applications written in modern garbage collected languages like C# tend to have large dynamic working sets and poor data locality and are therefore likely to spend excess time on managing data movements between memory hierarchies. Instead, a low overhead dynamic technology improves data locality of applications. The...
Data can be protected at a production server in a virtually continuous fashion, without necessarily imposing severe constraints on the source application(s). For example, a production server can create an application-consistent backup of one or more volumes, the backups corresponding to a first instance in time. A v...
Implementations of the present invention provide systems, methods, and components configured to preserve valid shadow copies during replication cycles, before those valid shadow copies have expired. In particulr, one or more components can identify the size and rate of changes in production server data that will be ...
A method and system for writing a data image in the main memory of a computer to a secondary storage device minimizes delay in performing a required reboot. Prior to the reboot, a portion of the physical memory is copied either to a reserved memory space or to secondary storage, or one portion of memory may be copie...
Implementations of the present invention allow clients e.g., end-users, administrators, etc.) to associate data with one or more protection intents at the data/data source level. A backup server can then associate the data with a specific protection mechanism regardless of where the data/data source(s) are lo...
A data system user interface that can employ different data collection Tenderers (e.g., views) based on an attribute of the content of a view-set (e.g., list, folder, directory) is provided. In accordance with aspects of the subject invention, views that are suitable to present certain types of content can be automa...
A facility for performing an access control check as an integral component of an operating system and utilizing a centralized policy store is provided. The facility executes as an integral part of an operating system executing on a computer and receives an authorization query to determine whether a principal has aut...
A facility for setting and revoking policies is provided. The facility receives a request from a controlling process a request to set a policy on a controlled process, and determines whether the controlling process has privilege to set the policy on the controlled process. If the facility determines that the control...
The present invention finds candidate objects for remote differential compression. Objects are updated between two or more computing devices using remote differential compression (RDC) techniques such that required data transfers are minimized. An algorithm provides enhanced efficiencies for allowing the receiver to...
Building a componentized workflow model. Each step of the workflow is modeled as an activity that has metadata to describe design time aspects, compile time aspects, and runtime aspects of the workflow step. A user selects and arranges the activities to create the workflow via user interfaces or application programm...
A Smart Client solution for an enterprise application (e.g., a Customer Relationship Management system) includes a base application (e.g., Microsoft Outlook), and add-in software that interacts with the base application. The add-in software allows the base application to be used to access data and functions of the e...
A computer-implemented method of facilitating centralized interaction with a user, the method comprising
providing a recognized voice command to a
plurality of application modules, receiving a plurality of interpretations of the voice command, the plurality of interpretations generated by at least one of the p...
A system (200) for controlling the delivery of notifications. The system brokers and serializes the delivery of notifications (206) from multiple sources. In addition, a shared notion of user context is provided, for determining the appropriate handling for each of the notifications. In one embodiment, a user contex...
implementation, as described herein, facilitates fast start-up of a new media stream while mitigating and in some implementations, avoiding temporal interruption (i.e., "stutter") of the presentation of that new media stream. At least one implementation, described herein, measures a rate at which a multimedia stream...
The claimed subject matter provides a system and/or a method that facilitates utilizing rule-based technology with radio frequency identification (RFID) network. An interface can receive real-time RFID data from a process comprising at least one device collection in the RFID network, wherein a rules engine (RE) comp...
A Smart Client solution for an enterprise application (e.g., a Customer Relationship Management system) includes a base application (e.g., Microsoft Outlook), and add-in software that interacts with the base application. The add-in software allows the base application to be used to access data and functions of the e...
A system and method for improved vertical handoff between different types of wireless network. Network allocation vector occupation and packet collision probability are used as quality of service measures, enabling vertical handoffs to be delayed until actually beneficial to quality of service. Improved wireless n...
A method provides differentiated quality of service (QoS) by providing adaptive updates to media access control (MAC) layer parameters on a distributed basis. The method includes calculating a failure probability for a transmission over the network, determining a target value for determining a contention window acco...
A method and computer-readable medium are provided for navigation between attachments to electronic mail messages. According to the method, a list of e-mail messages is displayed that includes header information associated with each of the messages. When one of the messages in the list is selected, a determination i...
A method and system of lossless adaptive Golomb/Rice (G/R) encoding of integer data using a novel backward-adaptive technique having novel adaptation rules. The adaptive G/R encoder and decoder (codec) and method uses adaptation rules that adjust the G/R parameter after each codeword is generated. These adaptation r...
A mobile electronic device for receiving and displaying information from a wireless signal transmission is provided. The device utilizes one or more mechanical and/or digital indicators for displaying the information. One embodiment of the invention provides a smart personal object, such as a watch device, for recei...
A failover scope comprises a node collection in a computer cluster. A resource group (e.g., application program) is associated with one or more failover scopes. If a node fails, its hosted resource groups only failover to nodes identified in each resource group"s associated failover scope (s), beginning with a first...
Enumeration requests are sent from a node in a network. Each node that
receives an enumeration request sends an enumeration response at a time determined by
the node receiving the enumeration request.
Text is converted to speech based at least in part on the context of the text A body of text may be parsed before being converted to speech Each portion may be analyzed to determine whether it has one or more particular attributes, which may be indicative of context The conversion of each text portion to speech may ...
In various embodiments, a user may, via a processing device, indicate a desire to purchase a feature of an installed software product. A purchase request may be sent to an e-commerce server, or other server. The purchase request may be validated and information concerning the software product, the feature of the sof...
The present invention relates to establishing a media channel and a signaling channel between a client and a server. The media channel uses a chosen codec and protocol for communication. Through the media channel and signaling channel, an application on the client can utilize speech services on the server.
...
Faces of speakers in a meeting or conference are automatically detected and facial images corresponding to each speaker are stored in a faces database. A timeline is created to graphically identify when each speaker is speaking during playback of a recording of the meeting. Instead of generically identifying each sp...
A system and method for cloning objects by configuring a cloned object with properties of a shared object or of a properties collection for a demand event, and for unconfigunng the cloned object for a design event initiated on the cloned object During a design event, the cloned object may point to or be associated w...
A system that facilitates storing video, comprising:
a component that receives a motion parameter and a computer environment parameter; and
a step image component that determines a maximum step image size and a step image number, based upon the motion parameter and the computer environment parameter, and creates c...
Systems, methods, and/or techniques ("tools") for incrementally updating and formatting high-definition digital versatile disk (HD-DVD) markup are described herein. The tools may receive first markup representing a first scene description to be read from a HD-DVD, and may map the first markup into a first area compo...
Systems and methods for implementing system management which are based on reviewing of the interactions between one or more programs and the persistent state they tend to represent. The system provides for the detection of modifications that occur within a system, verifying whether the modifications are approved or ...
A task-oriented start menu model. At least some of the items in the start menu represent a task category describing a task to be accomplished, rather than listing the application that accomplishes that task. For example, a user might select "Create new Letter" from the start menu, rather than selecting a shortcut ...
A computer implemented method and system for speech recognition are provided. The method and system generally maintain a set of verbs for speech recognition commands. Upon recognizing utterance of a verb of the set in combination with an invalid object or objects for the verb, the method and system generate an indic...
The assembly of documents assembled by a team is simplified. Document sections are assigned to a team member from within a word-processing document. Once a document template is opened by a user, the different sections within the document may be assigned to team members. Once a section is assigned, a notification is ...
A system analyzes data from a search engine A User Search Bundler analyzes User Searches groups similar User Searches into User Search Bundles, and an Intent Processor produces Intents based on the User Search Bundles A Factor Generator considers User Searches and related information to produce Factors, where each F...
Systems and methodologies that facilitate purchase and/or transfer of a domain name and access of users to the internet, by using a well defined protocol to interact with a plurality of domain name registrars, via employing; a purchasing component, and a mapping component. Once a user has identified a domain name, t...
A method and system for anti-aliased rasterization of objects From a particular viewpoint of an object represented by shapes, a shape is selected having an edge on a silhouette of the object An edge geometry is created at the edge of the shape that is on the silhouette of the object The edge geometry is rendered Eit...
Various new and non-obvious apparatus and methods for ensuring a user interface element is visible within an automated user interface test environment are disclosed. One of the disclosed embodiments is a method for locating a parent element of the user interface element and then making the user interface object visi...
A method and system for limiting resource usage of a version store. A limit indicates a total amount of resources that may be consumed by in-progress transactions. A running total of the amount of remaining resources is maintained. Before a new transaction is started, a determination is made as to whether there are ...
In one embodiment of the present invention, a decoder receives a dependency tree as a source language input and accesses a set of statistical models that produce outputs combined in a log linear framework. The decoder also accesses a table of treelet translation pairs and returns a target dependency tree based on th...
An optical disk comprises a disk substrate having a hub and an annular optical metallicized data region extending radially outward from the hub. The optical disk-further comprises a radio frequency identification (RFID) transponder affixed to the disk substrate, e.g., within the non-data containing hub region. The o...
A computer-implemented system and method provides authoritative answers, developed within a community-based question answering service to users of a general network information search. This community-based question answering service receives a question from a first user, and receives answers from community members r...
The claimed subject matter provides a system and/or a method that facilitates receiving data from at least one device. A radio frequency identification (RFID) network can include at least one device that receives data from a tag. A batcher comporient can collect the data based on a start boundary and an end boundary...
The claimed subject matter provides a system and/or a method that facilitates ensuring reliable data within a radio frequency identification (RFID) infrastructure. A radio frequency identification (RFID) network can include at least one device that receives data from a tag. A distribute component can initiate a reli...
A new color space that maps image pixel values in a mosaiced sampling pattern (such as that generated by a Bayer color filter array) into four color channels that correspond to rectangular sampling patterns. Because these new channels correspond to a rectangular sampling grid, they are much more amenable to processi...
A "Media Identifier" operates on concurrent media streams to provide large numbers of clients with real-time server-side identification of media objects embedded in streaming media, such as radio, television, or Internet broadcasts. Such media objects may include songs, commercials, jingles, station identifiers, etc...
A start menu model in which a first start menu is first displayed that includes an initial list of application items (such as programs or tasks) as well as a more list expander icon. If the user selects the more list expander icon, the first start menu is replaced with a second start menu that includes a second...
Allowing a user to view a list of running tasks by simply selecting a hardware control on the computing system. In one embodiment, the list or running tasks may be displayed in a drop down menu. A task to be switched to may then be selected by using navigation buttons to select one of the running tasks. This signifi...
The claimed subject matter provides a system and/or a method that facilitates simulating one or more devices respective to disparate vendors, wherein the devices can be associated with an RFID infrastructure. A physical device can wirelessly receive data from a tag. A device simulator can employ a virtual replicatio...
The claimed subject matter provides a system and/or a method that facilitates providing communication channels within a radio frequency identification (RFID) infrastructure. A radio frequency identification (RFID) network can include at least one device that can receive data from a tag. A mixed mode component can em...
The claimed subject matter provides a system and/or a method that facilitates providing reliability associated with radio frequency identification (RFID) technology. An RFID network can include at least one device that wirelessly receives data from a tag. A provider component can have a dedicated execution space i...
The use of a cordless receiver to control a computing system. The simple alphanumeric controls of, for example, a telephone device may be used to control the computing system. For instance, upon the user selecting one of the alphanumeric controls on the telephonic device, a command may be sent to the computing syste...
Allowing a user to interface with one or more utilities while interfacing with an application. While displayintg a user interface for the application, the user may select a single hardware control to access the utilities. This might be accomplished by, for example, deactivating the process that runs the application ...
Systems and methods are described that allow programmatic access to search engine results and query logs in a structured form. The search results can be retrieved from the search engine in an intermediary form that contains the information that is in the HTML pages provided to web browsers (potentially with addition...
A computing device operating according to a frequency division multiplexed protocol in which communication occurs over a signal formed from a plurality of sub-channels selected from anywhere in a frequency spectrum. A computing device may select sub-channels cognitively by using information about sub-channels previo...
A method and system for manipulating characters displayed on a display screen is provided wherein the method includes identifying a selected word, wherein the selected word includes at least one character to be modified. The method further includes correlating each of the at least one character with a unique numeric...
Evaluating content is described, including generating a data set using an attribute associated with the content, evaluating the data set using a statistical distribution to identify a class of statistical outliers, and analyzing a web page to determine whether it is part of the class of statistical outliers. A syste...
ABSTRACT PATIENT MONITORING VIA IMAGE CAPTURE
A system that can enable clinical trial compliance determination by viewing sequences of images captured during an event is disclosed. For example, the innovation can employ captured event sequences to enable a subject or third party to assess a subject's actions relate...
A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To gu...
An efficient and layered synchronization protocol for database systems is disclosed. A mechanism is provided for efficient synchronization of data between storage systems such as relational databases, object stores, etc. Synchronization capabilities may be defined and grouped into several levels that support specifi...
Capability checking to examine a computing device"s capabilities to determine if the device supports software defined radio to communicate according to a specific wireless protocol. Applicants have appreciated that as the reliance on software defined radio increases, numerous potential options may be available to a ...
A computer-implemented method is disclosed
for encouraging an accurate chronological organization of radio frequency identification (RFID) tag data gathered from distributed servers. The method includes limiting the processing of RFID tag 10 data based at least in part on the operational status of a plurality of s...
Techniques and technologies are provided which can allow for touch input with a touch screen device. In response to an attempt to select a target displayed on a screen, a callout can be rendered in a non-occluded area of the screen. The callout includes a representation of the area of the screen that is occluded by ...
A refinement system automatically identifies whether a detected error in a target system during abstract interpretation is a false error or a true error and adjusts the interpretation to prevent the false error. The target system is represented as a transition system with an initial state and state transitions and a...
A client application allows a user of a telecommunication device to retrieve contact data of a particular individual from a server to initiate contact with the particular individual without viewing content designated as private by the particular individual. The retrieved contact data includes encrypted content and n...
Highlighting selected objects in an electronic document is provided in a manner such that a highlighted object maintains coloring and formatting properties to allow for a maintenance of visual fidelity with a pre highlighted view of the highlighted object and that allows for a semi transparent background underneath ...
Multi-user multi-input desktop workspaces and applications are described. In one aspect, a single computing device presents multiple workspaces on a desktop area. The desktop area is designed for multiple users to provide in parallel inputs. Each workspace is configured for use by a particular set of users. Responsi...
ABSTRACT AUTOMATIC LOCALIZATION OF DEVICES
A device is described which changes its operation dependent upon the location of the device. The device accesses parameters which are specific to its location and uses these to determine how the operation of the device should be changed.
Embodiments provided a formalized set of intermediate analysis contexts tiled are relevant for analysis checks of target code. Such intermediate analysis context may include, but are not limited to, the development phase of targeted code, the type or state of the targeted code, a source manipulating the targeted cod...
ABSTRACT
BAYESIAN DEMOSAIONG USING A TWO-COLOR IMAGE
A Bayesian two-color image demosaicer and method for processing a digital color image to demosaic the image in such a way as to reduce image artifacts. The method and system are an improvement on and an enhancement to previous demosaicing techniques. A prelimina...
A framework is provided for obtaining window information. The window information can be applied to different assignment models to assign windows to different groups. A group may correspond to a task being performed by a user. The window information can be semantic or temporal information captured as window even...
The invention is directed towards a system and method that utilizes external memory devices to cache sectors from a rotating storage device (e.g., a hard drive) to improve system performance. When an external memory device (EMD) is plugged into the computing device or onto a network in which the computing device is ...
A system and method for ensuring lhat machines having invalid or corrupt states are restricted from accessing host resources are provided. A quarantine agent (QA) located on a client machine acquires statements of health from a plurality of quarantine policy clients. The QA packages the statements and provides the p...
An electronic device that has a body portion having an internal track, a display portion having a follower member that runs along the internal track and a support arm pivotally coupled to the body portion and to the display portion and enabling the display portion to move between multiple distinct positions relative...
Described is a method and system in which storyboard objects coordinate the animation of multiple elements and/or media displayed on a computer graphics display. Storyboards relate properties of elements in an element tree to a timeline, such that the properties associated with a storyboard are animated / play toget...
A system and method for verifying messages. The method may include the steps of receiving an inbound message and characterizing the inbound message by analyzing a latent cryptographic identifier in the inbound message. The identifier is generated by a recognized message system, which may be the receiving system itse...
Really Simple Syndication (RSS) is extended to syndicate structured data as well as general content via Really Simple Syndication for data (RSSd). RSSd provides a mechanism by which tables of data can easily be made available to users and across applications. RSSd provides the ability to syndicate data directly into...
The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. Th...
Described is the multiplexing and de-multiplexing of graphics streams, including by generating first higher-level graphics instructions from a first application program upon connecting to a client computer. A first identifier representing the first application program is associated with the first higher-level graphi...
An electronic file system organizational structure is provided mat allows for items to be organized in a directed acyclic graph (DAG). While items may be organized hierarchically as in a tree structure, items may also have multiple direct parents. The electronic file system may further have access to multiple differ...
A presence information system allows access to presence information of a publisher to be controlled and enforced by the publisher on a peer-to-peer basis, rather than by a presence server. A subscriber sends to the publisher on a peer-to-peer basis a request to subscribe to the presence information of the publisher....
A development environment makes it easier to develop and use location aware software applications. Combining the currently separate and complex tasks of location information gathering, analysis, and display and making them integrated such that non-experts can build location services into their applications increases...
A method of identifying an entry in an entity model as being at least one of potentially private and potentially sensitive is disclosed. The method may include creating an indication related to a specific entry that indicates whether the specific entry is one of potentially personally identifiable and potentially se...
A file system that does not conflate item lifetime with the item"s inclusion in an organizational structure of the file system is described herein. In addition, the file system"s organizational structure is not limited to directory trees, but instead may use any directed acyclic graph (DAG). Items, once stored into ...
A logical distributed server is generated for managing (Internet Protocol (IP) address allocation for an ad-hoc, self-forming peer-to-peer (P2P) network. The logical distributed server is generated according to messaging scheme where nodes on the P2P network allocate addresses for themselves and for clients connecte...
An apparatus and method is provided for controlling a display device for displaying a user interface associated with an application. A processor for controlling peripheral devices and/or the display may be selected based on characteristics of a requested function to be performed. For example, a processor may be sele...
ABSTRACT SECURE SERIAL NUMBER
A serial number for a software product is secured with an authenticator value. The authenticator value and the serial number are evaluated entirely by a remote authentication server such that no cryptographic authentication occurs on a local computer on which the software product is be...
ABSTRACT
TECHNIQUES FOR CUSTOMIZATION OF PHONETIC SCHEMES
Various technologies and techniques are disclosed for creating and using phonetic schemes. A phonetic scheme creation feature is provided to allow a user to create a phonetic scheme that has one or more available phonetic character combinations in a source ...
This document describes tools capable of enabling a protection agent to determine, from memory inaccessible from an operating-system privilege mode, whether one or more resources of an operating system have been modified. In some instances, these tools may enable the protection agent to reside within a virtual machi...
ABSTRACT VIRTUAL LOCATION MARKERS FOR MOBILE MAPPING
Described is a technology by which a virtual location marker (e.g., virtual pushpin or similar placeholder) is determined from the results of a query, in which the virtual location marker corresponds to a first coordinate set (e.g., a latitude, longitude and/or a...
Embodiments of virtual tuner management are described. A viewing system, for instance, may include a plurality of client devices that are configured to render content, such as television programs. The viewing system may pool the resources available from the client devices such that each client device is not limited ...
Techniques for improving operating system performance are provided. A subsystem of an operating system operates as a kernel mode component, such as a kernel mode driver, instead of operating as a user mode component.
The invention relates generally to sequential access storage media, and more particularly to accessing variable-length data segments on a sequential access storage medium.
Groups are formed, in a computer-based (e.g., on-line) gaming environment, based on social relationships between players. The group is assigned an identity. The identity of the group is maintained within a single game title, across multiple sessions of a game title, and across multiple game titles. The group can int...
A game console has the capability to execute programming to unlock an achievement. After the achievements are unlocked, a data store accessible by the game console over a network stores the information in the profile of the user. The achievements associated with the user profiles can be retrieved from the store alon...
The present invention provides a unique method and user interface that facilitates accessing and browsing objects in which a user begins with a center object (e.g., one or a few focal objects) displayed on a screen and related objects are populated on the screen as well. The related objects can be further organized ...
Techniques for enabling inter-subsystem resource sharing are provided. A subsystem executing an application ("app subsystem") receives resources from another subsystem providing a resource ("resource subsystem"), such as a DLL. Then, when an application of the app subsystem is executed, the application may request a...
Various technologies and techniques are disclosed that improve text rendering contrast. The shape of one or more characters is converted from an original format, such as a vector format received from a font, to an overscaled bitmap format. The width of the shape of the character is adjusted based on a text contrast ...
A computer-readable medium having computer-executable instructions, comprising
receiving a request to access an object of a file system,
determining that the object is within a namespace associated with a filter, and
updating the namespace associated with the filter based on a change to the object
...
An auxiliary computing device wakes an associated main computer system to obtain data as needed, on-demand and/or in anticipation of demand. The wakeup operation is ordinarily temporary to fetch data, whereby only a small amount of power is consumed by the main computer system. In one implementation, a control chann...
Example embodiments provide for a binding mechanism between RM protocols and request-response transport protocols (e.g., HTTP) in a one-way message exchange pattern. The present invention leverages existing network characteristics of request-response transport protocols without reconfiguration or deployment of new i...
A data structure with endpoint address and security information. The data structure includes an address field that includes one or more endpoint addresses for an entity. The data structure further includes a security field that includes one or more keys for facilitating secure communications with the entity. The dat...
A system for authenticating computer users comprising, a single
active directory disposed in a federated partner, a web server disposed in a DMZ associated with the intranet; and a client disposed in the federated partner coupled to the web server through an internet connection that is capable of signing on to the ...
The present invention monitors the receipt of messages between two endpoints on established sequence session in accordance with a Reliable Messaging protocol for Web Services (RM-WS protocol). The messages received may be application or infrastructure messages (e.g., acknowledgement messages in accordance with the R...
A facility for providing an IM mixed mode operation by utilizing both page mode IM and session based IM jointly in the same IM conversation is provided. The facility initiates an IM conversation between an originating user registered at an originating device and a remote user registered at a plurality of devices ini...
Information management systems with time zone information, including event scheduling processes are disclosed. One aspect of the invention is directed toward a computer-implemented scheduling method that can include identifying a difference between a participant time zone and a user time zone, reviewing availability...
A 2D transform and its inverse have an implementation as a sequence of lifting steps arranged for reduced computational complexity (i.e., reducing a number of non-trivial operations). This transform pair has energy compaction properties similar to the discrete cosine transform (DCT), and is also lossless and scale-f...
Improved systems and methods for navigating media via a user interface, such as a user interface provided on a handheld or protable computing device, are provided. The methods for navigating media of the invention extend the navigation experience by allowing bi-axial context shifts, e.g. with respect to substantiall...
A system for synchronizing a natural language input element and a graphical user interface has a synchronization engine. The synchronization engine is adapted to monitor user interactions with the natural language input element and the graphical user interface and to synchronize the natural language input element an...
A system and method for restricting a client"s access to sensitive material in a network document. The system includes a document storage component for storing documents having an associated level of access. The system also includes a server component for receiving a document request from a user, associating the doc...
The present invention provides for flow and congestion control mechanisms in accordance with a Reliable Message protocol for Web Services (RM-WS). For flow control, one endpoint informs another endpoint of its available buffer size by including buffer size information in response messages. The response messages, typ...
A concept network that can be generated in response to a user query. In one embodiment, the concept network is being used with a search tool. The search tool searches a plurality of data storage locations. Each data storage location is arranged with a node. Certain ones of the nodes are connected by at least one lin...
A file system that does not require unique item names, or any item name at all, is described herein. If an item has an ambiguous name, the file system performs a disambiguating procedure to provide the client (user or application) a conceptually unique name, including a fully qualified path. The file system provides...
The present invention extends to using Simple Object Access Protocol ("SOAP") to exchange typed objects, such as, for example, parameters for invoking methods. A computer system accesses typed object parameters corresponding to a typed object. The typed object is annotated with one or one more message contract attri...
A received reply email document enables some action to be effectuated using data included in the email document responsive to field identifiers associated with the data and corresponding to fields of metadata The associated field identifiers that correspond to known fields of the metadata provide some expectation as...
An integrated help content viewer (user interface) is provided that gives a consistent user interface across multiple applications and that smoothly transitions between offline and online help content sources. A single client-side help content viewer is provided that is displayed over or adjacent to a given applicat...
A computer-implemented process takes content created collaborative from a workgroup environment and converts it into a scheduled web page that is publishable on the Internet. The computer-implemented process loosely relates the generated collaboration content and the published web page such that each may be independ...
File formats, methods, and computer program products arc provided for representing a presentation in a modular content framework. The modular content framework may include a file formal container associated with modular parts. A file format includes logically separate modular parts that are associated with each othe...
Methods and systems are provided for separating the data of a structured document from markup structure applied to the document and for linking the separately maintained data with associated markup structure applied to the document. The data stream in an Extensible Markup Language (XML) represented document is moved...
A method and computer-readable medium are provided for loading the contents of an electronic data file. According to the method, corrupted portions of a data file are identified and an attempt is made to repair these portions. If the corrupted portions carmot be repaired, the loading of these portions is skipped. Th...
File formats, methods, and computer program products are provided for representing a workbook in a modular content framework. The modular content framework may include a file format container associated with modular parts. A file format includes logically separate modular parts that are associated with each other by...
A system and method for automatically completing a formula of a spreadsheet application, calculator application, accounting application, business application or banking application. One aspect of the present invention is a computer-implemented method for automatically completing formulaic cell data. The computer-imp...
A change list tracking mechanism supports features that require a record of values that have been modified in a document of a project management software application. Examples of the features supported include multiple undo, report generation, and audit logging. The change list tracking mechanism includes object con...
Systems and methods for transforming a document to a web page can include a mapping module programmed to map document styles of a document to styles of a web page The system can also include a conversion module programmed to convert contents of the document into hypertext markup language based on the map of the mapp...
A portable storage device includes an interface and one or more flash memories The one or more flash memories store one or more executable files that can be executed by a host computer to which the device is coupled without altenng any environment settings on the host computer even though the one or more executable ...
An efficient lapped transform is realized using pre- and post-filters (or reversible overlap operators) that are structured of unit determinant component matrices. The pre-and post-filters are realized as a succession of planar rotational transforms and unit determinant planar scaling transforms. The planar scaling ...
A system and related techniques provide a uniform abstraction layer for accessing and manipulating Raw image files, with the necessity for proprietary application tools. According to embodiments in one regard, an operating system or other platform may expose a set of application programming interfaces (APIs) to gene...
[0089] This document describes tools capable of making a portion of operating-system memory associated with a protection agent unalterable or inaccessible from an operating-system privilege mode. In some embodiments, these tools are capable of creating a protection-agent privilege mode by requesting that a virtual m...
Data is obtained from one or more data sources. The data sources may be real time data sources and non-real time data sources. Calculations may be performed on the data before delivering the data to one or more applications. A direct connection may be established between a first computing device and a second computi...
Methods and systems are provided for exposing nested data in computer-generated documents in a transparent manner. A mechanism is provided for a client application to query a server application for a list of available file formats after an object is requested from a server application document for embedding into a c...
Methods and systems are provided for controlling elements of computing systems including operating systems, software applications and different versions of software applications to better facilitate cross-application and cross-version collaboration of files. Elements within a computing system, for example, operating...
The method may include creating a marketing campaign, selecting a list to receive the marketing campaign, allowing the user to modify the list selected, allowing the user to add a work item to the marketing campaign and executing the marketing campaign.
A compiler that forms an intermediate representation of a program using a flow graph with less than all possible edges used to model asynchronous transfers within the program. The flow graph is formed in multiple phases. In one phase, the flow graph is formed without modeling asynchronous transfers. In later phases,...
A method and system for providing notifications of changes in the presence state of contacts is provided. A notification system allows a user to specify those contacts of interest for whom the user wants to be notified when the contact enters a certain presence state. When presence information is received about a co...
A system for supplying computers with little or no upfront payment has a service provider, a computer, and an optional funding account. The computer is adapted to render itself substantially useless unless provisioned by the service provider. The service provider has a capability to collect funds from the user and t...
A computer-implemented method and computer-readable medium are provided for generating a multiple column layout. According to the method, a layout is defined that includes two or more columns and one or more spans that extend across two or more of the columns. Each span is defined as being either content denned or h...
A method and computer-readable medium are provided for optimized paragraph layout. According to the method, a line-by-line paragraph layout is generated determine a maximum penalty for a paragraph. One or more layout nodes may be generated that include data representing a possible layout of the paragraph to a point ...
The present invention comprises methods and user interfaces for organizing data displayed within a data application. Specifically, the present invention provides methods and systems for arranging the display of the data by a format applied to one or more portions of the data. The formats comprise different visual ch...
An electronic program guide system receives data that identifies various types of available media content. A data-driven media guide is then generated to display visual representations of the available media content. The media guide is dynamically generated based on attributes associated with the various types of av...
Self-describing portions of text or data are provided for associating with or inserting in a computer-generated document. Portions of a document, such as individual paragraphs or groups of paragraphs or fragments of text, are provided self-describing properties, such as file format type associated with the portion, ...
A security scheme provides security to one or more self-contained operating environment instances executing on a computer. The security scheme may include implementing a set of security applications that may be controlled by a supervisory process, or the like. Both the set of security applications and the supervisor...
Techniques and tools for supporting multiple operating systems in consumer electronic devices. For example, techniques and tools are described that allow quickly switching between operating systems in video disc players that support different media types while reducing wait time and mitigating possible negative impa...
A word processor application is provided for creating word processor documents wherein the data and presentation can be separated. Data can be stored in a separate location from the presentation surface of the word processor document. Users of the word processor application can establish links (or bindings) between ...
The present invention relates to a system and method to facilitate providing computer users with efficient access to electronic notifications while minimizing disruption in the context of ongoing tasks. A notification system provides visual information heralds that provide summarizations of notifications to users. A...
A data provider application programming interface (API) is configured for use with a game content editing application. An asset relationship management file, which is generated with the data provider API, includes information such as relationship references and annotations and is updated by the data provider API whe...
Described is a system and method by which application programs running on a main computer system communicate with an auxiliary display device (such as a cell phone, pocket-sized computer, alarm clock, television, digital picture frame and so forth) to provide viewable information on the device, remote control capabi...
Various technologies and techniques detect lists in vector graphics based documents and use them in meaningful ways. The system detects at least one list in a vector graphics based document using a set of rules. Pattern detection logic identifies characters symbols, numbers letters and/or images that may start a lis...
A Methods and apparatus are provided for evaluating the extent to which link text, representing a hypertext link on a web page, corresponds to a web page referenced by the link. In one embodiment, the link text may be compared to the title of a web page referenced by the link, such as by parsing the link text and pa...
Methods and systems for preserving unknown markup in a strongly typed environment are descnbed In but one embodiment, XML-based markup that may contain XML-based elements that are both known and unknown is received A strongly typed tree that is associated with the known XML-based elements is instantiated and a weakl...
Various embodiments utilize structured data contained within a resource, such as a web page, to enable a user to define collections of data. Individual constituent parts of a collection or "links" are collected within a collection. In one or more embodiments, a full page viewing experience can be provided which enab...
In wireless USB data transfers over UWB, software
configures hardware thresholds to control data transfer in a
manner that uses bandwidth for good connections over bad
connections, given the high error rate experienced with wireless
USB. Periodic transfers are first attempted before asynchronous
transfers, as l...
A digital media codec adaptively re-arranges a coefficient scan order of transform coefficients in accordance with the local statistics of the digital media, so that the coefficients can be encoded more efficiently using entropy encoding. The adaptive scan ordering is applied causally at encoding and decoding to avo...
ABSTRACT
DISAGGREGATED SECURE EXECUTION ENVIRONMENT
An electronic device, such as, a computer may be adapted for self-monitoring for compliance to an operating policy. The operating policy may specify a pay-per-use or subscription business model and measurements associated with compliant usage. A secure execution...
ABSTRACT SYNCHRONIZATION PEER PARTICIPANT MODEL
Various technologies and techniques are disclosed that improve synchronization of data between varying types of devices and/or services. A participant receives a request from another participant to perform a synchronization operation. The synchronization engine dete...
A backup administrator can backup files from a production server on any of a plurality of different bases. In particular, some files can be replicated on a changed-byte basis. In other cases, files can be backed up by replicating updated copies of the entire file, or even byte blocks of the file . Determinations as ...
A system and methodology that provide schema inferencing at runtime. An inference component receives as an input an input data stream, and processes the input data stream at runtime to develop a schema based on actual values thereof. The inferred schema is then used to create an inferred output data that is a specia...
A metadata driven system for supporting business application software required in the middle tier for a line of business applications includes a process metadata module adapted to store a process in metadata format, wherein the process object contains logic related to an entity of the application software. The syste...
ABSTRACT
I/O-BASED ENFORCEMENT OF MULTI-LEVEL COMPUTER OPERATING
MODES
A computer is architected so that a monitoring and enforcement of an operating policy is carried out at an interface circuit that transmits data between a processor and one or more function blocks. The function blocks may include system memory...
Techniques to minimize problems with dead zones associated with
panoramic cameras are described. A dead zone is an area about a zero
degree boundary where a three hundred and sixty degree panoramic image
is split so that a two-dimensional panorama can be rendered. Redirection of
the zero degree boundary to a pos...
Systems and methods are provided for a user interface with an automatic search menu. The interface exposes commands to the user as instantly searchable hierarchy. Visually, this is represented as a tree view with an edit box above it. There is no "Search" or "Go" button to press. One second after any character is en...
A system and method are disclosed which may include accessing an Internet site by a proxy server; converting image data from the Internet site into a multiresolution representation; and transmitting the image data in said multiresolution representation to a client device.
Managing a display of a user interface, in one implementation, a first user interface and an option to change the first user interface to a second user interface may be displayed. A selection of the option to change the first user interface to the second user interface may be received. In response, the second user i...
A graphical user interface (GUI) is presented on a display including a parent window and a number of child windows rendered within the parent window according to a display scheme. When the size of one of the child windows is changed, the size of one or more of the other child windows is changed, so that the display ...
Systems and methods for performing integrity verifications for computer programs to run on computing systems are provided. An integrity check is completed before passing execution control to the next level of an operating system or before allowing a program to run. The integrity check involves the use of a locally s...
Systems and methods for validating integrity of an executable file are described. In one aspect, the systems and methods determine that an executable file is being introduced into a path of execution. The executable file is then automatically evaluated in view of multiple mal ware checks to detect if the executable ...
Aspects of the present invention reduce the number of false positive touch inputs made by a non-stylus object such as the user"s finger or hand. When the stylus is located proximate to the touch-sensitive surface, the sensitivity of the surface to non-stylus input is disabled, reduced, or otherwise modified. For exa...
Delivering document fragments iron) a web server to a server-deployed client application. The invention includes a data structure of a request for data including a namespace field, an event handler field, and a parameter field. A first process sends a populated data structure to a second process. The second process ...
In accordance with certain embodiments, requests to collect structured data in a web page and to subscribe to that structured data are received. This structured data is stored in a data store to allow offline use of the structured data. In accordance with other embodiments, a computing device displays multiple links...
Searching electronic program guide (EPG) data is described. The EPG data may be compartmentalized into channel metadata that describes characteristics of one or more channels and content metadata that describes characteristics of one or more content items. In a implementation, a method includes searching channel met...
Secure safe sender lists are described. In an implementation, a method includes determining which of a plurality of hierarchical levels corresponds to a message received via a network. Each of the hierarchical level is defined by mechanisms for identifying a sender of the message. The message is routed according to ...
Various embodiments provide a unified discovery control that can be incorporated as part of a web browser. The unified discovery control provides a central location that describes various services that a website has to offer. In addition, the unified discovery control can allow the user to interact with the individu...
Systems and methods that that automatically generate a data access layer lor a middle tier of a relational data store with stored procedures, via a data access layer generator. The data access layer generator can employ an extensible mark up language extension (XML) to determine the stored procedures that are typica...
One or more universal serial bus (USB) devices are connected at a client computer. Tlae USB devices are recognized by the client computer and a determination is made as to whether an application server computer provides functionality for one or more of the USB devices. A specific communication path is provided from ...
A unique object navigation system, user interface, and method that facilitate faster and smoother navigation of objects are provided. For example, the system can generate a plurality of objects that can be rendered on a display space that spans a single page in length, thereby mitigating the need to navigate through...
Scalable File Replication and Web-based Access
Various embodiments introduce the notion of a replication entity which implements a highly scalable file replication system. In one embodiment, the replication entity resides in the form of a scalable replication service. In at least some embodiments, the replication s...
ABSTRACT APPLYING EFFECTS TO A MERGED TEXT PATH
Effects are applied to a shape that is generated from a merged text path. The merged text path is created from text paths that are associated with a text run. Boolean operations may be used to create the merged text path The merged text path removes any overlap and re...
SECURE TUNNEL OVER HTTPS CONNECTION
ABSTRACT OF THE DISCLOSURE
Many secure tunnels require protocols that require special handling, authorization or security certificates, such as L2TP and PPTP. This often eliminates them for use between a corporate or agency network and outside, public networks. A secure socket t...
A method to prepare an Extensible Business Reporting Language (XBRL) document in a web-hosted server includes authenticating a user, uploading financial information from a spreadsheet, storing the information, and processing the data into n XBRL compliant document for transmittal to a financial regulatory agency. Th...
Systems for providing disposable email addresses are disclosed herein. A user may set up a disposable email address for receiving emails from a trusted, Internet-based enterprise. The user may set up a dedicated mailbox folder associated with the disposable email address or enterprise. The email server may automatic...
A media discovery module (MDM) (1002) is described that facilitates a user's access to desired media items. The MDM (1002) presents a series of arrays of media items to the user. The user's selection within any array governs the composition of media items that are presented in a subsequent array. Different linking c...
A method and system for increasing the computational and network efficiency of presence servers having collections of publications is provided. The presence system uses several techniques that enable a presence server to provide rich presence information without requiring expensive processing. First, the presence sy...
Techniques for using advertising to fund the use of client-side or network-side data access services by a user of a personal electronic device are discussed. Digital advertising content is associated with data items accessible via a particular data access service at a variety of processing locations, using a variety...
A method and system for increasing the computational and network efficiency of presence servers having collections of publications is provided. The presence system uses several techniques that enable a presence server to provide rich presence information without requiring expensive processing. First, the presence sy...
Interactive relational graphic solutions facilitate an economical teaching tool to explain a plethora of educational topics. The solutions are associated with a graphics capable application of a computing device. The solutions facilitate user interaction by graphically correlating functions through a series of inter...
Access control as it relates to policies or permissions is provided based on a created model. A security policy is abstracted and can be independent of a mechanism used to protect resources. An abstract model of a potential user, user role and/or resource is created without associating a specific individual and/or r...
A property tree user interface permits user assignment of values to metadata properties and user navigation of data, within a system that includes a data storage subsystem in which data items are organized and queried by way of properties. The property tree (203) includes nodes that expose properties of data items. ...
A Distributed Routing Table (DRT) mesh can comprise two or more nodes, each of which maintains its own routing table that represents some or all of the overall routing knowledge of the DRT mesh. Each node can be comprised of modular components that can perform various defined functions such that the features and abi...
Technologies for an operating system identifying SSD and CSSD devices based on a corresponding descriptor, and for optimizing operating system functionalities with respect to the SSD/CSSD device. Optimizations include disabling non-SSD/CSSD functionalities, such as HDD defragmentation, and by enabling SSD/CSSD speci...
Described herein are one or more implementations for transforming (e.g., transcoding) DRM-protected digital media content while retaining associated DRM-information (e.g., a user license its related information).
A multi-hop mesh network may be connected to a Local Area Network (LAN) using a MAC Bridge. One or more nodes on the mesh network may be configured as a bridge node that employs a MAC bridge. Packets that travel between stations on the LAN to nodes on the mesh network flow through one of the bridge nodes on the mesh...
A form of removable memory, such as a universal serial bus (USB) flash device (UFD), may allow secure storage of and access to a time balance of a pay-per-use or subscription computing system. A computing device may establish a secure connection to a portable secure computing device to access a stored time balance o...
Architecture for a session lock and lobby feature in a distributed conferencing framework for a conferencing session. Under a lock scenario, once a user enters the session, the session can be locked to prevent other individuals from entering, even if the individuals were invited to the session. Locking can be accomp...
An extensible, multi-tenant software-as-a-service business application platform is provided for hosting multiple organizations. Organization services are provided by virtual or physical servers with dedicated data stores assembled in scalable groups. Distributed interaction between components of the scalable groups ...
Providing a workflow engine for virtualizing a managed execution environment. The workflow engine executes a workflow based on an automaton and methods associated therewith. The workflow engine captures continuations associated with the executing workflow to enable modeling of real-world processes.
...
A unified user interface is described that allows a user to search, browse, and launch items from the same user interface. For example, a single text input box may be provided that allows the user to perform all these functions by typing in a portion of an item name or an entire item name. The various functions may ...
Enabling creation of control flow patterns in a workflow via continuations. Each continuation represents an activity execution context for an activity executing in the workflow by a workflow engine virtualizing a managed execution environment. Responsive to a request, the activity execution context is recreated via ...
A system and method of deriving web service interfaces from form and table metadata is disclosed. The method uses a discovery subsystem to discover services that are available on an application server, retrieves the metadata descriptions of the services on the application server and uses the services discovered and ...
Declaratively canceling execution of an activity. A state automaton for an activity is defined, and the state automaton includes an executing state, a canceling state and a closed state and classifies an execution lifetime of the activity. The activity includes work items and organizes the work items in an executio...
A hierarchy of (2D) visual objects and (3D) scene objects are integrated for seamless processing to render (2D) images including a (2D) view of a (3D) scene on a (2D) computer display. The processing of the (3D) model objects and (2D) visual objects in the visual hierarchy is integrated so that the processing is rea...
Asynchronous fault handling for a workflow A state automaton for an activity in the workflow is defined. The state automaton includes at least an executing state, a faulting state, and a closed state and classifies an execution lifetime of the activity. The activity is defined to include work items and includes an ...
ABSTRACT REFINED SEARCH USER INTERFACE
A refined search user interface is described. In an implementation, items that are available via a particular service and a list of other services that are also available are displayed in a user interface. The display of items is refined for each character entered via a search...
A method and system for increasing the computational and network efficiency of presence servers having collections of publications is provided. The presence system uses several techniques that enable a presence server to provide rich presence information without requiring expensive processing. First, the presence sy...
Searching within a site of a search result is enabled with a user interface, a method etc. that presents a search within a site tool indicator in association with at least one search result of multiple displayed search results. The at least one search result corresponds to a given page of a particular site. The sear...
ABSTRACT ESTIMATION OF INITIAL DYNAMIC RENDERING CONTROL DATA
Facilitation of web page rendering using dynamic rendering controls. A server identifies a representation of a page to be downloaded to a client. The representation includes a dynamic rendering control that may be used to render a portion of the page Rat...
A declarative model for specifying appropriate transformations that may occur at the input and output of each service of a sequence of services that accomplish a more complex task. Each of the services may have access to the appropriate transformation declarations, and may interpret the declarations to thereby be ap...
ABSTRACT TRANSIT-COORDINATED LOCAL SEARCH
Various embodiments can provide helpful information to a user who is looking for a particular point of interest. In at least some embodiments, first and second searches are conducted The first search uses a local search provider and produces results which describe one or m...
Embodiments of the present invention are directed at minimizing power consumption of a computer while permitting the execution of meaningful tasks by programs installed on the computer. In accordance with one embodiment, a method that implements power conserving measures based on the amount of capacity that is avail...
A system that manages lifetime of an object is provided. The system analyzes references on multiple objects to determine reach ability of a native peer and dynamically transitions between native and managed object lifetime management systems based on the analysis. When a native peer is not reachable by a native appl...
A system, apparatus, method, and computer-readable media are provided for efficient database lookup operations. According to method, procedural checks for generating a response to a database query are converted into a set of database operations. The database operations are performed the first time a query of the dat...
Generally described, the present invention provides the ability to process digital voice conversations to identify data packets containing content of interest and to further process the identified data packets. More specifically, mining profiles may be developed identifying particular types of content that is to be ...
A method and system for collecting and providing required information to a VoIP client or other service providers is provided. The inquiry for information will be received and processed to identify appropriate contextual information which will be transmitted to the information inquiring party. For example, an inquir...
A method and system for tracking and editing a resource in a real-time collaborative session is provided. A collaboration system provides real-time collaborative sessions between participants. When a participant in a collaboration session uploads a non-editable copy of a resource for viewing in the collaborative ses...
Hybrid unicast and multicast data delivery involves delivering data to client devices partially using a unicast communication and partially using a multicast communication. For example, higher-relevancy television metadata may be extracted from television metadata. A server transmits the higher-relevancy television ...
Architecture for data communications optimization based on generating and communicating "intents" or "hints" to a storage device and faster/slower solid state memory optimization. Data destined for storage on the storage device (capable of hints processing) can be bracketed to take advantage of improved performance ...
In embodiments consistent with the subject matter of this disclosure, a user may input one or more strokes as digital ink to a processing device. The processing device may produce and present a recognition result, which may include a misrecognized portion. A user may indicate a desire to correct the misrecognized po...
A system provides redundant telephone call processing. A gateway receives a call and identifies a first server as having primary responsibility for servicing the call and a second server as having secondary responsibility for servicing the call. The gateway communicates the call to both the first server and the seco...
Technologies for identifying data stored on a solid state drive ("SSD") device that correspond to data associated with a delete event, and marking the deleted data stored on the SSD as invalid such that the SSD can avoid unnecessary operations on the invalid data. Included are interfaces operable to communicate inva...
Architecture for providing pre-authenticated information from an endpoint for subsequently authenticating a device and/or user associated with the previously-authenticated information. A pre-authentication module of the architecture can be a trust component as part of an application that facilitates the utilization ...
A game console determines if hard disk drive is authorized for use with the game console by analyzing an encrypted certificate. The encrypted certificate is stored in memory of the drive. Upon detection of the drive, the game console receives encrypted certificate and decrypts it. The certificate contains parameters...
The subject invention provides a system and/or a method that facilitates automatically updating contact information. An interface can receive identification data related to a first mobile communication device, wherein a contact update component can provide contact information to a second mobile communication devic...
Systems and/or methods are described that enable a credential interface. These systems and/or methods may build a credential user interface enabling a user to choose between multiple credentials and submit an authenticator for a chosen credential. These systems and/or methods may also gather information about arbitr...
Distributed searches in a casual server network may be provided. First it may be determined, at an originating server, that a first request cannot be fulfilled by information associated with the originating server. Then, from the originating server, the first request may be posted to a distributed request ring. Next...
Implementations of behavioral advertisement targeting and creation of ad-hoc microcommunities through user authentication are described. In one implementation, a user is allowed to submit authentication information on a webpage associated with a third party website. For example, a user can identify himself by enteri...
A system provides automated attendant call processing. A database comprises words that are anticipated to be received in a voice input. Stored in relation to the words are actions to be taken upon receipt of a call comprising to particular words. A server receives a call, and after playing a prompt, receives a voice...
A system and method for providing the ability to discover the capabilities of a user"s computer to determine whether it is capable of supporting more than one wireless protocol simultaneously is provided. A computing device"s capabilities (including, for example, hardware and/or software capabilities) is checked to ...
Methods and apparatus to enable spectrum auctioning, allowing a user to gain access to otherwise unavailable spectrum is disclosed. Spectrum providers may have the exclusive rights to the spectrum, but these providers can allow other users to access the spectrum in certain situations, for example, limited time use w...
Methods and apparatuses for Orthogonal Frequency-Division Multiplexing (OFDM) communication of non-OFDM radio signals are disclosed. The non-OFDM radio signals are force-modulated into OFDM signals. In one example, a non-OFDM signal is received and is processed into an OFDM signal to produce a created OFDM signal. A...
A computing device configured for wireless communication may effectively control adaptation to channel conditions. The device may be configured to identify and classify conditions impacting performance of a channel so that appropriate adaptations may be made. Interference may be detected by correlating received sign...
Systems and methods establish a virtual points clearinghouse. The clearinghouse redeems heterogeneous digital micro-payments—such as bonus points received from various points issuers—across diverse service providers. Points meant for exclusive redemption at one service provider may be directly redeemed for non-corre...
Systems, methods, and/or techniques ("tools") for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices ("stores"), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, ...
Data files, applications and/or corresponding user interfaces may be accessed at a device that collaborates in a mesh. The mesh may include any number or type of devices that collaborate in a network. Data, applications and/or corresponding user interfaces may be stored within a core object that may be shared over t...
An apparatus and method provide a companion application via a companion application corresponding to a host window provided by a host application, the companion window providing information or metadata descriptive of data in the host window. The host application and companion applications may be separate application...
Presented are techniques for creating a photo-generated navigable storefront. Such techniques include receiving a images and processing the images through an image matching algorithm. Such images may include, for example, photos taken with a camera. Additionally, the images are tagged with identifier tags in order t...
Various technologies and techniques are disclosed for creating and/or locating transactional code blocks in a transactional memory system. A user such as a software developer can decorate a particular function with an identifier to indicate that the particular function is transaction-safe. A normal version and a tra...
In a Near Field Communications (NFC) link, the data link turn-around time is adjusted to optimize battery use while maximizing the data throughput. A receiving device immediately transmits any pending high priority control or data messages in its own queue in response to a message from the sending device, subject to...
Data visualization may be provided. First, a data cell may be displayed. Then a request may be received to expand the data cell into a plurality of sub-cells. A sum of the data corresponding to the plurality of sub-cells may equal a value corresponding to the data cell. Next, a number of sub-cells in the plurality o...
A method and system for producing normalized images of conference participants so that the participants appear to be approximately the same size when the images are displayed is provided. The normalizing system normalizes the size of images based on constraints relating to the distance of participants from the locat...
A method and apparatus provide for performing language translation by obtaining a selection of a language preference for presentation of text and/or speech on an electronic device. When data is received that includes content in a language other than the preferred language, a decision whether translation is required ...
unified method for processing Raw and pre-processed digital images (fig. 3 elements 310 and 312) is provided. The method may include receiving digital image data and determining if the data is Raw or pre-processed (fig. 3 element 312). If the digital image data is Raw, the method may further include receiving modifi...
Various technologies and techniques are disclosed for transforming a sequential loop into a parallel loop for use with a transactional memory system. Open ended and/or closed ended sequential loops can be transformed to parallel loops. For example, a section of code containing an original sequential loop is analyzed...
A computer may be capable of communicating with devices via network through multiple interfaces. When a new connection is to be established, the computer may select an interface to use for the connection. In some embodiments, the interface may be selected based on historical connection information representing the p...
The presenl invention is directed to a system (200) for automatically capturing images based on the actions of an author (201) in completing steps in an overall task performed on a user interface (205). To capture the images the author (201) activates a recording component (207). The recording component (207) record...
Displaying a list of search-engine results in the same web-browser window as a viewing frame that is configured to display one of the results is described herein. A user"s web search is performed on a search engine, and results are returned to a client computing device. The results are listed in a web-browser window...
An input device including a scroll wheel assembly for moving an image in multiple directions on a display screen. The scroll wheel assembly may include a finger-engagable control member that may be endlessly rotated about a rotation axis and a tilt sensor containing a tilt contact member coplanar with the finger-eng...
Providing data bound workflow activities to model messaging between a workflow instance and a workflow host. The workflow author associates a data source with each data bound activity in a workflow without specifying details of the underlying messaging technology. The data bound activity in the workflow instance com...
service that provides for setting up game sessions for a plurality of game players. A number of game players that each have a computing device capable of playing a computer game are linked together by the service. The service allows a player to set up a common game session so that a subset of the players can simult...
Processes and techniques for reducing spam over instant messaging (SPIM) are described. In one implementation, the number of open instant messaging threads ("chat threads") that a specific user can have at a given time is limited to prevent a potential spimmer from flooding instant messaging users with SPIM. Another...
A system that includes a content distribution facility coupled to at least one client device for presenting programming via a presentation device having a screen. The system displays on the screen first content having an associated characteristic. In response to an event other than user selection of a program, the s...
Tampering with pieces of software is inhibited. The obfuscation oi image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. A process of verifying whether the pieces of software together constitute a software package that requires p...
A method of identifying a characteristic of interest represented by a textual
input, comprising:
Building a graph corresponding to the textual input;
Scoring sub-graph components of the graph;
The scores; and
Performing text manipulation based on the identified graph fragments.
An anisometric texture synthesis system and method for generating anisometric textures having a similar visual appearance as a given exemplar, but with varying orientation and scale. This variation is achieved by modifying the upsampling and correction processes of the texture synthesis technique using a Jacobian fi...
The present invention extends to comparing and contrasting models of business. Model processing modules implement formal operators that can be used to manipulate models of business. A compare operator can be used to compare similarly typed models of business. A contrast operator can be used to contrast differ types ...
In accordance with certain aspects of the design time validation of systems, a description of a system being designed and a description of an environment are received. Both of the received descriptions are used to validate the system against the environment while the system is being designed and prior to attempting ...
The present invention provides method and system of displaying items that gives the user the ability to easily access recently accessed items. The recent items list includes both incoming and outgoing correspondences that are attempted to be matched to the corresponding contact stored in the device. The user can ac...
Systems and methods for interfacing with plyback of media by a media player are provided. By combining the functionality of fast forward and skip forward into a single button control, the invention reduces the numbers of control buttons that need be included on a device, reducing device costs and consumer "button ov...
Methods and systems are provided for using an existing email transfer protocol, such as SMTP, to exchange digital objects in an authenticated manner. The provided methods and systems solve the bootstrapping problem of computer identities for P2P communication by authenticating the exchange of public information. If ...
ABSTRACT DEFINING USER INPUT FIELDS ON A PORTABLE MEDIA DEVICE
A user may always know that on a portable media device, by pressing an input field in particular location, such as the input field to the right of the center point of a plurality of input fields, the same function may occur no matter what the orientatio...
In a computerized system that includes one or more program components including one or more requesting components that can request to access one or more target components, a method of providing a requesting component with access to an appropriate version of a target component, comprising the act of:
receiving a req...
A method for determining a path of a pen tip within a document, the method comprising:
(A) decoding extracted bits associated with a captured image to determine location coordinates of the captured image;
(B) in response to (A), if the location coordinates of the captured image cannot be determined by decoding, ma...
An autofill system comprising
a trained machine learning component that uses one or more sets of inputs to facilitate autofilling of web-based forms, and
an autofill component that selectively enters appropriate data into one or more form fields based at least in part upon information generated by the machine lear...
The subject invention relates to systems and methods that utilize a task oriented user interface with a document centric software application. The task oriented user interface aims to be more discoverable than conventional interfaces and better at performing unknown tasks without sacrificing the efficiency of perfor...
A method and system for scenario synchronizing in a communication device allows a user to complete a task initiated or prompted from a secondary display on a primary display. The secondary display provides quick access to useful information such as time, date, battery life, signal strength, new messages and calendar...
The subject invention relates to systems and methods that enable dynamic programming and execution of an electronic communications dialog. In one aspect, a configurable messaging system is provided. The system includes a configuration file to describe interface options of a computerized dialog session, wherein the c...
The coordinates for laying out visual items in two, three-, or dimensional space
along an embedded one-manifold or path are calculated and coordinates are generated for placement of the items in a container. A one-manifold may be continuous, discontinuous, be contained entirely within a container or extent bey...
Compression of streaming data is described. In an implementation, a method includes compressing data for communication in a terminal services environment by finding an index in a lookup table that matches an initial sequence in data. The lookup table includes a plurality of entries. Each of the entries is discoverab...
Data management between a common data store and multiple applications of multiple disparate application frameworks. A data storage component is provided that facilitates the storage of data, which data includes structured, semi-structured, and unstructured data. A common data platform interfaces to the data storage ...
A system and method directed to capturing the structure of data models using entity patterns is provided wherein an entity pattern is an abstraction, for example in the MICROSOFT BUSINESS FRAMEWORK® (MBF), that surfaces in the model editor of the framework at the root level and consists of one or more entity roles t...
A method and system for scenario synchronizing in a communication device allows a user to complete a task initiated or prompted from a secondary display on a primary display. The secondary display provides quick access to useful information such as time, date, battery life, signal strength, new messages and calendar...
A method of converting between color spaces where color components are cached when they are well-defined after color space conversion. When the components become undefined after conversion, the cached values are used instead of using an arbitrary default value. The resulting color editing system is "robust" in that ...
An accessibility system for providing user interface information to a client, the accessibility system comprising, a client which requests user interface information; a server which provides user interface information to the client, characterized by a client side interface comprising a logical tree for revealing use...
The present invention extends to generic collection and delivery of telemetry data. A telemetry component receives telemetry data, through a common telemetry interface that is accessible to a plurality of applications, from an application. The received telemetry data is aggregated with any existing telemetry ...
Memory management techniques involve establishing a memory pool having an amount of sharable memory, and dynamically allocating the sharable memory to concurrently manage multiple sets of sequenced units of digital data. In an exemplary scenario, the sets of sequenced units of digital data are sets of time-ordered m...
An extraction, transformation and loading (ETL) designer mobile of a computerized financial system that is used to configure an ETL package for loading data elements from a financial table of a financial database into a reporter table in accordance with a predefined format. The ETL designer mobile includes a transfo...
A programming model that takes general purpose APIs and machine-generates new programming models based on user defined schemas that provide the developer with data and view separation, and a way to communicate to the host application using the domain of the problem being solved. The system comprises a schema compone...
A method and apparatus are provided for adapting a language model. The method and apparatus provide supervised class-based adaptation of the language model utilizing in-domain semantic information.
Methods and systems provide for automatically performing actions on or in association with text or data strings that are recognized as belonging to certain semantic categories. Text entered by a user is passed to a recognizer application. If a given text or data string is recognized as belonging to a given semantic ...
A method and system for aggregating contact information of contacts from multiple contact sources is provided. The aggregation system collects contact information for a user from various contact sources. The aggregation system stores the collected content information in a contact data store. The aggregation system m...
Generating symmetric keys among distributed appliances, includes generating public and private values one at least one appliance, importing a public value from another appliance via an out-of-band entity, and generating a secret value as a function of the private value corresponding to the total appliance and the pu...
A method detects similar objects in a collection of such objects by modification of a previous method in such a way that pre-object memory requirements are reduced while false detections are avoided approximately as well as in the previous method. The modification includes (i) combining k samples of features into s ...
A document indexing system utilizes two index, an infrequent word index is maintained separately from a frequent word index word to map the location of words that occur infrequently in the indexed documents. The infrequent word index may be stored and partitioned differently than the frequent word index to promote e...
A DV video input source (104) can be any type of device or communication network capable of transferring DV video content to computer (102), including for example, portable storage media (104) (1) (e.g., magnetic discs, media card, optical discs), a DV video recording device (104) (2) (e.g., a digital camcorder), or...
A system and method for synchronizing a database having metadata and raw data. Metadata may be fully synchronized between two systems, with copies stored on both systems. Raw data may be selectively synchronized, so that a client system need not store all of the raw data locally. When disconnected, the client system...
A method comprising; receiving at one of a plurality of nodes in a peer-to peer network, an indication of a change in membership by another said node in the peer-to-peer network; and
broadcasting a report;
that describes the change; and
for receipt by each said node referenced in a routing table included in th...
ABSTRACT
DEFINING USER INPUT FIELDS ON A PORTABLE MEDIA DEVICE
A user may always know that on a portable media device, by pressing an input field in particular location, such as the input field to the right of the center point of a plurality of input fields, the same function may occur no matter what the orientat...
Systems and methodologies are provided for data visualization, retrieval and management of a logically ordered list by a selective multi level expansion of pivot point data. Such pivot points can represent hierarchy expansion designators to a subsequent level, which can include user created groups/clusters of data. ...
Computer-implemented methods for power management of network interface devices are disclosed. Such methods may include dividing a time period into a plurality of time slots, determining an amount of data received by the network interface device during a first of the time slots, and determining whether the amoun...
An evaluation of supported rates of available wireless networks is performed and these supported rates are matched against supported rates of wireless connection hardware (e.g., a wireless network interface card) of a computer trying to connect to one of the wireless networks. If the wireless connection hardware of...
Embodiments of the present invention provide the ability for a software provider to distribute software updates to several different recipients utilizing a peer-to-peer environment. The invention described herein may be used to update any type of software, including, but not limited to, operating software, programmi...
A computing device includes a processor, a storage device having an executable file, and a file system for executing the file in place on the storage device on behalf of the processor. The file is divided into multiple non-contiguous fragments on the storage device, and the computing device further includes a virtua...
Systems and/or methods that enable addition of a designer-created aspect originating from one electronic form template into another electronic form template are described. The systems and/or methods may also, in one embodiment, enable a user to graphically package designer-created aspects of an existing electronic f...
A system for constructing information search queries is provided. The system comprises a query language that has a predefined syntax and a constructor that creates a search object. The search object encapsulates a query constructed in the query language. Methods for using the system are also provided.
...
Technologies are described herein for dynamically laying out images and associated text using pre-defined layouts. The pre-defined layouts are created and data defining the layouts is stored in a layout definition file. An application program provides a user interface for dynamically laying out the images and associ...
A system for presenting web content that allows the user to select and change the view of the content. A page of content, which is viewable on a web browser, contains a user-operable element, such as a pull-down menu, that allow the user to select a view for that content. The page is generated in a default view, by ...
ABSTRACT
TEMPORAL RANKING OF SEARCH RESULTS
An information dissemination system ranks the search results based on a temporal weight assigned to each search result. The temporal weight is an indication of the importance to a user that varies with time. For each search result, the information dissemination system ca...
Mutual exclusion techniques for use in a dynamic peer-to-peer environment are described. In an implementation, a method includes receiving, at each of a plurality of logical replicas, a request from a client. Each of the logical replicas includes a queue and is for exclusive association with one of the clients. The ...
A desynchronized fingerprinting method and system for identifying collaborators in the making of illegal copies of digital multimedia products. The desynchronized fingerprinting system and method can be used for both audio and video applications. The method and system include an embedding feature and a detection and...
The principles of the present invention provide for using directional antennas to adaptively communicate in a wireless mesh network. A number of infrastructure components are included in a wireless mesh network environmemt. Each infrastructure component includes an omni-directional antenna and one or more directiona...
ABSTRACT OPTIMIZATION OF FACT EXTRACTION USING A MULTI-STAGE
APPROACH
Facts are extracted from electronic documents by recognizing factual descriptions using a fact-word table to match to words of the electronic documents. The words of those factual descriptions may be tagged with the appropriate part of speech. M...
A method, system, and computer-accessible medium are provided for automating the optimization of search result relevance in a search engine. The system and method continually collect data that represent various aspects of how a search result is performing and compare that performance data to the expected performance...
A decentralized computing environment, comprising;
a number of nodes, each nodes in the number of nodes being capable of being a neighboring node of other nodes in the number of nodes, each node being capable of capable querying the availability of neighboring nodes for match, the match being formed when a first no...
A web page rendering mechanism in which a computing system generating a web page from a web page definition. A web page class is complied from the web page definition. The theme-specific properties are described separate from the web page definition in theme-oriented text documents that are compiled into a theme cla...
A method of compiling orthography rules includes compiling first and second orthography rules into individual Finite state Transducers by inserting elements of the rules into Finite State Transducers Templates. The individual Finite State Transducers are combined to form a single combined Finite State Transducer. Un...
A project management application provides an environment in which a user can transform a project sketch, which is based on mostly "freeform" data, into a defined project plan. The project management application facilitates the mixture of freeform task attribute values with structured attribute values of one or more ...
ABSTRACT NETWORK JITTER SMOOTHING WITH REDUCED DELAY
A method of compensating for jitter in a packet stream is described. The method comprises placing undecoded frames extracted from packets in the packet stream into a jitter buffer while decoding frames from the jitter buffer and placing the decoded frames into a ...
Methods and systems are provided for using an existing email transfer protocol, such as SMTP, to exchange digital objects in an authenticated manner. The provided methods and systems solve the bootstrapping problem of computer identities for P2P communication by authenticating the exchange of public information. If ...
When a voice input from the caller is received by the recipient, the characteristics of the voice input are applied to a plurality of acoustic models which include a generic acoustic model and an acoustic model group of the callers who are previously identified and a plurality of respective acoustic scores is obtain...
The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A method, comprising:
referencing a table that includes double-byte font entries and associated phonetic representations of the double-byte font entries; and
using at least one of the double byte ...
Architecture (100) for controlling access to a service (102). The architecture allows denial of regular and periodic service to all but a selected number of concurrent clients (104) associated with a subscriber, and without any manual administration at the server of a list of specific computers. Rather than require ...
A method for processing XML documents in a computer-based system includes associating each of a plurality of information items with a corresponding one of a plurality of binary-data units and providing a XML document associated with a XML information set comprising one or more of the plurality of information items. ...
A system and method for a media processor separates the functions of topology creation and maintenance from the functions of processing data through a topology. The system includes a control layer including a topology generating element to generate a topology describing a set of input multimedia streams, one or more...
Described is a method and data structure that enables an object to be specified declaratively within a markup document. The markup document may be XML-based (310). In accordance with the invention, the object is written based on a mapping. The mapping includes a URL attribute (316) for defining et location for a def...
In order to allow for application development without requiring extensive graphical design by software developers or extensive software knowledge by graphical designers, applications are separated into a view and a model. Properties in the view and properties in the model are associated through data binding, ...
The described systems and method described are directed at encoding randomly distributed features in an object. Randomly distributed features in an authentication object are determined. Data representing the randomly distributed features is compressed and encoded with signature. A label is created and includes the a...
The claimed subject matter provides a system and/or a method that facilitates redirecting an instant messaging session or an instant messaging communication. An interface component can receive a portion of data related to an instant messaging session, wherein the portion of data is associated with an instant messagi...
The concept of a specialized task identifier is disclosed to indicate the content of a file within a computer-implemented system for providing help content to a user. In one embodiment, the specialized task identifier includes at least one element selected from a controlled vocabulary. In another embodiment, the spe...
The systems and methods described herein generally relate to counterfeit-resistant and/or tamper-resistant labels, and more particularly, to utilizing randomly distributed features of an object (whether embedded or naturally inherent) to limit unauthorized attempts in counterfeiting and/or tampering with the label.
...
A method for an application on a computing device to write data from a source to a storage medium associated with the computing device, the method comprising:
the application issuing an application command to a file system of the computing device, the application command including an identification of the source an...
A development environment for computer programs in which programs under test may be instrumented with probe functions. The probe functions are called through a wrapper function structured to comply with restrictive calling conventions of the platform for which the computer program is developed. By complying with the...
A system for the unified provisioning of virtual and physical disk images is created. The system includes a library of disk images. Client devices are able to upload to, and select disk images from the disk library. The library is able to determine the hardware requirements of a client device, and format the disk im...
An exemplary sclable print spooler efficiently prints data on a printer and is most effective in use with a dedicdated print server. One use of the invention is with a print server that services a large number of client computers haaving applications programs having a need to print data. DThese could include, but ar...
Apparatus, system and method for enabling an improved portable media player are provided. The aparatus provides improved media recording, synchronization, rendering and user interface experiences for a user. In various embodiments, portable media players are provided with a closed position for substantially protecti...
The claimed subject matter provides a system and/or method that manages storage media associated with a plurality of disparate devices. The disclosed system can include a network of disparate devices wherein each device in the network can be associated with storage media. Additionally, the disclosed system can also ...
An application is built in accordance with a particular framework. A component is incorporated into the application. When an asynchronous operation is to be performed, the component is configured to issue a standard function call in a manner that is independent of the particular application framework used to build t...
Multiple computing devices are connected together using a high-speed wireless link. The wireless link enables expansion of available resources to the host device, such as one or more of volatile memory resources, non-volatile memory resources, and additional processor resources.
A unique volume license key (VLK)is provided to a volume license holder.A singed file containing the VLK and the data derived from volume from volume license holder"s submitted computing environment information is provided to the volume license holder along with the licensed software.The license file is stored in a ...
A data structure embodied on a computer-medium comprising:
a first sub-structure indicative of a software extension that is to be incorporated in a software application program;
one or more second sub-structures associated with the first sub-structure and indicative of feacture types that can be added by the ext...
A database query user interface combines the user convenience of simple text searching with the expressive refinements of powerful query languages. The database query user interface includes a query text string input from a user including one or more terms of a chunk expression language format. The database query us...
The present invention is directed towards a test case inheritance behavior that can be controlled via attributes. A base test class from which test objects are derived are useful for reducing test case code and management. For example, base test classes and their derived objects can be used to implement steps that a...
1. A computer-readable" medium having thereon computer-executable instructions for performing a method comprising:
acquiring at least one raw network DNA component, each raw network DNA component corresponding to an attribute of a computer network;
generating at least one derived network DNA component according t...
A system for distributing personlized information, comprising:
a comparator that determines differences between two or more information items; and
an analyzer that automatically determines a subset of the information items as personalized information based in part on the differences and as data relating to the in...
The techniques and mechanisms described herein are directed to a method for creating an identity that defines a visual appearance for output generated by multiple applications. The identity may include a base design, an effects scheme, a color scheme, a font scheme, a logo, and business information. The identity bei...
Graphical presentation of data responds to changes in the range of a value in the data set being graphed by dynamically changing the range on the axis by which the value is represented. As the range of a value changes over time(increasing or decreasing), the range of the axis and its endpoints also dynamically chang...
Systems and methodologies for a scalable remote debugging system that can debug machines positioned behind a firewall and thru the Internet, via employing an Internet Friendly Relay Service (IFRS). The IFRS can be positioned in a common reach location and provide a secure method of exchanging communication traf...
Technologies are described herein for providing a dynamic user interface (UI) to allow a user to select an active diagram shape for insertion into a flowchart or other diagram without leaving the drawing canvas. Through the use of the embodiments presented herein, a diagramming application provides a user with a dyn...
Associating advertisements with on-demand media content is described. Advertisements are associated with media content that is available on-demand based on any number and combination of data analyses. Advertisements may be matched to media assets based on, for example, media quality, duration, time sensitivity of ad...
Example embodiments of the present invention provide a mechanism for allowing developers to define new interfaces and insert custom translational code that implements these new interfaces for legacy components that otherwise cannot communicate in a web service environment. These new interfaces are then exposed ...
A method and system for asserting power control over one or more hardware devices (86, 90, 92, 94 and 96) connected via a bus (84). The invention includes a method and system for signaling and waiting to suspend a first device connected to a second device. The invention also includes a method and system for suspendi...
A network security module for protecting a computing device from a security threat on a network, the network security module comprising:
a computing device connection connecting the network security module to the computing device;
a network connection connecting the network security module to the network; and a se...
A method and system for providing a common operating system feature set for supporting a variety of operating system configuration is described. The common operating system feature set is organised to provide a monimal memory footprint applicable to a number of devices and methods of deployment. The common operating...
[0057] Random code generation may include utilizing a statistical breakdown of real world code to randomly generate code that is lexically and structurally valid.
The present invention is a method and system for identifying words, text fragments, or concepts of interest in a corpus of text. A graph is built which covers the corpus of text. The graph includes nodes and links, where nodes represent a word or a concept and links between the nodes represent directed relation name...
A system, method, and computer-accessible medium are provided for optimizing the use of paid placement space on a search Web page. The system and method obtain conversion data associated with the paid listing and calculate a conversion rate and paid yield for the listing based on the listing"s performance. The syste...
In one aspect, an encoder/decoder selects a bitplane mode from a group of plural available bitplane modes, and processes a bitplane according to the selected bitplane mode, wherein the bitplane indicates AC prediction status information for plural macroblocks of a video picture. In another aspect, for a first interl...
An application program interface embodied on one or more computer readable media is disclosed. The interface includes a first dialog container configured to facilitate development of a first type of dialog within an application. Also included is a second dialog container configured to facilitate development of ...
1. A computer implemented system that facilitates the generation of meaningful description for a flattened data structure, comprising:
a data structure having a plurality of data nodes;
a valuation component that assigns a valuation to one or more of the data nodes in accordance with a predetermined metric, the me...
Technologies are described herein for presenting and navigating content having varying properties. One or more local or networked providers are searched for content objects. Content objects include associated metadata and may be stored within a content container. Each content object is displayed separately from its ...
A command-based group text messaging system comprising: an initiating mobile communication device that creates a message for subsequent broadcast to a recipient group; and a communication server that analyzes the message received from the initiating mobile communication device and broadcasts the message to a recipie...
The subject invention provides a system and/or a method that facilitates mapping a data base model to a database object. A type storage system can utilize a storage mapping of a file storage data model. The mapping can describe the database object created based at least in part upon a schema and how instances o...
A key-based advanced navigation system comprising:
a key-based input component which maps to one or more segments of content displayed on a portable device screen, the key-based input component comprising any number of numeric keys and non-numeric keys; a navigation component that facilitates navigating through the...
An online service that allows multiple users to share electronic documents over a computer network. Each user may access the online system after specifying the user"s credentials, after which the user may view the user interface specific to that user. The user interface may contain multiple panes, such as a navigati...
The present invention manages resources in a computing device to facilitate the allocation of resources amongst competing clients operating on the device. A hierarchy of budgets is constructed to encode restrictions on the aggregated use of a resource allocated by a resource provider to one or more clients. A resour...
A method for controlling exposure to liabililty for non-payment by a service consumer and controlling costs associated with requesting payment when a service provider provides services to a service consumer, the method comprising:
specifying a number of services within a billing unit for the service provider and th...
A method comprising: receiving a user request to render an on-demand media content; identifying an advertisement associated with the on-demand media content; and rendering the advertisement in conjunction with rendering the on-demand media content.
A digital certificate identifies an entity as having authority over the certificate to revoke same as delegated by the issuer. The certificate also has at least one revocation condition relating to possible revocation of the certificate. To authenticate the certificate, the identification of the delegated revocation...
Techniques are disclosed to limit short-term correlations associated with outputs of stream cipher kesystream generators. Output values of a generator are paired such that the paired outputs are sufficiently far apart to be considered independent. In one described implementation, a method includes sequentially stor...
A method for generating a subgroup of one or more media items from a library of media items. The method monitors user playback control actions during a playback experience with the library on a media player. The method chooses a selecting filter based upon the monitored user playback control action and generates a s...
A method for real-time design of beam sets for a microphone array from a set of pre of pre-computed noise models, comprising using a computing device to; compute a set of complex-valued gains for each subband of a frequency-domain decomposition of microphone array signal inputs for each of a plurality of beam widths...
A method comprising:
receiving a request to display program guide, wherein the request is received by a client device;
identifying program schedule information;
the client device generating a scrolling program guide; and communicating the scrolling program guide to a display device.
Methods, systems, and computer program products that automatically generate and track undo information so that the developer of a user interface object need not be responsible for generating and tracking undo information. Change notifications for changes to an object within a visual user interface designer are proce...
In a first exemplary media implementation, one or more processor-accessible media include processor-executable instructions that, when executed, direct a system to perform actions that include: accumulating host status information at multiple hosts; and sending the accumulated host status information from the multip...
ABSTRACT WEB FORMABASED WIRELESS COMMUNICATIONS
Web compatible information is effortlessly exchanged over wireless communications utilizing web-based formats. These techniques can be employed over, for example, NFC air links and other wireless communication means to share information between devices in actual web e...
A computer-implemented method for providing information to an automatic machine translation system to improve translation accuracy is disclosed. The method includes receiving a collection of source text. An attempted translation that corresponds to the collection of source text is received from the automatic machine...
A system for identifying principals within a computing environment, the system comprising:
a plurality of principal objects, wherein each principal object corresponds to a specific principal authenticated to perform a digital action within the computing environment and wherein each principal object is operable for ...
The present invention relates to a system and method to facilitate efficient and automated processing of messages. A bulk filter is provided to categorize one or more received messages according to a range of classification, the range spanning from at least a bulk classification of values to at least a non-bulk cla...
ABSTRACT
WIRELESS MESH NETWORKING WITH MULTIPLE SIMULTANEOUS
TRANSMISSIONS BY NEARBY NETWORK NODES
A wireless mesh network enables multiple devices near each other to transmit simultaneously, thus allowing increased network bandwidth. Prior to transmitting, a device may determine various parameters of the wireles...
ABSTRACT MODELING AND TEXTURING DIGITAL SURFACE MODELS IN A MAPPING
APPLICATION
Digital Surface Model (DSM) texturing and modeling of various objects on the earth's surface are provided for implementation in a mapping application. One or more image capture devices having wide-angle tenses can be placed in various ...
The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
A method for managing data in a list, the method comprising: creating a list having an item type and a relationship type; and adding an item to the list by generating an entry in the list in accordance wi...
1. A method comprising:
receiving a first part associated with a document, wherein the document contains a plurality of parts;
beginning processing the first part prior to receiving all data associated with the first part;
identifying a second part associated with the document, wherein the second part is identi...
Systems and methods for generating text suggestions are described. The computing system (106) includes a processor (108), and a memory (110) coupled to the processor (108). The computing system (106) further includes an initiation module (112) configured to initiate a text input. A syllable updating module (114) of ...
Profile data from multiple networking services can be combined and queried from one networking service. A primary networking service may store user profile data for one or more secondary networking services and the primary networking service. When stored, the data from the multiple networks may be aggregated or merg...
A personality-based theme may be provided. An application program may query a personality resource file for a prompt corresponding to a personality. Then the prompt may be received at a speech synthesis engine. Next, the speech synthesis engine may query a personality voice font database for a voice font correspondi...
Systems and methods for synchronizing data between endpoints, including the modification of data on an endpoint without necessarily modifying data that is communicated between endpoints are disclosed. In such systems and methods the representation of data on an endpoint may be modified so that constraints on that pa...
A computer with scalable performance level components and selectable software and service options has a user interface that allows individual performance levels to be selected. The scalable performance level components may include a processor, memory, graphics controller, etc. Software and services may include word ...
Techniques to perform automatic software provisioning are described. An apparatus may comprise a provisioning database, a client provisioning module and a network interface. The provisioning server may be operative to store software update packages for different packet telephony devices. The client provisioning modu...
A hybrid resource manager is provided for use in a computing environment. The hybrid resource manager serves as the single resource manager that cooperates with an operating system to manage each of the individual device drivers associated with the various functions of a multifunction hardware device. In one example...
Described is a technology by which a user can quickly locate a data item such as media content. A user may choose a pivot (filtering) category, including an aggregated "all" category, and may enter additional filtering criteria to narrow search results. Representations (e.g., images) of data items for are displayed,...
Described is a scrolling technology including a turbo- scroll mode that is automatically entered to increase the rate of scrolling through a set of items, (e.g., media content). The turbo-scroll mode may be triggered by holding down a scroll button for a period of time. In the turbo- scroll mode, visual cues are pro...
Functionality is described for collecting and presenting action information. The action information describes actions that take place on items at specified times. Among other applications, the functionality assists a user in identifying and accessing relevant items. In one illustrative case, the functionality can di...
Functionality is described for allowing a first user to select a sound item. The first user can use a first device to send this sound item to a second device operated by a second user. Upon the occurrence of a triggering event, the sound item selected by the first user can be presented by the second device to the se...
Key management is performed to generate a single key allowing of the decoding of all authorized levels of a plurality of access types within a scalable codestream. An access node set is derived from sets representing access types having hierarchies representable by fully ordered sets, such as resolution and layer le...
A two-dimensional representation of a document is leveraged to extract a hierarchical structure that facilitates recognition of the document. The visual structure is grammatically parsed utilizing two-dimensional adaptations of statistical parsing algorithms. This allows recognition of layout structures (e.g., colum...
A method and system for creating security policies (1 12) for firewall (122) and connection policies in an integrated manner is provided The security system provides a user interface through which a user can define a security rule that specifies both a firewall policy and a connection policy After the security rule ...
In auctioning advertising opportunities presented over a network, dual pricing reduces effects of fraudulent behavior causing showing or selection of a bidder's ads. In addition to a per selection bid or per showing bid presented by a bidder, a constructive bid opposite that offered by the bidder is derived from the...
Systems and methods are disclosed that facilitate normalizing and beautifying digitally generated handwriting, such as can be generated on a tablet PC or via scanning a handwritten document. A classifier can identify extrema in the digital handwriting and label such extrema according to predefined categories (e.g., ...
A plurality of digital licenses correspond to a piece wcontefit, including'a bas§ license and at least one add-on license. Each add-on license includes a reference to the base license, and each of the base license and each add-on license sets forth rules specifying how the content may be employed. Each add-on licens...
Methods and systems for associating two objects in a drawing application with one another are provided. Embodiments of the invention are directed toward a method in a computing environment that includes receiving a command to designate a target and designating the target. The method can further include identifying a...
A set of embodied Application Program Interface(s) (112) are provided for facilitating a method of presenting a presented user-interface shell (UIS) (114) that cooperates with a servicing user-interface shell (UIS) (116). The method includes receiving data indicative of one or more tasks to be completed, coordinatin...
Methods for mapping color data having at least one color associated therewith to an output device based on an input device profile and an output device profile, each profile having a tone curve and a color matrix, are provided. In one embodiment, the method includes receiving color data from an input device and dete...
A method for annotating shared contacts within a social network with public tags, notes or other data. This allows users of a social network to gain useful information at a glance about others' contacts within that network, as well as providing a means for filtering contacts within that network by user-defined keywo...
Protecting elementary stream media content is described. In one aspect, data segments within elementary stream media content are identified. Each data segment includes a single video or audio frame. Encryption boundaries for protecting the payload packets are selected to correspond to data segment boundaries. The el...
ABSTRACT
DYNAMICALLY CONFIGURING. ALLOCATING. AND DEPLOYING COMPUTING SYSTEMS
Computing systems can be dynamically configured, allocated, and deployed based on user requirements. For example, a user can request a number of servers lor dynamic conliguration, aiiocation. and deployment. Embodiments provide a quick a...
A robot (12) having a spindle (18) is calibrated by disposing a calibration tool (50) in the robot spindle (18). The position of the calibration tool (50) is measured. An axis of the spindle (18) is determined based on the measured position. A calibration tool center point is determined based on the measured positio...
ABSTRACT OF THE DISCLOSURE
TECHNlOUES FOR MANAGING VISUAL COMPOSITIONS FOR A MULTIMEDIA CONFERENCE CALL
Techniques for managing visual compositions for a multimedia conference call arc described. An apparatus may comprise a processor to allocate a display object bit rate for multiple display objects where a total ...
ABSTRACT OF THE DISCLOSURE CLIENT CONTROLLED DYNAMIC CALL FORWARDlNG
A clicnt-side signaling mechanism that allows a client to control how a telephone call is handled on a call server. The client user can create call routing rules on the client device using a clicni control component that manages session protocol m...
A dataset is divided into pieces and stored at multiple locations and the system dynamically increases or decreases the number of storage locations where the pieces of the data set may be stored. A data structure comprises a first data field including a first index and a first element, and one or more data fields ea...
Distributed caching and download of file. A method is described that includes building a peer list comprising a listing of potential peer servers from among one or more networked computers. The peer list includes no more than a predetermined number of potential peer servers. Potential peer servers in the peer list a...
An indexing value may be determined, transparently with respect to a requester, based on a desired plaintext item of data and a cryptographic key. The indexing value may be used to access an entry in an indexing structure to obtain a corresponding database entry which includes a non-deterministically encrypted ciphe...
The claimed subject matter provides a system and/or method that facilitates synchronizing data within a data storage system. An interface component can leverage a synchronization technique within the data storage system. A sync component can provide a secure peer to peer data synchronization based at least in part u...
A digital license is migrated from a source platform to a target platform. At the source platform, a migration image is produced to include the license and corresponding data therein, and the license is deleted from such source platform. At the target platform, permission is requested from a centralized migration se...
A snapshot of electronic data is generated to provide information about a file at a specific point in time. The snapshot may be shared between several users. The snapshot is generated based on the type of snapshot that is requested. The snapshot types include a static snapshot, a published item snapshot and an inter...
The described implementations relate to establishing authenticated communication between a client computing device and a service provider. In one implementation, once a registration procedure is complete, multiple authentication servers are used by a client computing device and a service provider to facilitate the e...
A computer or other electronic device uses a cryptographic capabllity and hardware identifier to verify a provisioning packet for changing the mode of operation of the device or a licensed component. A secure memory stores the provisioning packet for future reference. A sequence number may be used to limit replay at...
A pay-per-use or metered-use computer uses directives from an operating system or other software component to determine whether to meter or not. Because such directives may not be trustworthy, a metering system may determine a state of the computer to verify that the metering state complies with a policy. If the met...
ABSTRACT EFFICIENT NAVIGATION OF SEARCH RESULTS
Systems, methods, and computer-readable media for navigating search results are provided. In response to receiving a search query, at least one individual search result is presented in an overlay window, the overlay window being configured to overlay at least a portio...
A remote access system connects a server computer with one or more client computers, where devices are connected locally at the client computers. The devices are recognized by the client computers and a device driver is provided for each connected and recognized device. A virtual driver is created at the server comp...
A graphical user interface for creating a data summary table includes a pane including a plurality of fields, and a data summary table. Upon selection of a field to include in the data summary table, the user interface is programmed to analyze the field and automatically place the field in the data summary table.
...
One or more data stores are maintained separately from a primary presentation storage within a document for storing, relating and for allowing use of arbitrary data that is associated with a computer-generated document between multiple data consumers. The data store exposes application programming interfaces (APIs) ...
For standalone spreadsheet applications and/or Web-based spreadsheet services, the ability to designate, discover and set parameters for spreadsheet documents is provided. When creating a spreadsheet document, the ability to designate certain cells or ranges of cells as parameters to a spreadsheet is enabled. Furthe...
A live preview of objects in a folder or other container, including sub-folders, is requiring the user to open the folder or other container. When a user is previewing a set of objects in a closed container, any containers represented in the view may themselves concurrently show to the user a live preview of their c...
A programmability mode for interacting with data stores within a document allows real time interaction. Data for structuring information associated with a document, such as document metadata, is maintained in the data store where relationships between different pieces of data are maintained in a location distinct fr...
A script markup language provides a declarative mechanism for defining script-based interactive behavior and application logic associated with a document. The script markup defining the interactive behavior and application logic is presented as an independent portion of the markup for the document, separated from an...
Methods, apparatus, and computer-readable media including computer-readable components for the localization of data included in software programs are described. The computer-readable components comprise data elements defined by a software data schema; a property repository data element for storing a plurality of dat...
The invention describes a method for displaying preview information to a user for either a website the user is currently browsing or for a website that the user may consider visiting. The invention can be configured to display a web link to a user and to detect a trigger event. Additionally the invention can be conf...
To use market clearing methods to determine market equilibrium, a market clearing situation is established by determining a number of items to be sold at the market price and allotting a number of pseudo items assignable to bids below the market price. Once bids are received for the items, using the number of pseudo...
Described is a technology by which network connectivity information may be communicated via a single notifications area (e.g., system tray) icon, including by representing different images of the icon to display different types / states of connectivity and different types of media connections. For example, the icon ...
A chart is presented in a host application The chart is managed by communicating data corresponding to the chart to a separate application and providing functionality for editing the data in the separate application. The presentation of the data in the separate application is distinct from the presentation of the ch...
Described is a technology by which network connections are unified into a single user interface for user interaction with those networks. Upon receiving information identifying available networks that correspond to different types of media, a user interface component aggregates the available network connections and ...
One embodiment of the invention uses templates that define certain features of a given service type, wherein the features are common to all services of that service type. The template can be configured by a user to obtain a service definition for the given service. The service definition is passed to a programmabili...
Sharing media content between entities. A Computing device detects and connects to another Computing device within a predefined proximity. Media content items and associated metadata are selected and exchanged between the connected Computing devices. A subsequent purchase opportunity is provided to the users to purc...
ABSTRACT
ELECTRONIC CATALOG
An electronic catalog may have one or more associated attributes describing one or more features of included items. A processing device may display a group of nodes, each of which may represent a different attribute with respect to the included items. A user may select one of the nodes ...
Flash memory is managed utilizing memory management data structures residing in volatile memory of a flash memory device. The memory management data structure restart created and updated each time power is supplied to the memory device. During write operations to the flash memory, specific locations in the flash mem...
Various embodiments provide integrated solutions for detecting and treating undesirable activities. Detection and treatment solutions are interogative with software entities, such as applications, DLLs and the like, and provide status notifications for the user as to the status of the detection and treatment activit...
Described is a fast boot mechanism that generally operates by persisting static data and/or code for a system component, and then providing the system component with access to the static data and/or code during a subsequent device boot. For example, the static data and/or code of one or more components may be restor...
A synchronization method is arranged to permit synchronization between a productivity suite application and a line of business (LOB) application such as a Customer Relation Management or CRM application. Requests are sent from the productivity suite application to the LOB application via a web service call to update...
Hash function constructions from expander graphs are described. In one aspect, an expander graph is walked to compute a hash function. The expander graph is walked using respective subsets of an input message. A label of a last vertex walked is an output of the hash function.
ABSTRACT HEALTH INTEGRATION PLATFORM API
An application program interface (API) is provided for requesting, storing, and otherwise accessing data within a health integration network. The API facilitates secure and seamless access to the centrally-stored data by offering authentication/authorization, as well as the ...
ABSTRACT SHAEUNG TELEVISION CLIPS
Methods, software and apparatus are described which enable users to share and exchange clips from broadcast media using their mobile devices. Whilst watching broadcast media, a user can cause their mobile device to capture a clip, for example by pressing a button. The capture of th...
ABSTRACT USER INTERACTION-BIASED ADVERTISING
On-line and/or off-Une advertisement interactions are tracked for individual users. This information can then be utilized to adjust display parameters for an advertisement. Tracking can be accomplished via a client-side tracking mechanism and/or a server side tracking me...
A server adapted to provide client functionality may include an offsite centralized data center and a local client functionality component that may be stored in the offsite centralized data center. The offsite centralized data center may remotely host the local client functionality component such that information st...
ABSTRACT
FORMATTED MESSAGE PROCESSING UTILIZING A MESSAGE MAP
A MIME or XML formatted message is stored and a map is processed in place of a message. The map is a compact representation of the message. The map is indicative of the content and structure of the message. The map comprises tags that map to and are ind...
Architecture for exposing a virtual private network of peer devices into the public domain via an overlay network. Computing devices, peripheral devices, as well as mobile devices can be physically distributed, but appear to belong to the same virtual private (or home) network, and be accessible from anywhere. Benef...
ABSTRACT EXTENDING FLASH DRIVE LIFESPAN
In a computer-implemented method for filtering input/output operations of a flash drive, an input/output request directed toward a flash drive is received. It is determined whether the input/output request is associated with a high volume write operation. If the input/output ...
A sync community may include a group of synchronization endpoints. When two synchronization endpoints of the sync community synchronize with one another, a synchronization data conflict may be detected when the two synchronization endpoints make a change to a same particular data item and the two synchronization end...
ABSTRACT
CONDITIONAL POLICIES IN SOFTWARE LICENSES
A software license includes conditional policies that define usage rights for software. A conditional policy contains a condition. If the condition is met, software is authorized for use in accordance with the conditional policy. Conditional policies can authorize...
This document describes tools capable of receiving reputation metadata effective to enable better decision making about whether or not to authorize operations. The tools may build a reputation value from this reputation metadata and, based on this value and an authorization rule, better decide whether or not to auth...
A general-purpose proxy mobile device management architecture. The architecture
serves as a proxy for a mobile client seeking services from backend systems. A virtual
client image of state information associated with the mobile client is stored such that when
the mobile client interacts with the proxy, the virtu...
It is required to provide a framework for an automated process for forming a visually appealing collage from a plurality of input images. It is required to provide a framework for this type of automated process which is flexible and robust and which can easily be interfaced to a related software application. An imag...
A method and protocol for communication between a first computer and a second computer is disclosed, along with a system providing a networked application in a client-server environment. A protocol includes a request from the first computer to the second computer including a function identifier for a function on the...
ABSTRACT
INTERACTIVE MARKETPLACE INFRASTRUCTURE
Online marketplace experiences are substantially enhanced by employing marketplace infrastructures. A marketplace infrastructure can provide structured features desired by most customers without requiring a user to be redirected from the marketplace. Marketplace infr...
ABSTRACT AUTOMATIC VULNERABILITY DETECTION AND RESPONSE
Various embodiments detect security vulnerabilities and, responsively, can modify an affected program so that even if an exploit runs, the program"s integrity can be maintained. In at least some embodiments, a local automatic vulnerability detection and respon...
The subject disclosure pertains to systems and methods for training machine learning systems. Many cost functions are not smooth or differentiable and cannot easily be used during training of a machine learning system. The machine learning system can include a set of estimated gradients based at least in part upon t...
A digital media system uses client buffer fullness reports to detect
clock drift between a clock on a host/source device that delivers streaming media content and a clock on a client playback device that receives the streaming media content. The system provides a reduction in playback interruptions during playback ...
A system for controlling a shared display, comprising: a general purpose computing device; and a computer program comprising program modules executable by the computing device, comprising,
a plurality of input modules each providing a different communication modality, and which collectively input information from m...
A transactional memory programming interface allows a thread to directly and safely access one or more shared memory locations within a transaction while maintaining control structures to manage memory accesses to those same locations by one or more other concurrent threads. Each memory location accessed by the thre...
Systems and methods are described for shielding a vulnerability in an application through disablement of one or more features. In an implementation, a method includes identifying a vulnerability in at least one of a plurality of features for an application module. A communication is formed for receipt by a p...
Systems and methods for managing multiple keys for file encryption and decryption may provide an encrypted list of previously used keys. The list itself may be encrypted using a current key. To decrypt files that are encrypted in one or more of the previous keys, the list can be decrypted, and the appropriate prev...
A network troubleshooting framework is described. In an implementation, a method includes detecting a discrepancy in operation of a network by supplying data that describes the network to a network simulation so that the network simulation provides an estimation of network performance. A determination is made as to ...
Peer to peer distribution is provided by a digital media clearing house platform, where content is transferred from one peer (provider) to another (recipient) in return for a payment. When the recipient pays, a portion of the payment of the payment is passed to the owner of the rights in the content, according to an...
ABSTRACT
A system and method for providing a power state alter signal to a device based upon a position signal corresponding to the mobile device is disclosed. The technology initially accesses a position based rule. The position based rule is then compared to a position signal. A power alerting signal is provided ...
A tool pane is included in a markup language document, such as a web page, that allows web page and web parts included in the web page to be modified. The tool pane allows a user to select among various modes for the tool pane including a gallery mode, a properties mode, and a customization mode. During the gallery ...
1. A system that facilitates data handling, comprising:
a component that receives data; and
a data manager that determines an intent of the data, reformulates at least a subset of the data based on the intent, and automatically presents the reformulated data to a user.
A data organization system comprises an interface component that receives input that relates to properties associated with a first item type. A set generator component filters a collection of items of the first item type as a function of select properties associated with the input and creates and stores a first filt...
A method is developed which includes 1)defining a switching state space model for a contnuous valued hidden production-related parameter and the observed speech acoustics, and 2) approximating a posterior probability that provides the likelihood of a sequence of the hidden production-related parameters and a sequenc...
Printing systems and methods are described in which the priorities of print jobs are programmable. A scheduler component oversees print job management and scheduling, and works in concert with components called prioritizers, to provide for ease of programming and customization. In at least some embodiments, an ...
A method for deleting threads from a discussion group comprising a plurality of posts, comprising:
receiving a rating from each of the users whether the post was useful;
determining whether at least one user has rated at least one post within the threae as useful;
if at least one user has rated...
A tag-based structure for communicating software update metadata information to client computers and to update service nodes is presented. An update metadata file includes: an identifier tag including a software update identifier that uniquely identifies the software update; zero or more general properties tags that...
A user interface system and method of lists of information using a squeezed / semi-collapsed states of the group that shows, for example, a portion of the group (e.g., only the first few items of the group) is provided. The squeezed / semi-collapsed state takes up less room on the screen than an open state but gives...
A method and computer-readable medium are provided for generating usage rights lor an item based upon rights to access the item. According to the method, a request is received at a document management system for an item stored in a library. In response to the request, access rights to the item for the requ...
Documents are indexed in accordance with a process that separates the filtering and word breaking portions of the process so that they are performed under a restricted security setting. When a document is requested by an indexer, the document is retrieved and then passed to the higher security process. The docu...
One or more functions are exposed by a mobile device to a host connected to the mobile device. A function of the one or more functions is executed at the mobile device in response to a request from the host, wherein the function is associated with a host task. The result of the function is returned to the host.
...
A method and computer-readable medium are provided for formula-based document retention. According to the method, a retention formula and a retention action are defined for one or more items. The retention formula is utilized to calculate a retention date for each item. The retention action specifies the acti...
A voice-activated user interface for an application is described. The voice activated user interface invokes a speech recognition component to recognize audio input from a user. If the audio input is a command, then a validation component is invoked to determine whether to validate the command prior to execution.
...
A method for determining an inverse response function of a camera, the method comprising:
finding a first pixel in an output image of the camera in which the first pixel images a first region having a first color and a second region having a second color, the first pixel representing a blended color derived from th...
A method of processing a Session Initiation Protocol (SIP)message, the method comprising:
(a) receiving a SIP request at a SIP node, the SIP request including a message header;
(b) generating a signature based upon at least a portion of the message header;
(c) generating a SIP node header entry; and
(d) insertin...
A file locker manages the storage and use of protected data for software objects. A protected environment maintains the cryptographic and isolative infrastructure to support sealing of data items for use by a trusted agent. The file locker uses the protected environment's sealing functionality to seal data items for...
A system for cryptographically secure person identification, the system comprising, an identification issuer to produce one or more person identification documents (IDs) for a person, the ID comprising first and second representations of person-distinguishing data which distinguishes persons, the first representatio...
Described is a system and method in which client-side tracing mechanisms allow a computing device to efficiently decide which message need to be downloaded from a server for subsequent filtering evaluation, and request only those messages. For example, the present invention may be used to limit a download of POP3 em...
A computer-implemented method is disclosed for reducing coding errors prior to runtime in the context of a managed code execution environment. The method includes providing a developer with access to a plurality of managed code resources. The method also includes verifying that a resource identifier input by the dev...
A method and apparatus are provided for segmenting works into into component parts. Under the invention, mutual information scores for pairs of graphoneme units found in a set of words are determined. Each graphoneme unit includes at least one letter. The graphoneme unit includes at least one letter. The graphoneme ...
The present invention is provides a system and method for managing connectivity objects and their associated parameters for a mobile device. The connectivity parameters are stored in a tree structure. For example, a proxy may be a node in the tree with its connectivity parameters listed as leafs. Similarly, a networ...
A method for persisting virtual private network structures across multiple network addresses assigned to a mobile node, the method comprising;
Setting up a virtual private network tunnel between a virtual private network tunnel server and the mobile node, wherein virtual private network structures supporting the v...
A password locked computing device may be unlocked by coupling the locked device to a password unlocked computing device that is associated with the same user as the locked device. If the devices recognize each other as being associated with the same user, the locked computing device is automatically pass...
The present invention is used to adapt acoustic models, quantized in subspaces, using adaptation training data (such as speaker-dependent training data). The acoustic model is compressed into multi-dimensional subspaces. A codebook is generated for each subspace. An adaptation transform is estimated, and it is appli...
Systems and/or methods ("tools") are described that enable a digital rights management policy to be associated with digital media having an arbitrary content type or transfer control protocol. In some embodiments, the tools encrypt dam segments of a media file and add a descriptor to each of those segments. These de...
A system and method for generating aggregated content views in a computing network are provided. A host computing device obtains a request for an aggregated view of content corresponding to a set of criteria. The host computing device queries itself and each computing device in a defined network for locally stored c...
Methods and systems for handing off a wireless client between access points wherein the scanning for access points in decoupled from the handing off, thus reducing the delay in the handing off.
A method and system for identifying the importance of information areas of a display page. An importance system identifies information areas or blocks of a web page. A block of web page represents an area of the web page that appears to relate to a similar topic. The importance system provides the characteristics or...
A method and system for determining relatedness of images of pages based on link and page layout analysis. A link analysis system determines relatedness between images by first identifying blocks within pages, and then analyzing the importance of the blocks to web pages, web pages to blocks, and images to blocks. Ba...
The present disclosure relates to displaying full scale images with overlaid similar scaled images and a graphical user device in a display of a client device. The client device receives video streams of the full scale images and scaled images. The video streams are broadcast independent of one another, and a user o...
Described is an architecture by which application programs can provide data to auxiliary display devices of essentially any type for display to a user. A defined application layer (e.g., accessed via interfaces) allows programs to provide data to a service that controls the output of data to an auxiliary display dev...
.x parts are schematized data wrappers that provide a means by which a suit of office applications can share data amongst themselves and other application as well. Data from an arbitrary resource is selected and is associated with a schema. A schema is used to define the data type of the data, which facilitates repr...
A method, comprising;synchronously gathering region data for displaying a region of a server desktop remotely on a client display, wherein the region data describe a shape and a position of the region;synchronously gathering graphics data for the region, wherein the graphics data describe visual content of the regio...
A method and system for classifying display pages based on automatically generated summaries of display pages. A web page classification system uses a web page summarization system to generate summaries of web page. The summary of a web page may include the sentences of the web page that are most closely related to ...
A wireless cassette adapter in the form of an audio cassette that can be
inserted into an audio cassette player provides an audio interface for wireless mobile devices to existing audio systems. A wireless interface is established by the wireless cassette adapter to one or more wireless mobile devices and receives ...
Systems and methods for enumerating applications by a remote client computer are described. The applications are deployed in an Intranet. The remote client computer is external to the Intranet. In one aspect, a remote application discovery request is sent to a Web service. The Web service is deployed on a remote app...
A method and protocol to create and control compositions on a remote device is disclosed. The protocol allows servers and other devices to take advantage of processing capabilities of remote devices to render compositions on the remote devices, thereby increasing server scalability and leveraging the remote device p...
The present invention is a system for and method of initializing multiple virtual processors in a virtual machine (VM) environment. The method of initializing multiple virtual processors includes the steps of the host creating a multiple processor VM and activating a "starter virtual processor," the "starter virtual...
An identity system and method that stores identity information related to different principals and stores the identities on different or disparate systems such that the different systems can use the identities. A synchronization process synchronizes identity information and rules based on identity information betwee...
To reduce the power consumption of a wireless communication hardware device, power conservation scheduling algorithms can be implemented. Reoccurring events, including DTIM intervals and listen intervals can be scheduled as awake times. Similarly expected response intervals can be scheduled as awake times based on i...
Several embodiments of the present invention provide means for collecting license revenue for operating system or applications software that resides in a virtualized computer system. Certain of these embodiments are specifically directed to providing a means for collecting license revenue for modem or legacy operati...
A method and apparatus are provided for providing custom product support for a computer program based levels of execution instability. The execution of a software program is monitored over a period of time to determine the execution stability of the program. Based upon the monitoring and upon one or more threshold l...
Mechanisms for providing requested date items in a request-driven enumeration session while retaining to control over how much inter-message context information is retained by the data provider. Upon receiving request for the data items, the data provider identifies a portion of the data items to be provided in the ...
Keep-alive processing for NAT devices and reducing power consumption in wireless clients. A server driven keep-alive mechanism facilitates keep-alive messages to a NAT device currently providing a connection to a mobile client to refresh the NAT state, thereby reducing or eliminating power consumption in a wireless ...
Systems, methods, and computer-readable media for identifying executable scenario solutions relevant to a user query and returning such executable scenario solutions as search results in response to the user query are provided. Upon receiving a user query, a plurality of results is returned, each result being repres...
Private sheets are disclosed, in shared computer applications, such as spreadsheets. In one aspect, a public sheet is accessible to a first client and a second client; and, moreover, a private sheet is accessible only to the second client. The private sheet is configured to access content in the public sheet, but th...
Methods for using scenario solution-related information to generate customized user experiences are provided. Upon receiving a query, results are returned, each result being representative of a scenario solution which may be utilized to address a particular issue relevant to the query. At the time of authoring, each...
A system and method for enabling routing of data on a network based on a portion of data accessed from a non-network enabled device is disclosed. The technology includes a method for enabling routing of data on a network based on a portion of data accessed from a non-network enabled device. The method includes detec...
A mechanism for protected operating system boot that prevents rogue components from being located with the operating system, and thus prevents divulgence of the system key under inappropriate circumstances. After a portion of the machine startup procedure has occurred, the operating system loader is validated, and a...
A method, system and apparatus are provided for enabling a spreadsheet to be viewed and modified with the context of a Web browser application program. According to a method, a request is received to view a spreadsheet document in the web browser application program. In response to the request, a representation of t...
A method, system, and apparatus are provided for exposing and utilizing workboods as server data sources. The system includes a client computer capable of executing a spreadsheet application program for creating a workbook including one or more worksheets. The workbook may be published to a server computer where the...
A list control allows for a harmonized display of heterogeneous list element data by using at least two templates. The templates define the layout for the list element data. The templates consult an interface while calculating the layout. The interface provides information regarding the location of at least one grid...
A facility for enabling the use of user-defined function in a spreadsheet document made up of cells is described. The facility receives a trigger to evaluate cells that include a distinguished cell. In response to receiving the trigger, the facility determines that the distinguished cell contains an invocation of a ...
A searchable index is created using a query process and an indexing process. The query process cooperates with the indexing process to catalogue items that are located within a specified search scope. Previously indexed items are evaluated to ensure that their indexes are up-to-date. Items that are out-of-date have ...
Mechanisms for directing advertising in search result presentation and/or scenario solution execution based upon a user"s locality are provided. Locality refers to a collection of metadata created based upon scenario solutions executed by a user and/or enablers acquired by a user during scenario solution execution. ...
A user creates an application assistant by recording a series of steps to complete a specific task involving one or more computer applications. Additional steps that may not involve the use of a computer application may be included. For each step, annotations may be created. The series of steps and annotations are s...
Method and systems are provided for managing automated project management scheduling based on user input of contractual project milestone start and/or finish data. A project scheduling engine may be managed by provision of contractual start/finish data. The scheduling engine may restart a project management schedule...
A wide-area network ("WAN")-based service enables remote data access transactions between participating endpoints within a group of participating endpoints that includes at least one server and at least one portable electronic device. Each participating endpoint is configured for communnication via one or more commu...
A processing device may automatically provide protective services and may provide backup services for backing up and restoring user files, system files, configuration files, as well as other information. The processing device may be configured to check one or more performance conditions and perform an action to impr...
A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is provided to the requester. Proper solution of the puzzle requires human participation. The puzzle is chosen such that its solution is within the capabilities o...
Various embodiments of the present invention are directed to a database with an extensible type system for at least one user-defined type that comprises information for describing its structure as well as information for describing an inheritance relationship between itself and another user-defined type (either a su...
The present invention relates generally to database and file system management and, more particularly, to automatic database and file system maintenance and repair to ensure data reliability. Various aspects of the present invention relate to responding and correcting data corruptions at a data page level (482) for ...
The present invention provides a unique system and method that facilitates incrementally updating spam filters in near real time or real time. Incremental updates can be generated in part by difference learning. Difference learning involves training a new spam filter based on new data and then looking for the differ...
Described is a system and method in which software images including updates are provided as packages. The package is self-describing, thereby facilitating the replacement of only component parts of an image. A software build process maps operating system features (comprising files, metadata, configuration informatio...
A method and system are provided for ranking search results based on user preferences. The method includes monitoring user selections in response to user receipt of search results and tracking metadata related to user selections for user selections that exhibit a threshold satisfaction level. The method additionally...
Mechanisms for organizing scenario solution-related information based upon a user"s locality are provided. Locality refers to a collection of metadata created based upon scenario solutions executed by a user and/or enablers acquired by a user during scenario solution execution. Such metadata may be stored in associa...
At least one implemenatation, described herein, detects fuzzy duplicates and eliminates such duplicates. Fuzzy duplicates are multiple, seemingly distinct tuples (i.e. records) in a database that represent the same real-world entity or phenomenon.
Various embodiments of the present invention are direct to the utilization of Blob Handles (BHs) (item 300) which are an internal representation of a large value. BHs are immutable and stateless.references to a large data object. The structure of a BH (item 300) contains enough information to return an ILockBytes in...
Traditional audio encoders may conserve coding bit-rate by encoding fewer than all spectral coefficients, which can produce a blurry low-pass sound in the reconstruction. An audio encoder using wide-sense perceptual similarity improves the quality by encoding a perceptually similar version of the omitted spectral co...
A system and methods are described for transcoding media content in
the background on a source computer device prior to such time as a target media playback device is connected to the source computer for synchronization of the media content. The system and methods anticipate which media content to background-transc...
X-y positions of a digital pen"s tip may be determined by using a calibration parameter to map the x-y positions of the respective centers of images captured by the pen"s camera. The calibration parameter may be generated by iteratively clculating estimates of the calibration parameter. Calibration input data may be...
Disclosed embodiments of the invention relates to analyzing document images, which contain positionally encoded information, such as a maze-pattern watermark, and labeling the images based on a degree to which the document"s content, such as text, occludes the position-encoding information. Depending on the degree o...
Systems and methods for dispersing search engine results by category. A search engine application queries a searchable index of document data associated with a plurality of electronic documents in response to a search request to identify one or more electronic documents having document data matching data included in...
Content recordation techniques are described. In an implementation, a method includes querying electronic program guide (EPG) data to determine if a content item described in a recording document is available for recording. If the content item is available, a reference is added to a recording list for causing record...
A method of metering bandwidth allocation on a server using credits is disclosed. The method may receive a request for data from a client, respond to the request for data and determining if the request for data for the client exceeds a current data allocation credit limit for the client. Using the round trip time, t...
A computer-readable portable media device is used for transferring network settings for an ad hoc wireless network to simply the task of configuring devices for the ad hoc wireless network. A configuration program on an initiating compurer assists a user in creating the network settings, including a security key, an...
A query for a help system includes data about a user system and a task that the user is attempting. The query may be used by a search engine to generate relevant results to aid the user. The user system data may include configuration data about hardware and software. The task data may be derived from the current sta...
A parallel processing method and apparatus for initializing libraries is disclosed. Libraries for an application are identified, an initialization order for the libraries is determined, and the libraries are initialized in asynchronous stages. The initialization order is determined by forming a library tree of the l...
In a multi-tenant data sharing environment with shared, customizable data attributes are assigned to requested data and stored in a cache store along with the requested data. For non-customized data designated as system data, one copy is stored in the cache store for use by multiple tenants allowing optimization of ...
Systems and methods are provided for representing multiple tasks and their associated properties, including the time and nature of a deadline and preferences about the granularity of time for focussing on the task. This includes providing several services, including atuomated scheduling of project focus meetings wit...
A method and system are provided for facilitating editing of a captured photograph using a set of user interface photo interaction tools. The method includes receiving a user selection of an editing function, which may be a cropping function, through the user interface photo interaction tools. The method additionall...
constitution setting file is generated by using an extensible markup language (XML) schema. A wireless constitution XML schema defines a XML file for constituting wireless network setting on a wireless device. A wide area network (WAN) constitution schema defines the XML file for constituting a WAN device. A local a...
The present invention involves a system and method that facilitate a purchasing experience in part by consolidating any number of purchases and their respective charge amounts until the purchases or charge amounts reach a threshold level. The threshold level can be based in part on resources used (consumed or purcha...
Systems and methods for differential updates in a data broadcasting environment are disclosed A data broadcasting system receives profile information representative of information desired by subscribers to the data broadcasting system Broadcast content may be adjusted m response to changes in the aggregate status of...
A binary is received at a binary verification service from a binary verification client agent. The binary verification service performs binary verification of the binary, wherein binary verification includes determining whether the binary is complicit with a set of usage rules. The binary verification service sends ...
A data encryption key may be generated for encrypting data content. The data encryption key includes multiple portions. For example, the data encryption key may be generated by combining a drive seed and a media seed where the drive seed includes a value that is unique to the drive reading data content or a group of...
Various technologies and techniques are disclosed that support buffered writes and enforced serialization order in a software transactional memory system. A buffered write process is provided that performs writes to shadow copies of objects and writes content back to the objects after validating a respective transac...
The described systems, methods, and data structures are directed at automatic configuration of transaction-based performance models. Models of an infrastructure are created and automatically configured using data provided by existing management tools that are designed to monitor the infrastructure. These automatical...
A system and method for improving digital flash photographs. The present invention is a technique that significantly improves low-light imaging by giving the end-user all the advantages of flash photography without producing the jarring look. The invention uses an image pair - one taken with flash the other without ...
A system and related techniques generate an interrogation request from an initiator device, such as a client desktop machine or other machine, to a mobile or other media player, such as a digital camera, MP3 player, video camera or other device or hardware to enumerate the media content contained in that device, alo...
A system and method for determining differences and other conditions on a multi-monitor system is provided. A first line is displayed across two monitors. A user aligns one segment of the line on one monitor with the other segment. A second line is displayed across the monitors, parallel to the first. The user then ...
Partially materialized views in the field of database systems are described herein. A method of partially materializing a view computed from one or more source tables comprises generating a view definition including a query expression and at least one control predicate referencing at least one control table. The que...
An improved user interface is provided for displaying selectable functionality controls that identifies the context of the object to which the user interface is relevant, which contains rich functionality controls for applying contextually relevant functionality to a selected object, and which may be efficiently swi...
A protocol and related techniques and platforms allow vendors to selectably extend the Media Transport Protocol (MTP), or other defined protocols to implement vendor-specific commands, data fields, instructions and other extension sets. According to embodiments of the invention in one regard, one or more extension s...
An improved user interface is provided for displaying selectable software functionality controls that are relevant to a selected object and that remain visibly available for use while the selected object is being edited. Upon selection of a particular object for editing, functionality available for editing the objec...
The present invention uses instant messaging to effectuate structured communication. A structured communication component is used in conjunction with an instant messaging component to allow an instant messaging user to quickly formulate a structured communication for transmission to one or more recipients. The recip...
An improved remote protocol enables efficient and reliable updating of files on a remote server. A gather-copy extension to a remote protocol enables a client to instruct a server to gather portions of data from an existing source file on the server and to copy those portions of data to appropriate offsets within a ...
The invention is relates the system for cross-application geo-coding, comprising:
a component for authoring mutual hyperlinking and method for cross-application geo-coding, comprising:
receiving a mutual hyperlink; and inserting geo-coding information in the mutual hyerlink.
A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any reques...
An interactive ticker is described. In embodiment(s), an interactive ticker can be displayed to include selectable ticker data that can be selected by a viewer. The interactive ticker can be displayed over and/or with television media content that is also being displayed for viewing. In addition, a control input can...
Providing content listings for digital television broadcasts. A computing device matches digital broadcast television channel data (e.g., call signs or broadcast frequencies) with analog broadcast television channel data to create a list of mapped channels. The computing device creates a program guide for the digita...
Various embodiments provide accurate EPG lineup construction and PVR scheduling for users, regardless of their geographic location. In accordance with the described embodiments, the guide retrieves and aggregates data from multiple available sources, particularly in-band scanning and EPG metadata download. Services ...
An advertising management service allows an advertiser to create an advertisement and associate keywords with the advertisement. The advertising management service submits the advertisement to multiple search engine advertising networks on behalf of the advertiser. Periodically, the advertising management service re...
The subject invention provides a system and/or method that facilitates executing a Radio Frequency Identification (RFID) process by employing a reader application markup language (RAML) schema that provides a portable format to setup and deploy such RFID process. A schema component can receive RFID data relating to ...
The present invention leverages query-related information based on a query and/or a search intention to provide a systematic means to facilitate a user in locating desired information despite lacking exact search parameters. This allows users to find information without first formulating an optimum search query. The...
An extensible control design framework is utilized to declaratively define a control (both visual and non-visual) and other components. The functionality of a control may be expanded by declaratively adding behaviors and semantics via an object called an action. The control does not become unduly complex by the addi...
Methods and systems for applying visual effects to active content, such as buttons, comboboxes, video, edit fields, etc., wherein interactivity of the active content are retained thereafter. Also, the present disclosure provides a mechanism for developers to build new visual effects and have them applied to active c...
A remote control apparatus for a light vehicle wherein a reception unit (227) for receiving a signal from a normal portable transmitter (226) carried by a vehicle user is disposed on a light vehicle in which an accommodating box (30) is disposed below a riding seat (31) mounted for opening and closing movement and, ...
Systems and/or methods that enable secure deployment and/or receipt of an operating system and updates for the operating system to a bare computer across a network susceptible to malicious communication are described. These systems and/or methods can, in one embodiment, securely deploy an image having an operating s...
Virtual machine migration is described. In embodiment(s), a virtual machine can be migrated from one host computer to another utilizing LUN (logical unit number) masking. A LUN of a storage array can be mapped to a virtual drive of the virtual machine. A LUN mask that associates the LUN with a first host computer of...
The present invention extends to methods, systems, and computer program products for dynamically loading scripts. Web pages can include references to script loaders that control the loading of other scripts at a Web browser. A script loader can load scripts in accordance with script loading rules that override the d...
The present invention extends to methods, systems, and computer program products for distributed behavior controlled execution of modeled applications. Embodiments of the invention facilitate the interoperation of a central data store along with various peer-to-peer functionalities. Thus, distributed applications ca...
The present invention utilizes existing encapsulation or encoding mechanisms for embedding user profile information in electronic messages. Such information may then be distributed amid a community of users for which an individual, organization or other entity interact. The present invention takes advantage of hidde...
A system and method for determining whether a flick gesture has occurred is described. A flick gesture is a simple gesture that may be easily detected and is characterized by minimal interference with other applications or gestures.
Technologies are described herein for identifying and correlating e-mail messages. The contents of the subject and recipients fields of e-mail messages received at and sent from a computing system are hashed and stored in a database. When an incoming e-mail message is received at the computing system, the contents o...
ITERATIVELY LOCATING A POSITION CORRESPONDING TO A DESIRED SEEK TIME
Techniques enable locating a position within a file that corresponds to a desired seek time without having access to an index specifying the desired seek time"s position. An iterative process may be used to estimate the position that corresponds t...
A system and method for efficiently determining that a received file is not malware is presented. In operation, when a file is received at a computing device, an evaluation is made as to whether the file includes user-modifiable, or superficial, data areas, i.e., areas of the file that by their nature do not typical...
A processor designed to directly execute machine code that is based on the asynchronous pi-calculus is disclosed Such a processor may be an element of a multi-processor system that aims to provide a scalable, loosely-coupled architecture for executing programs based on the pi-calculus
To avoid extensive time during which servicing of clients" requests is stopped for updating a piece of software or a data structure, various embodiments of the invention update an instance of the piece of software or an instance of the data structure instead of updating the original piece of software or the data str...
Lightweight directory access protocol (LDAP) management is described. In an implementation, a method includes intercepting data, configured according to a lightweight directory access protocol (LDAP), for communication between a client and a server. One or more polices are applied to the data to determine whether pe...
A system and method are provided for implementing a geographic search mode in connection with a search engine. The method may include indexing geographic locations for resources available to the search engine in a search engine index. The method may additionally include determining a target location for a particular...
A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rule...
An extensible framework for object oriented programming comprises a reception component that receives a customized strategy relating to composing a target object. An implementation component automatically implements the customized strategy to compose the target object based at least in part upon context associated w...
A processing device, such as, for example, a tablet PC, or other processing device, may receive non-textual language input. The non-textual language input may be recognized to produce one or more textual characters. The processing device may generate a list including one or more prefixes based on the produced one or...
A peer-to-peer collaboration system in which changes to a shared space may be broadcast to all of the peers in a collaboration session using messages sent with a combination of addressing techniques. Messages may be addressed for direct peer-to-peer transmission, indirect transmission through another peer or indirec...
Techniques to manage facsimile communications are described. An apparatus may comprise a facsimile device having an assigned access number, and a call terminal having the assigned access number and a facsimile control module, the call terminal to establish a call connection in response to a call request with the acc...
Methods and system for authenticating a user ere disclosed The present invention includes accessing a collection of personal information related to the user The present invention also includes performing an authentication operation that is based on uhe collection of pergonal information The authentication operation,...
An on-screen advertising system that employs paginated on-screen pages that adapt based on display and window size and allow for the anchoring and sizing of advertisements based on a given relative paginated page size. Content is reflowed to fit the advertisements
The disclosed speech recognition system enables users to define personalized, context-aware voice commands without extensive software development. Command sets may be defined in a user-friendly language and stored in an extensible Markup Language (XML) file. Each command object within the command set may include one...
A system and method for determining hierarchical information is described. Aspects include using the Collins model for parsing non-textual information into hierarchical content. The system and process assign labels to lines that indicate how the lines relate to one another.
A method and system for caching remote objects locally. A request to access an object is received. A determination is made as to whether the object is cached. If the object is cached and the request is not to create a new object, modify an existing object, or open a directory, the request is directed to a local file...
A content page is configured by a user and located on a network. Changes made to the content page are automatically communicated with notifications to a group of contacts for the user. Only contacts with permission to view the content page, or the changed content, will receive the notification and have permission to...
A system and method are provided for customizing search result descriptions for results returned by a search engine. The search result descriptions may be obtained through a search over a computer network. The system includes a search result description request component for enabling selection of particular data for...
A mechanism for sending structured data using a corresponding byte stream. Upon accessing structured data such as a Simple Object Access Protocol (SOAP) envelope, a byte stream is generated. The byte stream includes bytes that represent the structured data, as well as a collection of bytes that represents properties...
A mechanism for negotiating a relatively transport agnostic communication protocol for use in accomplishing a distributed activity. The potential protocols subject to negotiation may be, for example, extensions to Web Services Coordination. In that case, when the initiator creates a transaction, the initiator also n...
A method, system, and computer-readable medium are provided for applying a global formatting scheme to a chart in an electronic document. According to a system, a chart application program receives a selection of a chart object in the electronic document and a document theme. The document theme includes a combinatio...
A camera lens shuttering mechanism includes an image conducting unit disposed within a shutter housing when the camera is in a closed position so that the camera cannot record images. When moved to an open position, the shutter housing does not block the image conducting unit from imaging objects. The image conducti...
File formats, methods, and computer program products are provided for representing a document in a modular content framework. The modular content framework may include a file format container associated with modular parts. A file format includes logically separate modular parts that are associated with each other by...
A queuing server is used for reliable message transport, where one subsystem desires to execute one or more ordered operations asynchronously. Messages are sent to the queue in groups, which may have one or more messages. Messages within a particular group are processed in a predetermined order. Optionally, groups o...
A method and computer-readable medium are provided for saving the contents of a memory structure stored in a volatile memory. According to the method, corrupted portions of the memory structure are identified and an attempt is made to repair these portions. If the corrupted portions cannot be repaired, the saving of...
A facility for linking data from an external data source to shapes in a diagram is provided. The facility is implemented as a component of a graphical visualization program, and provides a modeless data window that is operable to display data from a data source through a two dimensional table. Users can use the faci...
An automated method is provided for evaluating the validity of links included in a web page. The web page may contain commands, such as dynamic HTML or other embedded commands, which are configured for execution upon the occurrence of an event, such as a provision of input by a user. According to one embodiment, the...
Methods, systems, and engines are presented for synchronizing contents of removable storage devices with a multimedia network. In one implementation, a change in status of a connection between a removable storage device and a multimedia network is detected. A network inventory list of recordings is updated, triggere...
A system and method directed to inline property editing for tree view based editors is provided. A user selects a desired node within a tree view and then hover the mouse cursor over the node causing a smart tag anchor to appear. When the use clicks on the smart tag anchor an object property panel appears injected i...
Systems and methods for validating integrity of an executable file are described. In one aspect, multiple partial image hashes are generated, the combination of which represent a digest of an entire executable file. Subsequent to loading the executable file on a computing device, a request to page a portion of the e...
Described is a system and method for transporting interference-related control data and other information between nodes in a wireless network, using a control channel that is distinct from a content channel used to transport content.The control channel may be a different channel in the same unlicensed band as the co...
Described is an architecture comprising a flexible and extensible framework embodied in a robust coexistence service that couples sensed RF spectrum (interference) data to modules that process the data into dynamic feedback information used to mitigate network communication problems caused by the interference. Via a...
Racing-based computer games typically include a mode in which one or more human players can compete against one or more computer-controlled opponents. For example, a human player may drive a virtual race car against a computer-controlled virtual race car purported to be driven by Mario Andretti or some other race ca...
Exemplary systems, engines, and methods allow a multimedia service subscriber to upload personal media content to a multimedia service. The personal media content is then distributed to selected recipients over a personal media channel that is offered only to the selected recipients.
A designer tool that facilitates design of an object model. The tool takes as input a computer-readable representation of a graph of objects {e.g., classes), and creates automatically one or more diagrams that depict these classes as editable trees showing their relationships and properties. These graphs naturally h...
Various new and non-obvious apparatus and methods for using frame caching to improve packet loss recovery are disclosed. One of the disclosed embodiments is a method for using periodical and synchronized frame caching within an encoder and its corresponding decoder. When the decoder discovers, packet loss, it inform...
A routing and bandwidth allocation system that maximizes network throughput while maintaining global fairness in the sharing of network resources. From gathered global network information, routing tables and bandwidth allocation policies are computed for routers (110- 118). In some embodiments, the computations invo...
An application programming interface (API) for administering the distribution of software updates on an update service node is presented. The API provides a plurality of interface calls through which an administrator can establish rules by which software updates available to the update service node are distributed.
...
Described are sequence numbers for client-server communication, to control a client"s use of server resources. A server grants the client credits, and the client consumes a credit for sending each command to the server. Each credit corresponds to a sequence number, with the set of sequence numbers forming a valid co...
Described is a data communication protocol, in which a client and server negotiate in a manner that does not require the client to retry negotiation when servers are not capable of the client-desired protocol. In one example implementation, the desired protocol is SMB 2.0 or greater. The protocol describes a create ...
Prior to searching a multidimensional feature space populated with data objects, each dimension in the feature space is divided into a number of intervals. When a query is received, a single interval that is overlapped by the query is selected from each dimension. A reduced set of data objects is then selected that ...
A network node selects a "sleep" level based on its current or projected battery capacity. In an embodiment of the invention, sleep levels define the types of communication to which the node in question will be a party and the physical radius within which the wireless network node will engage other devices. The node...
The receiver portion of a UWB wireless device is altered by replacing analog-to-digital circuitry with a simple energy detection circuit. In embodiments of the invention, the coding methodology of a transmitter is altered to support the simplified receiver configuration. For example, instead of coding the data to be...
A screen resolution information gathering and reporting system allows access to screen resolution Information of attendees of a collaboration session. When attendees first join the collaboration session, each attendee"s screen resolution information is gathered. The collected screen resolution information is then pr...
Customizable data diagrams are provided by a data diagram software facility. The facility receives a reference to a multidimensional data set on which to base an initial data diagram. Based, at least in part, on this information, the facility generates a data diagram providing a graphical representation of nodes cor...
A representation of types, type-checker, and compiler are provided for checking consistency in various forms of an iniermediaie language Type-checking a programming language in a compiler is accomplished by taking one or more rule sets as input to a type checker, which selects one or more of the rule sets based upon...
A computer may be secured from attack by including a trusted environment used to verify a known monitor. The monitor may be used to determine a state of the computer for compliance to a set of conditions. The conditions may relate to terms of use, such as credits available for pay-per-use, or that the computer is ru...
Extensible Markup Language (XML) specification for transforming electronic data interchange (EDI) transactions. A collection of EDI data is received in a batch. The batch of EDI data includes a plurality of EDI documents and each of the plurality of EDI documents has at least one EDI transaction corresponding to a t...
Techniques for managing dual-channel wireless devices are described. A dual-channel wireless device may comprise a first transceiver operative to communicate control information over a data channel using a packet-switched network. The dual-channel wireless device may further comprise an enhanced call module communic...
A system for providing a digital identity includes a claims transformer programmed to generate a security token including a computational token and a display token, the computational token including one or more claims associated with an identity of a principal, and the display token including display information abo...
Systems and methods that dynamically reset a workflow state by employing a dynamic state manager that is external to the workflow, and enables interaction of a host with a workflow instance. An event driven workflow or state machine workflow can be supplied, wherein ad hoc events are employed to reset and manipulate...
ABSTRACT
Payroll requirements are compiled from a plurality of jurisdictions. A plurality of payroll codes are cataloged that are required in one of the plurality of jurisdictions. A user representation includes the plurality of payroll codes. An implementation representation of calculating pay is formed. The imple...
ABSTRACT
Multi-dimensional aggregation on event streams for generating reports based on metadata about what events are available. An aggregation definition tool receives the event stream and, responsive to user input, identifies events of interest and specifies a correlation pattern for defining activities from the...
ABSTRACT
Various technologies and techniques are disclosed that improve the operation of accessibility applications. A graphics pipe is provided that can be called in user mode from multiple accessibility programs. A request is received from an accessibility application to access the graphics pipe, and a connection...
A user interface for displaying source data and a translated copy of a segment of the source data is provided. The user interface includes a first display portion for displaying at least a subset of the source data on the display. The user interface includes a second display portion for displaying a translated copy ...
Systems and methods that objectify view of workflows and management behavior via an access component that supplies access to the real workflow instance. The subject innovation enables custom features to be defined for interaction during run time. For example, custom features {e.g., strongly typed workflow) can inclu...
Systems and methods that supply workflow management and workflow interaction with a plurality of persistence stores via employing a routing persistence service and an association lookup component. The routing persistence service routes and/or assigns each workflow instance to a corresponding persistence store, and t...
The subject disclosure pertains to systems and methods that optimize advertisement campaigns In particular; total utility that can be derived by an advertiser given particular keywords is maximized. The price of each keyword/slot pair can be determined or estimated and bids adjusted automatically to maximize adverti...
A network in which peer-to-peer remediation is provided to keep clients in the
network up-to-date. As network clients establish peer-to-peer connections, they exchange status information. The status information allows the clients to mutually identify whether one client is more out-of-date than another. The more up-...
Procedures for identifying clients in an audio event are described. In an example, a media server may order clients providing audio based on the input level. An identifier may be associated with the client for identifying the client providing input within the event. The ordered clients may be included in a list whi...
Visual feedback may be provided. First, a continuous contact with a first point on a surface may be detected. The surface may comprise, for example, a touch screen or a toucn pad. The continuous contact may be caused by a selecting element comprising, for example, a stylus or a digit of a subject. Then a menu may be...
A communications device provides a biometric reader to authenticate users
onto the communications device based on a single biometric input. The communications device maintains a local copy of the strong authentication credentials, such as a user identification and password, and the biometrics which were previously ...
Seed keywords are leveraged to provide expanded keywords that are then associated with relevant advertisers. Instances can also include locating potential advertisers based on the expanded keywords. Inverse lookup techniques are employed to determine which keywords are associated with an advertiser. Filtering can th...
Systems and related methods for discovering network nodes and routable addresses include a scan server, local link segment, an agent coupled to the local link segment, and a router coupled to place the scan server in communication with the agent. The scan server commands the agent to discover a network node coupled ...
TRIGGERLESS INTERACTIVE TELEVISION
Various technologies and techniques are disclosed that relate to providing interactive television by synchronizing content to live and/or recorded television shows. Content is synchronized without the use of in-band triggers. A broadcast stream is received, and search/action pairs...
Proxy service that enables a domain join operation for a client over a non-secure network. The join operation is achieved with minimal security exposure by using machine identity information rather than user credentials. The proxy only uses permission associated with adding a new machine account to the enterprise di...
The claimed subject matter provides systems and/or methods that facilitate describing,
communicating, utilizing, etc. a frame dependency structure in connection with real time
video communication. For example, a protocol can be employed to communicate the
dependency structure from a sender to a receiver. More...
A storage management system using federated repositories directs content to child repositories in a hierarchical structure. A service for managing the storage maintains a list of active and historic repositories and routing of the content for storage is performed based on a file plan that includes the structure of t...
A discovery interface facilitates the selection of available media content. Content-relevant graphical tiles are displayed in strips within the discovery interface. In this manner, a user can survey graphics associated with available content. When the discovery interface section (e.g., a row) is in focus, the graphi...
The claimed subject matter provides a system and/or a method that facilitates managing an incoming data communication in connection with unified communications. A unified communications component can employ unified communications for a data communication with at least the following data communication modes: an email...
Methods and systems for protecting data that is intended for use and processed on video or graphics cards are described. In various embodiments, data that is intended for use by a video card can be encrypted such that aby time the data is provided onto a bus (e.g. a PCI or AGP bus) between the video card and the co...
A system for facilitating integrity of assemblies that prevents unverified assemblies employed by applications from executing on the hardware electronic device, the system comprising; a memory (220), interface (132, 133, 134), a processor (200), characterized by, a manifest(42,72,94) that contains a list of modu...
A system for facilitating secured name and spaces of assemblies employable by application programs at runtime, the system comprising a memory (122), interface (132, 133, 134), a processing unit (121), characterized by a digital signature component (265) that provides a manifest within an assembly with a public key a...
An efficient technique is provided for determining a portion of a document corresponding to a captured image. Areas of a document in which the pattern is at least partially obscured are identified. A reference pixel in the image is selected, and an offset between the pixel and the pattern is determined. A pixel-by-p...
A multi-layer graphical user interface provides multiple types of information in at least two layers of a common display space, such as a window. In one implementation, a shared network folder includes two layers of display objects to separately represent files contained in the folder and users with whom the folder ...
A method and data structure are provided that enables name resolution via a hierarchical or chained lookup of delegated authorities independent of requiring IP address of delegated authorities. In an embodiment, the method provides for lookups by first generating cryptographic keys associated with a namespace An au...
A system and method that provides an efficient scheme to code images and video by exploiting spatial correlations within an image by employing hybrid directional prediction and lifting wavelet techniques.
Methods and systems are provided for generating colorized previews of selected document templates. Upon selection of a desired color scheme, each document template represented by a collection of displayed document template previews is colorized according to a user-selected color scheme to provide the user with a pre...
A system and method for enabling a network device to resume network activities in a secure manner on a communication network when network activities are generally blocked by protective security measures implemented by network security modules is presented. During its periodic update request, a network security modul...
In a web-based service environment, third party providers need to have varying degrees of access to user data for their complementary services. To prevent third party providers from having broader access than necessary or not adequate levels of access, transferable restricted security tickets are employed to determi...
A code segment and elements of information (e.g., meta information) associated with the code segment are encoded in an XML file. One or more encoded code segments are saved within a library of encoded code segments. An encoded code segment may be selected and inserted into source code file. When the encoded code is ...
Hardware acceleration of the rendering and animation of characters that treat each pixel sub-component as a distinct luminance intensity source. A bit-map representation of the sub-component-oriented character is generated by using a single image sample to generate each pixel sub-component. This may be accomplished ...
A restore system may perform a two staged restore operation. The first operation may restore system state and basic operational data to a system sufficient that the system may begin performing a set of basic operations. The second operation may restore secondary data over a period of time while the system is at leas...
The present invention provides for methods, systems, and computer program products for ensuring that sensitive subject matter within electronic messages is not inappropriately transferred between domains with differing security rights. The present invention utilizes the appropriate placement of message transfer agen...
An improved method and system are provided for creating tasks and for inputting information associated with created tasks according to an electronic task management application or system. Electronic correspondence items may be flagged as tasks. Upon flagging an individual electronic correspondence item, a correspond...
A method and system for matching digital information flow to the human perception system. In various embodiments, multi-monitor (multimon) support is leveraged to take advantage of multiple windowing and window positioning to separate elements of different tasks into information planes (which are based on a concept ...
Systems and methods for utilizing intermediate target(s) in connection with computer graphics in a computer system are provided. In various embodiments, intermediate memory buffers in video memory are provided and utilized to allow serialized programs from graphics APIs to support algorithms that exceed the instruct...
A file system shell is provided. One aspect of the shell provides virtual folders (615-655) whicll expose regular files file and folders users in different views based on (heir metadata instead of the actual physical underlyinj; file system structure on the disk. Users are able to work with the virtual folders thro...
System and method for related term suggestion are described. In one aspect, Relationships among respective ones of two or more multi-type data objects and identified. The respective ones of the multi-type data objects includes at least one objects of a first type and at least one objects of a second type that is dif...
A system and or/methodology that facilitates organizing content on a portable communications device to generate a compilation (e .g ., presentation) containing the organized content. The system and/or methodology includes an authoring component that associates content of a first type with a subset of other content a...
A sentence is accessed and at least one query is generated based on the sentence. At least one query can be compared to text within a collection of documents, for example using a web search engine. Collocation errors in the sentence can be detected and/or corrected based on the comparison of the at least one query a...
A communication system of a proxy node receives a request sent from a source endpoint to a destination endpoint during a dialog. The request includes route information that identifies a path of nodes through which a request from the destination endpoint to the source endpoint is to travel after arriving at the proxy...
A method includes receiving a name associated with a user on a remote computer, the name including location data and a hash value uniquely associated with a data object representing the user and retrieving the data object from one of a local cache based on the hash value or a location identified by the location data...
A method and computer-readable medium are provided for consistent configuration of language support between an operating system and application programs According to the method, an integrated process is provided for receiving and implementing one or more language settings for an operating system and one or more lang...
Techniques are disclosed to enable utilization f randomly-occuring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determined the labes' features. The informati...
A method of performing stretch-driven mesh parameterization. A method of performing stretch-driven mesh parameterization comprising, computing a spectral analysis to parameterize a mesh, and iterating a stretch optimization calculation to further optimize the initial parameterization
Methods and system are provided for intelligently managing project data in a project management application. According to various aspects of the invention, project management data may be loaded and saved to a local cache of a client computer, such as a hard disk cache. The invention also provides a mechanism for red...
Described is a system and system by which application programs provide data to auxiliary display device for display, including at times when the main computer system is powered down. The cache maintains the user data in association with structured navigational information, to allow navigation within the data via the...
An object associated with one or more controls in a software application. An object associated with a control determined the operation of the data entry user interface when the data entry user interface is being employed to enter data into that control. More particularly, the object may communicate interface charact...
1. A computer system for presenting related items in a universal data store to a user, the system comprising: a universal data store containing a plurality of items stored in accordance with a universal data schema and containing relational information corresponding to at least a portion of said plurality of items, ...
A facility for generating and using a unique identifier as a key to identify a unique user agent instance among multiple user agents of the same user is provided. The facility generates an identifier for a first user agent instance, which is an instance of a user in an application instance. The facility uses the ide...
The present invention relates to a system and methodology to facilitate security for data items residing within (or associated with) a hierarchical database or storage structure. A database security system is provided having a hierarchical data structure associated with one or more data items. The system includes a ...
An automated response system (e.g., an automated voice response system) may employ learning strategies to develop or improve automated response capabilities. Learning strategies may include using communications(e.g., utterances, text messages, etc.) of one party in a conversation (e.g., a customer service agent) to ...
A system and method for providing file data, such as a set of files for updating a computer system, in a self-contained package, in which the package size is significantly reduced via delta compression. A build mechanism examines files to be distributed, and generates a self–contained package containing files an del...
A system and related techniques provide a platform for encoding high density geometric symbol sets, for example a triangular barcode-type of encoding which may be used to encode drivers" licenses, biometric IDs, passports, or other transaction or identification media. According to embodiments of the invention in one...
A hint containing user mapping information is provided in messages that may be exchanged during authentication handshakes. For example, a client may provide user mapping information to the server during authentication. The hint (e.g., in the form of a TLS extension mechanism) may be used to send the domain/user name...
A user input panel (202)dynamically expands to accommodate user input (102), such as handwritten or keyboard input. Expansion may occur in one or two out of four possible directions, depending upon the language to be written or typed. For example, when writing English words, the input panel may expand to the right (...
Separation of aspects of automated testing into architectural layers enables automated testing to occur sooner and faster and to provide more comprehensive testing. A physical layer provides an object model over the user interface of an application. A logical layer provides an object model around the functions of an...
The present invention relates to a new type of structured name within a spreadsheet program that allows users to refer to tables, columns of data within tables, headers of tables, totals from tables, PivotTables(R), and portions of PivotTable(R) data by the data"s headers. Embodiments of the present invention compri...
A system for efficient routing of real-time multimedia information is provided. The system efficient routes messages containing real-time multimedia information by configuring and using multi-control unit connectors (“connectors”), which are special-purpose components optimized to route messages. A computing device ...
The present include systems for and methods of implementing an operating system that is capable of ascertaining whether it is operating in a virtual machine environment and is further capable of modifying its behavior to operate more efficiently in a virtual machine environment. Embodiments of the present invention ...
Described herein is an implementation for secure deployment, over a network, of software (e.g., an operating system) and updates to a bare computer (e.g., a server), so that it is not susceptible to malicious network-based intrusion.
A middle layer network protocol enhancement, virtual connectivity (VC) makes the network attachment point changes of local and remote peers transparent to applications that use network services. A virtual connectivity module local to each peer translates communication connection parameters from apparent to real and...
A generic mechanism to persist data objects into databases without a fundamental dependence on the underlying data store is provided. Rather than relying on the expertise of a programmer to know what the structure of a database should look like, data types are defined and adorned by the programmer with attributes th...
Service-oriented systems employing pipeline architecture to accommodate third party extensions for extending existing functionality or providing additional functionality are provided. User or third party provided plug-ins are registered through metadata and executed in a pipeline along with platform operations. The ...
A system and method for transmitting a clear image of a whiteboard work surface for remote collaboration. The image is separated into two portions; the projected image of the work surface, and the writing physically added to the whiteboard by participants. This separation allows several benefits. The bandwidth requi...
The subject invention pertains to a system and method of incorporating collation information into data types. In particular, the subject invention provides for parameterizing data types with collation information such that a comparison between two different collations generates a static-type error rather than a run-...
Systems and methods for presenting a merged view of remotely installed applications to which a user has terminal server (TS) based access are described. In one aspect, a client computing device generates one or more shortcuts to one or more respective applications. Each of the applications is installed at one or mor...
The present invention is directed to a system and method for managing software updates. More specifically, the present invention is directed to a system and method for facilitating the selection and implementation of software updates while minimizing the bandwidth and processing resources required to select and impl...
An improved user interface is provided for displaying selectable software functionality controls and for presenting logical groupings of particular functionality controls associated with a selected top-level functionality. Underneath a row of top-level functionality tabs, functionalities controls associated with a g...
An ergonomic pointing device receives commands from a user for controlling an electronic device. The ergonomic pointing device generally comprises a shaft, a roller, and a frame. The shaft comprises a ground spring contact and two direction-sensing spring contacts. The roller is disposed around the shaft so that the...
A data mapping architecture for mapping between tow or more data sources without modifying the metadata or structure of the data sources themselves. Data mapping also supports updates. The architecture also supports at least the case where data sources that are being mapped, are given their schemas predefined, and c...
Columns and/or rows of a report can be declaratively defined as either dynamic or static. The declarative definition can be represented by any marking. If a columns row is declaratively designated as dynamic, it remains as a single column or row to represent only the specified column or row data. Subgroups of column...
A drill-through feature is provided which provides a universal drill-through to mining model source data from a trained mining model. In order for a user or application to obtain model content information on a given node of a model, a universal function is provided whereby the user specifies the node for a model and...
The present invention leverages curve fitting data techniques to provide automatic detection of data anomalies in a "data tube" from a data perspective, allowing, for example, detection of data anomalies such as on-screen, drill down, and drill across data anomalies in, for example, pivot tables and/or OLAP cubes. I...
Described are techniques and mechanisms that implement an automated process for content acquisition using a Web portal. The process allows a content provider to visit a location on a wide area network and interact with one or more resources to upload a document. Within the process, several tasks are automated that w...
A process takes advantage of a structure of a server hosting a network site that includes a change log stored in a database to batch index documents for search queries. The content of the site is batched and shipped in bulk from the server to an indexer. The change log keeps track of the changes to the content of th...
A media integration layer including an application programming interface (API) and an object model allows program code developers to interface in a consistent manner with a scene graph data structure in order to output graphics. Via the interfaces, program code adds child visuals to other visuals to build up a hiera...
A mobile hand-held device comprising: an air conduction microphone that converts acoustic waves into an electric microphone signal" an alternative sensor that provides an electric alternative sensor signal indicative of speech; and a processor that uses the microphone signal and the alternative sensor signal to esti...
A computerized interface for data presentation, comprising: a property analyzer to determine an item distribution for atleast two cluster properties; and an organizer that forms new clusters based in part on the item distribution.
By modeling real-world application objects with complex structures, behaviors, and operations described by a schema which is enforced by the hardware/software interface system, various embodiments of the present invention provide rich sub-typing filnctionality by extending Items (and Item types) using "Extensions" w...
An extensible and automatically replicating server farm configuration management infrastructure is provided. A centralized configuration database stores all configuration data for the server farm. New configuration data can be added to the configuration database by extending a configuration object model without know...
The described embodiments relate to data security. One exemplary system includes a first component associated with data on which an action can be performed and a second component configured to perform the action on the data. The system also includes a third component configured to ascertain the action and determine,...
A system and process for identifying corresponding points among multiple images of a scene is presented. This involves a multi-view matching framework based on a new class of invariant features. Features are located at Harris corners in scale-space and oriented using a blurred local gradient. This defines a similari...
Systems and methods are provided for color management in connection with a variety of computing devices having different color display characteristics. The X11 graphics platform is augmented to support color management systems, such as ICC, sRGB and scRGB, which begin and end with device dependent colors. CMYK color...
A method, apparatus, and computer-readable medium are provided for managing specific types of content in an electronic document. A user interface is provided for displaying a specific type of content in a predefined area of and electronic document. The user interface includes a content region for receiving the speci...
A system and method for updating one or more files on a computing device are provided. A client computing device obtains update information including an index identifying particular delta patches with specific versions of installed files. Upon selecting which of the applicable updates will be implemented, an update ...
A communications device, such as a cellphone, functions as a peripheral for a processor, such as a laptop computer. The cellphone and the laptop are directly coupled via a communications link that is not the cellular network. Audio, still images, video data, and/or user interaction options are provided to the cellp...
A system and method for analytically modeling data from different measure groups onto a single cube are disclosed. The single cube preferably includes a first measure associated with a first measure group with a first set of corresponding dimensions. The single cube preferably also includes a second measure associat...
A method of determining membership in a group includes receiving a request to determine if an element is a member of a group. The request may be generated by a software application where the application provides at least one parameter to a script which resides external to the application. The script, along with an o...
A system and process for generating a two-layer,3D representation of a digital or digitized image from the image and a pixel disparity map of the image is presented. The two layer representation includes a main layer having pixels exhibiting background colors and background disparities associated with correspondingl...
Use of a biometric identification device in a client computer system to subsequently access an authentication system includes receiving biometric sample data which is digitally signed and combining the data with a user ID and PIN. This package of data is then securely transmitted to a biometric matching server to va...
The present invention extends to methods, systems, and computer program products for fitness based routing. Embodiments of the invention significantly improve the likelihood that routing nodes contained in routing table have adequate (or even relatively increased) ability to transfer and process messages in an overl...
Various embodiments provide approaches that facilitate decoding in the context of video coding standards that allow for complicated dependencies among pictures of an encoded sequence of pictures. In some embodiments, the notion of a random access point or "RAP" is utilized. A random access point is effectively a loc...
A system and method for virtual folder and item sharing including utilization of static and dynamic lists. Static and dynamic lists may be created as types of virtual folders. Virtual folders expose regular files and folders to users in different views based on their metadata instead of the actual physical underlyin...
The present invention allows a user to synchronize a device with a least two data sources that may cross-pollinate. The user"s device is used to shuttle changes between the sources and resolves conflicts when changes are made to an item on multiple sources concurrently. The user"s device keeps track of which version...
A micro-monitor for use in the monitoring of database environments is provided. In an illustrative implementation, a micro-comprises a graphical user interface (GUI) having controls for navigation of information, controls to control database environments, a display area for displaying monitoring information about t...
A query runtime architecture and an exemplary application programming interface suitable for the architecture are presented. The architecture inputs one or more XML queries and views and enables the queries to be translated wherein the queries and views may be run over multiple data sources of different data models....
A web-based data form enables modifications made to values in the data form to be dynamically implemented in a data source Form fields of the data form are associated with items in the data source using data binding information Data from the data source is transformed into intermediate code using Extensible Styleshe...
A method and apparatus are provided for training and using a hidden conditional random field model for speech recognition and phonetic classification. The hidden conditional random field model uses features, at least one of which is based on a hidden state in a phonetic unit. Values for the features are determined f...
The sharing model for file system operations is unified with the transaction and locking model of query language statements to provide an overall framework for locking and isolation in a storage platform (308). Additionally, transactional support is provided for file system operations so that they may be executed in...
A system and method utilizing virtual folders (fig. 3). The virtual folders expose regular files and folders to users in different views based on their metadata instead of the actual physical underlying file system structure on the disk (fig.3). The virtual folders (308) contain collections of items. The system inc...
Techniques are provided for at least modeling any one of mesostructure shadowing, masking, interreflection and silhouettes on a surface, as well as subsurface scattering within a non-homogeneous volume. Such techniques include, at least, acquiring material parameters for a material sample, determining irradiance dis...
A method that enables multiple spam detection solutions to be deployed in a manageable and rational manner to determine if a message is spam is presented. A framework invokes anti-spam filters to analyze the message and return confidence levels of whether a message is spam. The framework evaluates the highest confid...
Systems and methods for intelligent data broadcasting techniques are disclosed. A data broadcasting system receives profile information representative of information desired by subscribers to the data broadcasting system. Broadcast content in one or more broadcast regions may be adjusted in response to changes in ag...
A system and method for lossless and/or progressive to lossless data coding (e.g., audio and/or image) is provided. The system and method employ a multiple factorization reversible transform component that quantized coefficients based, at least in part, upon a mulitple factorization reversible transform. The multipl...
Strategies are described for transmitting control information from a host module to a client module. The host module transmits the control information in-band along with a stream of media content information packets. The control information can be used to govern the operation of the client module. In one case, the c...
Method for dynamically providing instant comments. A first instruction is received from a first user for activating an instant commenting tool for enabling instant commenting on a web media object on an online environment. The web media object is identified by the activated instant commenting tool in response to the...
A portable rewritable medium and a method are provided for preventing unauthorized use of executable software stored on the portable rewritable medium. A portion of the software stored on the portable rewritable medium may include instructions for a processing device to determine whether execution of the executable ...
A security device watches over the secure functionality in a computer system. This "watcher" security device may be integrated within the computer system or may be separate from it. The security device queries the secure functionality to determine whether the state of the secure functionality is acceptable. If no ...
Dynamic directory harvest attack detection and mitigation system is accomplished by altering the logic surrounding how a receiving email server enforces its email delivery rules. The email server"s assumed response to received emails is changed when it is determined that the server is under attack, thereby foiling t...
A method and system for rendering electronic document objects is provided in which a style matrix holds potential attribute values, ar:d attribute references are used to address values is the style matrix. A mix of attribute references and actual attribute values may be used so make some attributes theme- and applic...
The use of software is licensed to a particular user, regardless of the computing device on which the software has been launched. A computing device is logged onto a central service. The central service either directly approves the launching of the software or it provides a code to the computing device, which in tur...
A stamp is created and associated with a computer file. The stamp includes the address locations of data in the file that may be infiltrated by computer related viruses and/or malware. Using this stamp, an anti-virus program can identify the specific parts of the file that should be scanned for virus infection. Othe...
A system and/or methodology that unifies a telephonic communication component and/or system with a data (e.g., messaging) server component and/or system. The system can facilitate telephonically accessing rich information in the server (e.g., messaging server). This riclrinformation can include email content, calend...
Methods, systems, and computer program products for adding hinting instructions to a sharacter in order to improve a character bitmap produced from an outline of the character at a certain size and output resolution when the character outline is scan converted. A character is retrieved to be output. A determination ...
A method and an optical storage medium are provided for storing data to and accessing data from an embedded virtual medium within the optical storage medium. Information describing the embedded virtual medium may be stored on to the optical storage medium. Space for an embedded lead-in area of the embedded virtual m...
Systems and methods for controlling network access determine that a client computer on the network is in compliance with administrator-defined network health policy standards before the client computer is granted access to the network. A packet exchange mechanism is defined wherein filtering instructions from a serv...
Content re-lock control is described. In an embodiment, restricted content is unlocked such that the restricted content can be rendered for a rendering duration. A user-selectable input is received that time-shifts the rendering duration of the restricted content, and an effective rendering duration of the restricte...
Methods, systems, and computer-readable media implementing various aspects of complex data in a conceptual table are disclosed which enable complex data in the form of tables to be added to a conceptual table. The complex data can map to scalar values in a plurality of data tables. Complex data may be entered via da...
A self-healing device is provided in which changes made between the time that an infection resulting from an attack on the device was detected and an earlier point in time to which the device is capable of being restored may be recovered based, at least in part, on what kinds of changes were made, whether the change...
A method, system, and computer-readable medium are provided for determining a layout of automatically-placed elements and user-placed elements in a chart created in a chart application program. User-placed elements in the chart include chart elements that have been moved and/or resized by a user. User-placed element...
The claims of the present application recite a method and system for accessing
information in an otherwise inaccessible application database of a DBMS using view definitions that implement a security protocol.
A system and method are incorporated within a search engine for preventing proliferation of malicious searchable content. The system includes a detection mechanism for detecting malicious searchable content within searchable content traversed by a web crawler. The system additionally includes a presentation mechanis...
An approach is provided for associating structured information as feature-value pairs with advertisements at an advertisement system that provides advertisements for presentation with primary content. Feature-value pairs corresponding with advertisements describe features of the products or services associated with ...
Workflow management for maintaining consistency of persisted state across communicating components via batching of uncommitted work. A workflow component defines a workflow containing work items to be performed by service provider components. The workflow component assigns the work items to the service provider comp...
The method may include providing at least one primary calendar, providing a plurality of calendar rules, each of the plurality of rules comprising a rank and a rule-scope. The method may also include providing a representation of the primary calendar and the plurality of calendar rules, and allowing expansion of the...
A computer system includes a processor creating a renderable image in a first orientation, a display showing the image in the first orientation, and a directional input device having an orientation indicator that is movable between a first position associated with the first image orientation and a second position as...
[91] The use of pressure-sensitive controls is disclosed in which controls respond
differently to different pressure applied by a stylus on a digitizer. Users interacting with displayed controls may modify the speed, increment, or other property of the control by pressing harder or softer. Devices that allow for th...
A new connection wizard automatically detects available networking hardware, as well as networks that are available. The wizard then presents the user with a list of choices, i.e., different connection types that they can set up. This list of options is based on the hardware and networks that were detected initially...
Systems and methodologies that facilitate a unification of bus protocols and networks via an abstraction system that can bind device models and higher level protocols to multiple bus implementations. Such abstraction system can provide a common language among buses for message transfers according to priority - e.g.,...
A user interface is provided allowing a user to simulate mouse hovering with the user"s finger on a touch-sensitive display. When a finger or other stylus touches the touch-sensitive display adjacent to a displayed cursor, a control appears that enables the user to drag the cursor about the display by dragging the c...
A method of viewing a high resolution display on a low resolution development system display for a digital device includes selecting a target device and identifying an image form for the selected device. An image form displays a realistic form of the selected target device. A form factor is selected which represents...
A device, such as a component or a peripheral, and corresponding computer are adapted to be bound such that the device will only operate with that computer after the binding process. Cryptographic messages are sent between the device and computer to confirm the relationship. When the device cannot confirm it is oper...
Systems and methods in accordance with the present invention allow for messages to be delivered from one application to another over a network in discrete groupings or communication sessions. For example, a sending computer system sends a group of related messages to a queue at a recipient computer system. The recip...
A system and/or methodology that employs a non-relational (e.g., XML (extensible markup language)) query language to access stored procedures employed in connection with relational (e.g., SQL (structured query language)) database management systems is provided. Stored procedures in SQL enable the predetermination of...
A MediaDescription data structure that includes both descriptive metadata, such as EPG information, about a multimedia content item and instructions for acquiring the content item is assigned to each multimedia content item in a multimedia system. A MediaDescription data structure is transferable as a token for repr...
A method and system are provided for automatically enhancing initial search results produced by a search engine in response to a multi-word user query. The method may include implementing a result evaluation mechanism within the search engine for evaluating adequacy of the initial search results. The method may addi...
A collection of digital media is stored at a source device and transferred to a target device. A subset of the collection may be transferred based on a priority related to a points assigned by a user"s rating of particular digital media and on rules based on particular user actions.
When users travel to an intended destination, a plurality of information can be beneficial to assist their travel. If a person is traveling to a crowded event, then information can be provided such that congested traffic areas can be provided. There can be financial opportunities available in relation to providing i...
A computing device with a software defined radio. The software defined radio has an architecture with separate components to provide control functions and data processing functions. The control components configure the data processing components so that the software defined radio provides desired operating character...
A collaborative authoring application provides an authoring environment in which two or more users can edit a document concurrently. Each user edits a copy of the document, sends updates to a master copy of the document, and receives updates from the master copy of the document. The authoring environment may be conf...
In order to provide advertising to a user concerning an intended travel destination, an auction takes place where multiple companies place bids to have an advertisement disclosed. Bid selection can take place according to various parameters, including matching a user interest, a bidder that offers a highest price, e...
A computer object access control graphical user interface allows a user to set computer locations where a computer object may be accessed and other users who may access the computer object. The computer object may be a computer file, a computer message, person contact information, elc. The access conlrol user interf...
Methods, systems and architectures for processing renderable digital content are described. The various embodiments can protect against unauthorized access or duplication of unprotected content (i.e. decrypted content) once the content has reached a rendering device such as a user"s computer. A flexible framework in...
Techniques and tools for high accuracy position calculation for picture resizing in applications such as spatially-scalable video coding and decoding are described. In one aspect, resampling of a video picture is performed according to a resampling scale factor. The resampling comprises computation of a sample value...
ABSTRACT FAST DISPLAY INITIALIZATION AND LIGHT UP
Described is a technology by which a computer display may quickly resume outputting video data following its awakening from a deep sleep state Displayed settings are maintained in a memory, such as a memory of the display, while the display is in a sleep state. The...
ABSTRACT USING USER FEEDBACK TO IMPROVE SEARCH RESULTS
The invention discloses a system and method for managing feedback data that will be used for ranking search results. The invention can aggregate a plurality of user feedback data from more than one user into a search index. The user feedback data can be associa...
An offer may be provided to a user in conjunction with activating or registering a software product. A request for activation of the software product or registration of the software product may be sent to a server via a network. In response to receiving the request, the server may send an activation code to the proc...
Various embodiments provide a Web browser that employs a relevancy algorithm to make an educated guess as to the likelihood of a user"s intended destination when the user begins to enter text into a browser"s address bar. In one or more embodiments, the relevancy algorithm employs various parameters and assigns weig...
This document describes tools capable of managing digital content from multiple content providers based on a user"s identity. By so doing, the tools may free people from the limitations of their storage media and devices. The tools may perform these and other actions through an indirect relationship with users, such...
Architecture for multi-level undo on a client in grid-based applications. The architecture is a control driven cascading changes system where change tracking works seamlessly in asynchronous (and synchronous) scenarios. A client application is associated with a grid object and, instantiates and configures the grid o...
An audio encoder receives multi-channel audio data comprising a group of plural source channels and performs channel extension coding, which comprises encoding a combined channel for the group and determining plural parameters for representing individual source channels of the group as modified versions of the encod...
A computer-based, multi-player, on-line, game session is capable of being joined while the session is in progress without requiring an invitation from the host of the game session. A player can join the game session via a set of User Interfaces (UIs) provided by the gaming system. The player is not required to conta...
The present invention extends to methods, systems, and computer program products for block count based procedure layout and splitting. Embodiments of the invention utilize code block counts to provide a total ordering of code blocks that improves execution time of generated procedure code by minimizing branches alon...
Multiplayer tournaments may be established, and then automatically executed by tournament server devices to help provide users with quality matchups against players of similar skill. Tournaments may be defined by an administrator, and then automatically instantiated any number of times to accommodate demand by playe...
A plurality of secure execution environments may be used to bind individual components and a computer to that computer or to blind computers to a given system. The secure execution environment may be operable to evaluate characteristics of the computer, such as memory usage, clock validity, and pay-per-use or subscr...
A method is provided, wherein the method comprises identifying nearby wireless communication access points (APs) to which a client computing environment can cooperate with to communicate and receive data through a subscription to a neighborcast group from indentified nearby cooperating access points such that illust...
Coexistence tools are described for synchronizing properties between on-premises customer locations and remote hosting services. These tools may provide methods that send the tools for installation onto on-premises infrastructure located at customer sites, execute the tools to manage the customer infrastructure remo...
A communication system in which an access point and one or more devices communicating
through the access point adaptively apply Orthogonal Frequency Division Multiple Access
(OFDMA). The access point may assign orthogonal subcarriers to devices as in
conventional OFDMA, but the access point senses activity on t...
Methods, systems, and computer-storage media having computer-executable instructions embodied thereon that, when executed, perform methods in accordance with embodiments hereof, for managing component programs within a service application according to a service model. Initially, configuration settings, which can be ...
Systems and methods to implement a graphics remoting architecture for rendering graphics images at remote clients are disclosed. In one implementation, when a D3D application hosted on a remote server is used by a remote client, the graphics associated with the D3D application are created and rendered at the remote ...
A Radio Frequency Identification (RFID) receiving method for use with an Enterprise Resource Planning (ERP) system is provided. The method includes reading, at a receiving point, information from RFID tags included on delivered items, which are not recorded on an Advanced Shipment Notification (ASN). An item arrival...
In accordance with one or more aspects of a dynamic soft keyboard, a user input is received via a soft keyboard having multiple keys. Information describing a current input environment for the soft keyboard is obtained, and a determination is made as to which one or more keys of the multiple keys was intended to be ...
A graphical user interface is disclosed for tracking and managing the use of text boxes by providing visual aids that make it easy for a user to see which text boxes are linked to which as well as the order of text boxes in a linked chain The present system also makes it easy to track the creation and breaking of ...
ABSTRACT MIGRATING A VIRTUAL MACHINE THAT OWNS A RESOURCE SUCH AS A
HARDWARE DEVICE A computing device has first and second virtual machines (Vrms) and a resource assigned to the first VM. Each access request for the resource is forwarded thereto immotile the first VM is to be saved or migrated. Thereafter, each ac...
ABSTRACT PERMITTING MULTIPLE TASKS REQUIRING ELEVATED RIGHTS
System(s), method(s), and/or technique(s) ("tools") are described that enable a user to permit multiple tasks requiring elevated rights with as little as one rights elevation. For example the tools may enable an installation wizard operating within a lim...
ABSTRACT
DOCUMENT OVERVIEW SCROLLBAR
A document overview scrollbar renders a miniaturized replica of an entire document. The document overview scrollbar provides an efficient and expeditious tool for searching, navigating, and/or editing documents. A visual pattern in the document is easily identifiable in the rep...
[0038] A DNS server includes one or more zones that store information, such
as IP addresses, associated with domain names. These zones include a global names zone that stores data correlating host names to domain names When a name query is received from a client device, the DNS server checks the global names zone ...
Embodiments herein provide for a pre-processing stage or mechanism for enhancing data compression of an image by splitting or separating the color channels for pixels into planar data sources. Typically, image data is displayed as an interleaved set of channel types for a color space such that each pixel within an i...
Transforming one or more of a collection of electronic data interchange (EDI) transactions. A type of EDI transactions is identified to be transformed from a source format to a destination format. The collection of the EDI transactions is received according to the source format. A particular one or more of the colle...
A stapler (1) includes a body (3) and a strike plate (7) movably mounted to the body (3) between a rest position and a loaded position. The strike plate (7) is adapted to drive a staple into a target object. The strike plate (7) may be moved from the rest position to the loaded position by a loading mechanism (6) ag...
A computer system includes a security module programmed to generate a first privacy key for use with secure communications with a first web site, and a second privacy key for use with secure communications with a second web site, the first and second keys being different. The computer system also includes an identit...
Various technologies and techniques are disclosed for extending the functionality of the Open Mobile Alliance (OMA) Device Management (DM) protocol. An addition is made to the OMA DM protocol that enables the server to specify node filtering criteria as part of a query to a target node on a mobile device to indicate...
Techniques to generate a visual composition for a multimedia conference event are described. An apparatus may comprise a visual composition component operative to generate a visual composition for a multimedia conference event. The visual composition component may comprise a video decoder module operative to decode ...
ABSTRACT
XML PAYLOAD SPECIFICATION FOR MODELING EDI SCHEMAS
Modeling an electronic data interchange (EDI) document using extensible Markup Language (XML) at runtime. A plurality of structural elements is identified in the EDI document. A plurality of corresponding data values is identified from the identified plur...
ABSTRACT
MANAGEMENT AND APPLICATION OF ENTITLEMENTS
[0039] A method and system for managing and applying entitlements is
described herein. An identity integration server centrally manages data associated with entitlements for a plurality of identities. The integration server may select one of a plurality of workf...
ABSTRACT SCALABLE ALGORITHM FOR SHARING EDI SCHEMAS
Developing a file corresponding to an electronic data interchange (EDI) schema. The EDI schema is selected for transmission to a destination device. A plurality of syntax structures in the selected EDI schema is identified. The plurality of syntax structures defin...
Caching data. A method may be practiced, for example, in a computing environment including a server system that provides data to client systems. The server system includes a number of caches for storing data. The method allows a least expensive cache to first cache data or return data requested by a client. The meth...
ABSTRACT PERCEPTUAL IMAGE PREVIEW
Systems and methods for perceptual image preview are described. In one aspect, a naive preview image is generated by downsampling a larger image. Perceptual features of the larger image are then detected. Information associated with the detected perceptual features is then incorpor...
SPEAKER AUTHENTICATION
speaker authentication is performed by determining a similarity score for a test utterance and a stored training utterance. Computing the similarity score involves determining the sum of a group of functions, where each function includes the product of a posterior probability of a mixture co...
ABSTRACT MULTI-PROTOCOL REMOVABLE STORAGE DEVICE
A removable storage device that automatically selects a communication protocol to exchange information with a host computer includes a physical layer interface, a protocol failure detection module, a connect and disconnect emulator, an insert and removal detector, an...
ABSTRACT
[0060] In a managed execution environment, an error may be deferred until execution of the application, program, function, or other assemblage of code reaches a point at which calling the reference to a module associated with a missing type or type member becomes inevitable.
ABSTRACT
COMMAND LINE PIPELINING
Piping command line functions. A method may be practiced in a computing system. The method includes acts for performing functions using a single command line utility capable of performing multiple functions. The command line utility is able to accept output of the command line util...
ABSTRACT
PROPAGATING RELEVANCE FROM LABELED DOCUMENTS TO UNLABELED DOCUMENTS
A method and system for propagating the relevance of labeled documents to a query to unlabeled documents Is provided. The propagation system provides training data that includes queries, documents labeled with their relevance to the queri...
ABSTRACT EDI INSTANCE BASED TRANSACTION SET DEFINITION
CreatIng an electronIc data Interchange (EDI) transactIon from a descrIptIon of the EDI schema. The descrIptIon defInes the EDI schema In a non-EDI structure. The descrIptIon of the EDI schema Is receIved. A pluralIty of data unIts Included In the receIved desc...
A tool which facilitates a balancing of security with usability enabling secure user access to multiple secure sites and locations from several computing devices utilizing a roamable credential store (RCS) which is highly resistant to offline attack. The RCS facilitates a protected Unified Credential Vault (UCV) via...
ABSTRACT RFID BUSINESS PROCESS-DECOUPLING OF DESIGN AND DEPLOYMENT TIME ACTIVITIES
The claImed subject matter provIdes a system and/or a method that facIlItates ImplementIng a bIndIng between a radIo frequency IdentIfIcatIon (RFID) process and a devIce. An RFID process can receIve a tag read event from a devIce and...
A flash driver can be used by file systems and other applications to determine more detailed attributes and properties, such as region geometry, that describe the underlying flash component. This allows a file system, for example, to be made aware of each flash region and its properties. The file system may then be ...
A unique system and method that facilitates synchronizing data across multiple accounts at about the same time is provided. The system and method involve configuring an intelligent set of synchronization rules that can apply to various data types from one or more user accounts or storage locations. In addition, the ...
Various embodiments utilize a special object referred to as an rsshttp objec2W222323! to acquire an RSS feed, process the feed and expose an object model to a web page or application. In at least some embodiments, the rsshttp object can parse through the feed's associated RSS data, normalize the feed data to a stand...
Client category configuration is described, in which, a computer-implemented method may be employed to find categories of clients based on configuration data obtained from the clients. A configuration recommendation is then created for a particular one of the categories based on configuration of one or more of the c...
A system is described that is specifically adapted for use in a resource-constrained set-top box environment. The system uses an interpreter-based common language runtime (CLR) that is specifically configured for use in the set-top box environment. The system also includes a unique application manager and UIpane man...
Computing devices, computer-readable media, and methods are provided for facilitating community based targeted advertising. A message is received from a first user. At least one intended recipient of the message is determined. Additionally, at least one preferred active communication channel associated with the at l...
An interactive surface computer with a switchable diffuser layer is described. The switchable layer has two states: a transparent state and a diffusing state. When it is in its diffusing state, a digital image is displayed and when the layer is in its transparent state, an image can be captured through the layer. In...
System and methods for directing a federated search using a location description file to locate a data source are provided. For a federated search, a location description may be used to describe the location of each data source searched, and may further be used to connect the user to that particular data source. The...
Safe file transmission and reputation lookup. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protec...
In one or more embodiments, users are able to access small previews of a service from within their present application context. For example, users can install various services in an application, such as a Web browser. Based upon a user action within the application, a user interface instrumentality can be presented ...
Forms may be morphed based on permissions such that objects for which permission or a license is not available are not displayed. Relevant code may be analyzed to determine whether permission to a table is available and if permission to a table is not available, objects that rely on that table are not included in th...
The display language of a site may be changed to another alternate language by users of a site at any time. For example, a first user may access the same site in its default language (i.e. English) and a second user may access the site using their preferred language (i.e. French) even though the default language of ...
The same command surface on a page may be associated with unrelated components and applications. Each of the components registers the commands associated with a shared command surface that they will be utilizing. Each component may utilize an arbitrary number of commands that are associated with the command surface....
An Interactive voice advertisement exchange presents an Interactive voice advertisement to a user of a voice network who is placed on hold. After the user sends a signal response from a user device to a receiving system and is placed on hold, the hold time and a parameter associated with the signal response are rece...
A User Interface (Ul) for a real-time panoramic image correction system and method that simplifies the use of the system for the user. The Ul includes a control panel that allows a user to enter meeting table size and shape, camera position and orientation, and the amount of normalization desired (e.g. 0 to 100%)....
A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if a...
A computing environment may be represented as a deployable object hierarchy, which may be organized according to an object hierarchy schema that is commonly shared among the computing environment host and the devices that are configured to render the computing environment. A particular object hierarchy schema is pre...
A synchronized media experience is described. A media server identifies a group of two or more remote media entertainment systems through which user-controlled play of media content may be presented. The server generates and transmits one or more synchronization commands to the remote media entertainment systems t...
An exemplary computer-implementable method includes receiving a call
from an application executing on a host computer, the host computer having a collection of graphical user interfaces, and, in response to the call, registering the application whereby the registering comprises providing one or more entry points ...
ABSTRACT BUSINESS PROCESS META-MODEL
A meta-model representing a business process. Operative expressions arc defined for identifying the business process. The business process includes a plurality of activity sequences. Metadata is collected associated with the defined operative expressions. The collected metadata ...
ABSTRACT
UNIFIED CONCEPT OF PRESENCE
A method and system may provide a unified concept of presence across all connected hosts by providing a common point of access for all presence-related data on the system. The application abstraction layer may provide a common interface for all presence enabled applications to ...
ABSTRACT
MANAGING NETWORK RESPONSE BUFFERING BEHAVIOR
The present invention extends to methods, systems, and computer program products for managing network response buffering behavior. A computer system receives a request for content trom a client. The computer system has a default response buffering behavior used...
ABSTRACT
VARIABLE OFDM SUBCHANNEL CODING AND MODULATION
A system for selecting a modulation scheme and an error correction coding scheme for each subchannel in an OFDM system based on the energy detected on that subchannel.
ABSTRACT
POLICY BASED MESSAGE AGCREGATION FRAMEWQRK
Messages generated by an originating application are aggregated into batches based on a configuration policy. The configuration policy contains business logic used to aggregate messages into a batch. Once a batch is complete, it is formatted into a single stream ...
ABSTRACT
BIOS CONFIGURATION UPDATE TECHNIQUE
The present EMOS configuration update technique allows a system administrator the ability to remotely configure a set of computing systems from various manufacturers from a single administrator console. A BIOS configuration description is used for defining hardware sett...
ABSTRACT FILTERED REPLICATION OF DATA STORES
Methods for enabling multi-master synchronization of particular sets of data using filters. In a synchronization request, data including knowledge and filters may be supplied. A response may comprise data including changes that are identified by the filter and that have ...
ABSTRACT
AUTHENTICATION FOR A COMMERCIAL TRANSACTION USING A
MOBILE MODULE
Current embodiments provide for authorization and payment of an online commercial transaction between a purchaser and a merchant including verification of an identity of the purchaser and verification of an ability of the purcliaser to pay...
ABSTRACT
OFDMA BASED ON COGNITIVE RADIO
A multiuser scheme allowing for a number of users, sets of user, or carriers to share one or more channels is provided, in the invention, the available channel bandwidth is subdivided into a number of equal-bandwidth subchannels according to standard OfDM practice. The trans...
ABSTRACT SECURE NETWORK COMMERCIAL TRANSACTIONS
Current embodiments provide for authorization and payment of an online commercial transaction between a purchaser and a merchant including verification of an identity of the purchaser and verification of an ability of the purchaser to pay for the transaction, where th...
A method for presenting a graphical representation of the strength or vitality of a contact"s social network is disclosed. When a user pulls up a graphical user interface displaying contacts in his or her social network, in addition to the traditional profile data for each contact, a virtual object may be displayed....
Techniques and tools are described for processing reconstructed audio signals. For example, a reconstructed audio signal is filtered in the time domain using filter coefficients that are calculated, at least in part, in the frequency domain. As another example, producing a set of filter coefficients for filtering a ...
Techniques and tools related to delayed or lost coded audio information are described. For example, a concealment technique for one or more missing frames is selected based on one or more factors that include a classification of each of one or more available frames near the one or more missing frames. As another exa...
ABSTRACT A DISTRIBUTED ARCHITECTURE FOR ONLINE ADVERTISING
[0052] A system to facilitate trading of advertising comprises a publisher broker representing at least one publisher and to determine an ask for an advertisement space on the publisher's webpage, an advertiser broker representing at least one advertiser an...
ABSTRACT
WORK ITEM EVENT PROCESSION
Detailed herein is a technology which, among other things, monitors the flow of events between a front-end application and a backend server. In one approach is technology, a new event is received at the backend server. This new event has an event type, which is used to set a new...
ABSTRACT
FLEXIBLE QUANTIZATION
A digital media encoder/decoder uses a flexible quantization technique that provides the ability to vary quantization along various dimensions of the encoded digital media data, including spatial, frequency sub bands and color channels. The codec utilizes a signaling scheme to signal...
ABSTRACT OF THE INVENTION UPDATING VIRTUAL MACHINE WITH PATCH OR THE LIKE
Each of a plurality of virtual machines (VMs) is stored in a halted form in a library for retrieval from the library and re-starting on a host. Each re-started VM includes a plurality of software constructs, each of which is at least potentia...
ABSTRACT
AGENDA AND DAY HYBRID CALENDAR VIEW
A user interface and user interface control for displaying calendar data is provided. In particular the user interface provides a hybrid view that includes both a schedule view of listed calendar items together with an overview strip that displays a compressed version ...
ABSTRACT
A GENERIC INTERFACE FOR DEEP EMBEDDING OF EXPRESSION
TREES IN PROGRAMMING LANGUAGES
The claimed subject matter provides a system and/or a method that facilitates querying data utilizing ah explicit representation of an embedded language. An lEnumberable component can receive a data operation that can be ...
ABSTRACT
ANNOTATION BY SEARCH
Annotation by search is described. In one aspect, a data store is searched for images that are semantically related to a baseline annotation of a given image and visually similar to the given image. The given image is then annotated with common concepts of annotations associated with ...
ABSTRACT
DISTRIBUTED FIREWALL IMPLEMENTATION AND CONTROL
One or more devices on a network may be configured to provide firewall services for other devices on the network. Each of the firewall service suppliers may publish its capability with respect to firewall services and the service receivers may publish their ...
ABSTRACT
PUBLISHER UNIONS
[0027] A publisher union comprises a plurality of publishers, a channel, and a publisher union administrator The publisher union is administered by receiving a channel proposal, determining whether the channel proposal is acceptable, forming a channel, and presenting the channel for monet...
ABSTRACT
CLAIM TRANSFORMATIONS FOR TRUST RELATIONSHIPS
This disclosure relates to the ability to use multiple claim transformation modules in a. trust relationship. Claim transformation modules transform a claim or claim set into a transformed claim or claim set for use by a trusted partner and/or application. Mul...
Techniques and tools for encoding and decoding a block of frequency coefficients are presented. An encoder selects a scan order from multiple available scan orders and then applies the selected scan order to a two-dimensional matrix of transform coefficients, grouping non-zero values of the frequency coefficients to...
MULTITHREAD SPREADSHEET PROCESSING WITH DEPENDENCY
LEVELS
ABSTRACT
This disclosure relates to a method and system of processing chain calculations in spreadsheet applications utilizing multiple processors, each having a separate recalculation engine. A single calculation chain may be reordered into a unified chai...
ABSTRACT USER PRESENCE AGGREGATION AT A SERVER
A presence aggregation system provides a presence aggregation server that allows for the publication of presence state of a publisher from the publisher's multiple endpoints. A presence state includes an availability value and an activity. An activity may include an ac...
FAULT-TOLERANT RESOURCE COMMITTAL
ABSTRACT
[0055] This document describes tools that enable fault-tolerant resource committal for a system having computing devices needing to have operations of a particular type performed by one of multiple external resources. The tools may do so without relying on leadership from...
POSITION BASED TACTILE REPORTING
ABSTRACT
Position based tactile reporting provides for adequate and socially acceptable reporting. A tactile element is moved from a first position to a second position to indicate a status. The tactile element is maintained in the second position so that touching the tactile eleme...
Media and methods are provided for creating and operating a keyword expression language. Syntax is generated as an abbreviation to represent a list of keywords. The syntax is executed as part of the keyword expression language to provide keywords. The syntax includes tokens that substitute for groups of information....
This invention relates to a computer system (20) comprising a processing unit
(21), a keyboard (40) coupled to the processing unit, a display device (47)
coupled to the processing unit, and an operating system (35) running on the
processing unit, a system input method editor (116) running on the processing
unit ...
ABSTRACT
PARAMETRIC CALIBRATION FOR PANORAMIC CAMERA SYSTEMS
Architecture for spatially calibrating a multi-sensor panoramic camera. A panorama warping calibration model and manufacturing calibration data is characterized in a parametric model that is stored on the camera and utilized for camera calibration Calibr...
ABSTRACT
EFFICIENT PHRASE PAIR EXTRACTION FROM BILINGUAL WORD ALIGNMENTS
A method is provided for identifying phrase alignment pairs between a source sentence and a target sentence. Boundaries for a phrase in the source sentence are identified by requiring that a source word be aligned with at least one target wor...
A method for creating, discovering, and joining meetings over a peer-to-peer network involves creation of a graph of meetings on a local subnet. When a meeting is created a meeting record is added to the graph where it may be discovered by other potential meeting attendees. A user may select from a list of meetings ...
A program product and method is disclosed that rely on user interaction in the ordering of search results returned by a search engine. Each of a plurality of records in a database is associated with a user-interaction parameter that is associated with the duration of time that a user accesses a particular record of ...
An image query system, and associated method and computer program product are disclosed that enhance and accelerate image-based querying. To this end, the present invention presents a digital image query with implict and explicit associated metadata and retrieval of visually similar images or other pertinent informa...
The technical features mentioned in the abstract do not include a reference sign between parentheses (PCT Rule 8.1 (d)). A system, method, and computer-readable media are disclosed for retrieving configuration files from host units to devices. The system, method, and computer-readable media can, through a media devi...
Users on a peer-to-peer network, particularly a local subnet or ad hoc wireless network, may publish first contact information to a graph or data store on the network. The first contact information may include a certificate with a public-key and a user identification, such as a peer name. Other users may discover th...
A scheduler in a process of a computer system includes a respective scheduling collection for each scheduling node in the scheduler. The scheduling collections are mapped into at least a partial search order based on one or more execution metrics. When a processing resource in a scheduling node becomes available, th...
A system and method for preparing and storing pre-determined queries on devices with large re-writable media. This invention addresses the problem of processing of data query request on devices that may not have the processing power to return query results in a timely manner. A requesting device queries a target dev...
Computer-readable media, computerized methods, and computer systems for intuitively invoking a presentation action (e.g., rendering a menu) by applying a drag-operation at a top-level control button rendered at a touchscreen display are provided. Initially, aspects of a user-initiated input applied at the top-level ...
Methods and systems which identify and interact with network interfaces based on the
network to which they provide access. A computing device operating in accordance with
one or more of the principles described herein may examine available network interfaces
and identify the network to which the network interface...
Aggregating temporal information and location information to form a collective query. A search query is received from a user to identify search results. Temporal information and location information associated with the query inputs from information sources are received. One or more search results associated with the...
A blocking local sense synchronization barrier is provided. The local sense variable is not processor private or global, but truly local to the synchronization barrier function. Safe deletion is provided by making sure the last operation a thread performs on a barrier is a write. Just before returning, threads incre...
A method and apparatus determine a likelihood of a speech state based on an alternative sensor signal and an air conduction microphone signal. The likelihood of the speech state is used, together with the alternative sensor signal and the air conduction microphone signal, to estimate a clean speech value for a clean...
PERFORMANCE ENHANCEMENTS FOR VIDEO CONFERENCING
ABSTRACT
A conference server may request a key frame from a conference participant in response to determining that the conference participant should become a most active participant and the conference server may make the conference participant the most active partici...
TWO-WAY AND MULTI-MASTER SYNCHRONIZATION OVER WEB SYNDICATIONS
ABSTRACT
Synchronization of a web syndication item over a Really Simple Syndication (RSS) format between a publisher and a subscriber. The publisher creates the web syndication item by including a media content associated therewith. The synchronization...
MULTI-DVR NODE COMMUNICATION ABSTRACT
Multi-DVR node communication is described. In an embodiment, television-based client devices are each a node of a multi-DVR system where the nodes are implemented for communication with each other. A node status can be communicated from a node of the multi-DVR system to the tel...
LOCATING SERVICES USING COMPILED SCOPES
ABSTRACT
In a computing environment incorporating multiple computing systems capable of intercommunication, a computing system assists in locating a service offered by other computing system(s). For instance, upon receiving a query that represents a scope of a service to be ...
APPLICATION PROGRAM INTERFACE TO MANAGE MEDIA FILES
ABSTRACT OF THE DISCLOSURE
An application program interface to manage media files may be described. An apparatus may comprise a media processing sub-system having a processor and a memory. The memory may store an application program interface software library hav...
AUTOMATICALLY GENERATING WEB FORMS FROM DATABASE SCHEMA
ABSTRACT
The present invention extends to methods, systems, and computer program products for creating Web forms with automatically generated links. A database mapping for a database is accessed. One or more dynamic queries for querying a database are automat...
REMOTING SUB-PIXEL RESOLVED CHARACTERS
ABSTRACT
Remoting sub-pixel defined text. Text is remoted at sub-pixel precision in a computing environment including a terminal server and a terminal client. At a terminal server text definitions are generated. The text definitions include character definitions defining char...
SENSITIVE ROUTING
Sensing, learning, inference, and route analysis methods are described that center on the development and use of models that predict road speeds. In use, the system includes a receiver component that receives a traffic system representation, the traffic system representation includes velocities fo...
AUXILIARY OUTPUT DEVICE AABSTRACT
Techniques are provided for notification regarding communications. An incoming communication for a user of a primary device is received. An auxiliary device is provided for the primary device. Filter criteria for the auxiliary device is provided. A determination is made as to wheth...
The present invetion extends to methods, systems, and computer program products for facililating inicr-proximity communication within a rendezvous federation. Nodes maintain collateral ring set entry tables [hat include collateral rings and corresponding entry nodes into the collateral rings. Nodes can exchange c...
ONLINE KEYWORD BUYING. ADVERTISEMENT AND MARKETING
ABSTRACT
A computer-implemented method of providing keyword purciiasing assistance a business for online marketing or advertising includes the step of identifying or service offerings, of the business, to be targeted with the online marketing advertising. Onc...
DECLARATIVE MANAGEMENT FRAMEWORK ABSTRACT
User productivity can be facilitated by providing an interface between a high-level intent and low-level settings that should be configured to achieve the intent. The intent can be expressed in declarative language. The intent can be verified to determine if it conforms to ...
Techniques to manage an electronic program guide may be described. An apparatus may include a display to display an electronic program guide comprising a dynamic scaling grid. The apparatus may also include a media processing device coupled to the display. The media processing device may comprise a processor and an ...
N
Methods and architectures for context-sensitive reminding and service facilitating are disclosed. The architectures monitor user context and activity, senses or infers relevant reminders, goals, such as those that come from a growing need of the user that should be fulfilled, and computes best reminders, and reco...
For interlaced B-fields or interlaced B-frames, forward motion vectors are predicted by an encoder/decoder using forward motion vectors from a forward motion vector buffer, and backward motion vectors are predicted using backward motion vectors from a backward motion vector buffer. The resulting motion vectors are ...
A runtime environment of a computer system is provided that creates first and second scheduler instances in a process. Each scheduler instance includes allocated processing resources and is assigned a set of tasks for execution. Each scheduler instance schedules tasks for execution using the allocated processing res...
Online ad hosting (e.g., hosting ads from one domain on a webpage from a different domain) is accomplished using a cross-domain frame (e.g., an inline frame (IFrame)), a secure inter-frame communications channel, and a source code interface (e.g., a set of application program interfaces (APIs)). That is, a cross-dom...
Techniques to manage a whiteboard for multimedia conference events are described. An apparatus may comprise a whiteboard manager component operative to manage whiteboard recording, image processing and reproduction operations for a multimedia conference event. The whiteboard manager component may comprise an image q...
Various techniques and tools for coding and decoding interlaced video are described, including (1) hybrid motion vector prediction for interlaced forward-predicted fields, (2) using motion vector block patterns, (3) selecting between dominant and non-dominant polarities for motion vector predictors, (4) joint coding...
[0052] Technologies are described herein for displaying a list of file attachments associated with a message thread an email application. The messages associated with the message thread are identified, along with any file attachments attached to those messages. An aggregated attachment list is generated containing a...
A coupled peripheral device (102) output is associated to a peripheral device (102) input, A descriptor configuration input is received from the coupled peripheral device describing attributes of the peripheral device and an association between the peripheral device input and output. Peripheral device classes of ass...
Technologies are described herein for a user interface uniting two primary components, a list view and a reading pane, within a message reading application. Technologies are also described for synchronizing status and parameters between the two primary user interface components. In particular, a user interface for r...
A source device permits a user of a remote device to access a protected file on the source device when the user of the remote device has a right to access the protected file. The user locates the protected file on the source device using the remote device and accesses the protected file using a media player on the r...
A "Keyframe Stitcher" provides an efficient technique for building mosaic panoramic images by registering or aligning video frames to construct a mosaic panoramic representation. Matching of image pairs is performed by extracting feature points from every image frame and matching those points between image pairs. Fu...
APIs discussed herein promote efficient and timely interoperability between hardware and software components within the media processing pipelines of media content players. A PhysMemDataStructure API facilitates a hardware component"s direct access to information within a memory used by a software component, to enab...
Methods and systems are provided for cryptographically protecting secure content in connection with a graphics subsystem of a computing device. Techniques are implemented to encrypt the contents of video memory so that unauthorized software cannot gain meaningful access to it, thereby maintaining confidentiality. Mo...
A technology for identifying design issues during an electronic form generating process is disclosed. In one method approach, a user selected runtime environment to be applied to an electronic form is received. A form design check is performed on the electronic form. A reporting object generates a list of design iss...
Systems and methods are provided for controlling texture sampling in connection with computer graphics in a computer system. In various embodiments, improved mechanisms for controlling texture sampling are provided that enable 3-D accelerator hardware to greatly increase the level of realism in rendering, including ...
A method to synchronize and upload an offloaded network stack connection between a host network stack and peripheral device is presented. A state object for each layer in the stack is sent to the device that includes state variables that are classified as a constant, a cached variable handled by the host, or a deleg...
Methods and systems are provided to allow users that are authenticated by a trusted external service to gain controlled levels of access to selected local computing resources without requiring the user to also have conventional access control capabilities for the resources.
A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ...
A dynamic software provisioning system allows provisioning software on a number of different computing devices based upon a desired business process. The dynamicsocwa provisioning system allows a user to request usage of the operating system for a specific period of time, for a specific amount of usage, or in any ot...
Methods, systems and architectures for processing renderable digital
content are described. The various embodiments can protect against unauthorized
access or duplication of unprotected content (i.e. decrypted content) once the
content has reached a rendering device such as a user's computer. A flexible
...
The present invention relates to a system and method for providing dynamic wizard interfaces to end users. In one embodiment, a client device retrieves a container encapsulating a number of packages utilizing a self-describing data format from a remote server. A wizard engine on the client, device interprets the con...
A communication icon represents a shared connection allowing members of an online group to interact with each other and participate in different activities together. The icon through which the group interacts resides on each group member's desktop and 5 has many attributes including click activation modes and dr...
The present invention provides a system and method for controlling whether a user may access certain Internet sites when using a computer. The system and method are carried out on a personal computer having a local ratings cache, a cache
refresher, a local ratings interpreter and an allow-block list. When th...
A system and method for enabling validation of an extensible markup language (XML) document having elements associated with two or more schemata where elements of each schema may be arbitrarily nested within elements from the other schema and each set of elements remains valid within it"s own schema. Elements of the...
A system for providing reputation information includes a relying party programmed to receive a security token including a claim with reputation information associated with a party, and the relying party is further programmed to utilize the reputation information when deciding whether to transact with the party A me...
Abstract Machine Translation in Instant Messaging Applications
An instant messaging translation plug-in interacts with an instant messaging program to intercept incoming messages and forward these messages to a language translation service. The plug-in then displays a translation received from the service along wit...
Techniques for automatically generating a form associated with a spreadsheet table are disclosed herein. Such a form may have data entry fields that correspond to data attributes listed on the spreadsheet table. The form may be associated with the spreadsheet table by means of a user interface, such as an icon or ot...
ABSTRACT RSS HOSTABLE CONTROL
The embodiments described above utilize and leverage RSS to enable a user to interact more easily with different types of data, or data from different sources that are available over the web. In accordance with at least some embodiments, a hostable and/or customizable control is provid...
A method and computer-readable medium are provided for selectively importing and exporting data in an electronic document. An import application program interface (API) may be implemented to import content from a hierarchically structured document, such an XML file. The import API works in conjunction with a parser ...
ABSTRACT
Embodiments of persistent public maciiine setting are presented. in an implementation a web service provider sign-in is provided which presents customized information for multiple users of a client device. A user interface is presented having a plurality of portions each corresponding to a particular user...
ABSTRACT
AUXILIARY DISPLAY GADGET FOR DISTRIBUTED CONTENT
[0075] Described is a technology by which a specific gadget program is installed (e.g., created) on a main host computer system that receives data (e.g., an RSS feed) from a distribution source, in which the feed data contains the information needed to inst...
ABSTRACT
DYNAMIC THRESHOLDS FOR CONDITIONAL FORMATS
Generally described, embodiments of the present invention provide the ability to itilize dynamic thresholds and dynamic threshold values when generating variable brmatting rules to be applied to a range of cells. Dynamic thresholds include, but are not imited to,...
ABSTRACT
A customizable service provider user interface is described. In an implementation, a user is logged onto a suite a web services, to which, the user has not previously logged on. A user interface is output having a plurality of portions, one or more of which are customizable by the user through use of one o...
The present invention extends to methods, systems, and computer program products for flexibly editing heterogeneous documents. Different types of documents can be organized on a universal and dynamically adjustable workspace canvas in a manner that indicates relationships between the documents. The workspace canvas ...
ABSTRACT
SERVING CACHED QUERY RESULTS BASED ON A QUERY PORTION
The embodiments contemplate a system and method for obtaining related results for a portion of a query and for generating an updated set of queries for a cache of a server. Other queries beginning with the portion of the query may be identified and obt...
A method and apparatus for managing simultaneous virtual connections with multiple wireless networks. A plurality of ports in a hardware driver may be each associated with a corresponding wireless network and maintain a unique MAC state relative to other ports. Each port may have a corresponding virtual NIC that com...
Implementations of the present invention allow software resources to be duplicated efficiently and effectively while offline. In one implementation, a preparation program receives an identification of a software resource, such as a virtual machine installed on a different volume, an offline operating system, or an a...
Implementing synchronization among threads in a workflow. A memory area stores a plurality of work items in a scheduler queue. The work items are associated with an activity in the workflow, and each work item is associated with a thread. A processor is configured to assign a synchronization handle to each of the wo...
An query language with support for rich data types is provided. A system may comprise an application configured to generate queries according to the query language. Also provided is a platform for handling queries that are generated according to the provided query language. The platform generally comprises an object...
A data access architecture is provided that includes a mapping architecture for mapping data as may be used by an application to data as persisted in a database. The mapping architecture makes use of two types of mapping views - a query view that helps in translating queries and an update view that helps in translat...
The invention describes a system for authoring and executing wizards. New wizards are created either from existing structured content like HELP files, KB articles etc or are created using simple authoring tools that target authors with. expertise of applications (not requiring development skills). The wizards work o...
A virtual list view in a web application is dynamically updated such that a uses can seamlessly and manage the presented data despite the inherent latency involved with the web. Data associated with the virtual list view is downloaded in chunks and view as user scrolls. By coupling the user"s scrolling and particula...
An alert search mechanism is used with search engines such as a crawler to search for desired documents and or resources. Particular documents are found by using search queries The search mechanism track values of a set of relevant properties in queries. Whenever a document is searched for by the system, the values...
Serialized datas from broadcast services is provided to a broadcast server for transmitting to one or more client devices. The serialized data may correspound to shared data, or control data. Data is scheduled for transmmission based on weighted priorities inculding quality of service metrics. The transmission fr...
ABSTRACT
PEER-TO-PEER CONTACT EXCHANGE
A system may publish authenticated contact information in a publicly available index store, retrieve the contact information, and validate it. The claimed method and system may provide a client-based, server optional approach to publishing. The publicly available index store ...
Systems, methods, and computer-readable media for calculating charges for advertisements are provided. The historical performance (such as CTR) of an online advertisement is utilized to calculate accurate performance prediction, in turn used to calculate the current cost per selection (click-through) of the advertis...
ABSTRACT
ENABLING NETWORK DEVICES TO RUN MULTIPLE CONGESTION CONTROL ALGORITHMS
Creating different congestion control modules (CCMs) that can be plugged into a network communications stack (e.g., a TCP/IP stack). Software abstractions defining transport control events, congestion control algorithms and other infor...
A computer with a software defined radio that can be configured based on a wireless technology specification. The computer may negotiate with a second computer that also includes a software defined radio to define a set of wireless technology specifications and trigger events indicating when each of the wireless tec...
ABSTRACT
CONTENT EDITING PROTECTED VIEW
A software application window shows current content in a content region and navigation information in a plurality of navigation regions, with the navigation regions showing contextual information for the current content, as well as for related content. A request to hide navi...
ABSTRACT EDITING TEXT WITHIN A THREE-DIMENSIONAL GRAPHIC
A two-dimensional text editing mode is used when editing three-dimensional text. Once the three dimensional text is selected for editing a two-dimensional text editing mode is automatically entered such that the user may easily edit the text. The two dimensio...
ABSTRACT
GLOBAL PROVISIONING OF MILLIONS OF USERS WITH DEPLOYMENT
UNITS
Described herein is technology for, among other things, global provisioning of a service. The technology involves a provisioning server obtaining location information for a client. The provisioning server determines an appropriate deployment ...
ABSTRACT OF THE DISCLOSURE LAUNCHING HYPERVISOR UNDER RUNNING OPERATING SYSTEM
The launching of a hypervisor after there is already a running operating system. The operating system itself may launch the hypervisor. The running operating system may be used instead of the hypervisor to discover the physical resources...
ABSTRACT SYNCHRONIZING STRUCTURED WEB SITE CONTENTS
Techniques to synchronize structured web site content are described. An apparatus may include a server having a server synchronization module to identify structured content types shared by the server and a client, and synchronize structured content corresponding t...
ABSTRACT
BOOTING AN OPERATING SYSTEM IN DISCRETE STAGES
A computing device is configured to assemble and boot an operating system in stages A primary boot image is first obtained teat includes enough of the operating system to support basic networking. Once the primary boot image is obtained, either through downl...
ABSTRACT
EFFICIENTLY FILTERING USING A WEB SITE
A technology for efficiently filtering using a web site is disclosed. In one method approach, distinct filtering values based on a type of data selected from a web page associated with a web site are received without requiring retrieval of filtering values that are u...
ABSTRACT
ENHANCED NETWORK COMMUNICATION
Aspects of the present invention are directed at software systems for sending a data item from a sending client to a receiving client. In accordance with one embodiment, software components are provided that include a command handling component and a processing component. Th...
ABSTRACT
A credential security support provider (Cred SSP) enables any application to securely delegate a user's credentials from the client, via client side Security Support Provider (SSP) software to a target server, via server side SSP software. The Cred SSP provides a secure solution based in part upon a set o...
COLLISION AVOIDANCE FOR TRAFFIC IN A WIRELESS NETWORK
ABSTRACT
Techniques for avoiding collision of traffic in a wireless network are described. A station detects for synchronization of its traffic with traffic of other stations. The station may detect for synchronization based on, e.g., percentage of first tran...
CONVERTING MACHINES TO VIRTUAL MACHINES
ABSTRACT OF THE DISCLOSURE Physical (or prior virtual) machine volumes can be converted to virtual machines at a virtual machine host while the physical machines are running. In one implementation, a volume shadow copy service can be used to create an application (and/or file...
ABSTRACT DEPLOYING VIRTUAL MACHINE TO HOST BASED ON WORKLOAD
CHARACTERIZATIONS
To determine whether to deploy a candidate VM to a candidate host, taking into consideration resources available from the candidate host and resources required by the candidate VM, a sub-rating is calculated for each of several resource...
An adaptive customer assistance system that can serve as an integrated online and offline
help platform for a suite of software products is provided. The assistance system includes a customer-interaction interface and a data management component and a download management component for distributed customer interacti...
Large mesh deformation using the volumetric graph Laplacian is described. In one aspect, information is received from a user, wherein the information indicates how an original mesh is to be deformed. The original mesh is then deformed based on the information and application of a volumetric differential operator to ...
Systems, methods and computer storage media for operating a scalable computing platform are provided. A service description describing a requested service is received. Upon receiving the service description a determination of the required resources and the available resources is made. An instance description is prod...
A facility for creating shareable pinboard collections is described. In various embodiments, the facility receives an indication of a query defining a term for searching, employs a search provider to perform a search for information items matching a criteria, receives from the search provider an indication of a resu...
ABSTRACT
A device virtualization service (DVS) is provided that uses a generalized thick resident on a mobile device to provide user interface generation support to a myriad of services providing mobile device content. The DVS abstracts device specifics from services to provide device independent user experienc...
AUTO-SUBSCRIBING TO SYNDICATION FEEDS USING CONTACT LISTS
ABSTRACT
An application executes on a client device to automatically subscribe a user to a particular syndication feed. In at least some instances, the user can be preliminarily unaware that they have been subscribed to the feed. In at least some embodiment...
A method for formatting a chart, the method comprising:
receiving (310) a standard chart;
providing (315) a plurality of chart elements pictorially, wherein each of the plurality of chart elements represents a chart modification for use in changing the standard chart;
modifying (325) the standard chart with one o...
HYBRID MEMORY DEVICE WITH SINGLE INTERFACE
ABSTRACT
Described is a technology by a memory controller is a component of a hybrid memory device having different types of memory therein (e.g SDRAM and flash memory), in which the controller operates such that the memory device has only a single memory interface wit...
Systems and methods for detecting people or speakers in an automated fashion are disclosed. A pool of features including more than one type of input (like audio input and video input) may be identified and used with a learning algorithm to generate a classifier that identifies people or speakers. The resulting class...
BUCKET-BASED SEARCHING ABSTRACT
An item discovery module (IDM) is described that allows a user to find one or more desired items within a store of candidate items. In operation, the user enters a search selection, upon which the IDM determines a collection of matching items. The IDM groups the matching items into o...
MANAGING FAMILY INFORMATION ABSTRACT OF THE INVENTION
Family information adaptable for groups with multiple members using multiple devices in multiple locations can be managed Extensible and customizable types of family information, such as notes, tasks, lists, and appointments for specific family activities may b...
A customized form is provided for entering parameters associated with a query. A user may desire to modify a report resulting from a query to a database. To enter the parameters for modification, a customized form is displayed to the user. The customized form allows for entry of the parameters according to prompts t...
Emails modeled as conversations are displayed in a user interface that enables users to read and interact with the emails within a conversation intuitively. Conversation breaks, such as those in an in-reply-to relationship between messages, are presented utilizing extra spaces between displayed message parts, excerp...
Techniques for XML (Extensible Markup Language) web feeds for web access of remote resources are described. In one embodiment, a method includes obtaining information regarding one or more available resources from one or more resource hosts, rendering the information regarding one or more available resources into an...
Content and metadata associated with the content may be provided to a number of users. The content may be displayed on a display device while the metadata may be transmitted to a remote device corresponding to a receiving user. The user may further request desired information or metadata pertaining to the content an...
System, methods, and computer-storage media are provided for selecting advertisements specifically targeted to a first end user. Information is provided by a second end user that describes characteristics and interests of the first end user. The information provided by the second user is used to select advertisement...
A method for interpreting ambiguous click events in relation to click targets on a touch screen display disposed at respective click target locations includes detecting a touch at a touch location and determining whether the touch location corresponds to a click target location. The method also includes searching fo...
METHODS AND ARCHITFXTURE FOR PERFORMING CLIENT-SIDE DIRECTED
MARKETING WITH CACHING AND LOCAL ANALYTICS FOR ENHANCED
PRIVACY AND MINIMAL DISRUPTION
ABSTRACT OF THE DISCLOSURE
Methods and architectures are disclosed for performing directed marketing in client applications. Operating systems and applications such ...
INTER-PROXIMITY COMMUNICATION WITHIN A RENDEZVOUS FEDERATION
ABSTRACT
The present invention extends to methods, systems, and computer program products for facilitating inter-proximity communication within a rendezvous federation. Nodes maintain collateral ring set entry tables that include collateral rings and...
A computer system suitable for archiving data with a corresponding application program in a virtual application environment is presented. The computer system includes a processor, a memory, and storage. The computer system also includes an operating system, data to be archived, and an application program that corres...
System(s) and method(s) are provided to drive early adoption and retention of disparate sources of funding and financing an award program, with application to a consumer compensation scheme subsidized through advertisement revenue. A component that manages advertisement revenue, or received funds, allocates a portio...
Various embodiments utilize an auto-complete module to expose a website"s content structure. In at least some embodiments, a user can take an action within an application and, responsively, the auto-complete module can retrieve a site index file or site map and use the site index file or site map to display the webs...
Technologies are provided for completing e-commerce transactions over a P2P communications channel. According to one method, a secure P2P communications channel is established between a buyer node and a seller node. A request to perform an e-commerce transaction is transmitted from the buyer node lo the seller node....
Wireless-enabled mobile communication devices and network nodes are configured for participation in wireless, location-based e-commerce activities. Consumer:; using mobile communication devices in the vicinity of physical retail locations receive opportunities to engage in e-commerce, using their mobile communicatio...
Coding of spectral data by representing certain portions of the spectral data
as a scaled version of a code-vector, where the code-vector is chosen from either a fixed predetermined codebook or a codebook taken from a baseband. Various optional features are described for modifying the code-vectors in the codebook a...
RESOLUTION
Embodiments of a collaborative authoring environment enable a user to resolve editing conflicts arising when synchronizing a user copy of a data file with a master copy of the data file. Content updates may be synchronized separately from metadata updates. Metadata updates may be synchronized automatical...
An exemplary computer-implementable method (300) transforms or "immunizes" information to reduce or eliminate risk of exploitation of a known vulnerability of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed informati...
An ad hoc network identifier may be received, for example, at an ad hoc network convergence module. One or more ad hoc network parameters may be generated as a function of the ad hoc network identifier. Each of a group of computers attempting to form an ad hoc network identified by the ad hoc network identifier may ...
Various embodiments related to providing user feedback in an electronic entertainment system are disclosed herein. For example, one disclosed embodiment provides a method of providing user feedback in a karaoke system, comprising inviting a microphone gesture input from a user, receiving the microphone gesture input...
Computer-readable media, computerized methods, and computer systems for intuitively invoking a panning action by applying a user-initiated input at the content region rendered at a touchscreen interface are provided. Initially, aspects of the user-initiated input include a location of actuation (e.g., touch point ...
Techniques to manage digital telephones are described. An apparatus may comprise a digital telephone management component having a telephone interface module operative to receive security information in the form of a personal identification number (PIN) for an operator or device. The digital telephone management com...
Various technologies and techniques are disclosed for previewing and managing scheduling opportunities. A scheduling opportunity is received. A context of one or more surrounding appointments to the scheduling opportunity is retrieved. The scheduling opportunity is displayed with the context of the surrounding appoi...
Various embodiments provide a mapping layer to translate DRM system requirements from one DRM system, such as a source system, to another DRM system, such as a target system. In at least some embodiments, DRM system requirement translation is performed using a signed data structure that maps DRM system requirements ...
A data partitioning interface provides procedure headings to create data partitions for processing data elements in parallel, and for obtaining data elements to process, without specifying the organizational structure of a data partitioning. A data partitioning implementation associated with the data partitioning in...
A host computing device (114)/transient storage device (102) (TSD) interface eliminates the need for a full directory crawl of the storage volume on the TSD to maintain a metadata database (112). The metadata database (112) is incrementally updated instead of being completely regenerated on every connection between ...
ABSTRACT
The invention is generally directed to a method for selecting a font that uses a mark-up language document to group together multiple pre-existing fonts into a single font family or "virtual font." The mark-up language document includes rules regarding the conditions under which individual fonts within the...
Extension fields (212) in a provisioning certificate (204) in the authentication silo (200) of a transient storage device (TSD)(100) are used to provide secure configuration options for TSDs while operating within the constraints of the current IEEE 1667 standard. Immutable values for configurable settings of the st...
A method of extending user profile (300). A user specific data related to an application is received (320) and stored for integration with a user profile. A template for the application is received (330) and stored. The template tailors the user specific data based on aesthetic preferences of the user to generate a ...
A UI (user interface) 120 for gestural control enhances the navigation experience for the user by preventing multiple gestures from being inadvertently invoked at the same time. This problem is overcome by establishing two or more categories of gestures. For instance, the first category of gestures may include gestu...
Methods and computer-readable media are provided for performing a federated search using library description file to locate multiple data sources. For a federated search, a library description can be used to describe a set of data sources searched, and may further be used describe how search results should be presen...
Techniques are provided to allow developers to use a unified application programming face to access multimedia data from different containers and in different formats
FIG.2
Techniques for reconciliation and remediation of messages sent by a server for storage in an archive are described. Some techniques may comprise receiving a message to be reconciled corresponding to a message sent by a server to be stored in an archive. The received message may be categorized for reconciliation, and...
An out-space actuator is selected to access an out-space user interface (UI) for a document editor program. An out-space actuator associates with an in-space UI having a displayed document. When the out-space actuator is selected, out-space UI is displayed to include expanded feature selection surface. The out-space...
The present system includes a bridge (or adapter) that connects two synchronization endpoints over two different networks. The bridge first receives information to be synchronized and generates metadata to form it into messages transported over the first network according to a first protocol. A gateway receives the ...
An out-space actuator is selected to access an out-space user interface (UI) for a document editor program. An out-space actuator associates with an in-space UI having a displayed document. When the out-space actuator is selected, out-space UI is displayed to include expanded feature selection surface. The out-space...
Visual map items may each be constructed and placed in position using logic defined by a map view component corresponding to each visual item, where that logic may depend on one or more values populated into parameter(s) of the map view component. Some of those parameter values may correspond to known map model para...
A reputation system used in a social networking ser vice (325) provides for recognition for its members (334) in the form of badges (410. 418, 425) that can be displayed on the members" profile pages (405) as a way of indicating a particular status. In various illustrative examples, a "tastemaker" badge (425) may be...
Applications operated within a virtual environment may be organized into a package containing various software components. Each software component or resource may have a specific name and other metadata, including a designator for overwriting or modifying the component. A policy may define how any changes to specifi...
A system and method for creating and conducting presentations on a surface may include an authoring mode, a preprocessing mode and a presentation mode. During an authoring mode, a user may create a surface presentation. In response to a command to play the created presentation, the system enters the preprocessing mo...
An advertising system is provided that interacts with end-users and advertisers to facilitate the generation and delivery of advertisements that are specifically targeted to end-users" product interests and needs. An end-user interacts with the advertising system to provide a product request representing the end-use...
An exemplary method includes hosting a service at a data center, the service relying on at least one software component developed according to a programming model and the data center comprising a corresponding programming model abstraction layer that abstracts resources of the data center; receiving a request for th...
Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modem networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be...
Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modem networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be...
WEB PAGE PRIVACY RISK DETECTION
Various embodiments enable detection of third party content sources that may pose a privacy risk to a user. In at least some embodiments, webpages navigated to via a browser can be processed to identify third party content sources that provide content for the webpages. Data may be ...
Utilizing a scrollbar handle for both zooming and panning a display comprising items in a user interface may be accomplished by monitoring an input device's interaction with the scrollbar handle. If the scroll handle is dragged in a direction away from an orientation of the scroll handle in the scrollbar, a display ...
The techniques disclosed herein integrate a social aspect into avatar modification. Multiple users may access a virtual environment that allows users to modify the user's avatar. The users in the application may be any combination of remote and local players. The users' avatars may be associated with the same applic...
Techniques and tools for skip modes in encoding and decoding of inter-layer residual video are described. For example, an encoder encodes multiple macroblocks of a picture of inter-layer residual video. For a current macroblock that is skipped, the encoder selects a skip mode from among multiple available skip modes...
Architecture for dynamically tracking information about a first-time or inactive user to a website and expeditiously presenting targeted content back to the user to maintain the user interest in the website. A visceral connection is created with the user based on immediately relevant content and functionality, and w...
A computer program executable on a portable electronic device having a touch screen sensor is provided. The computer program may include an input mode switching module configured to receive a mode switch user input to switch between a direct input mode and a relative gesture recognition mode. The computer program ma...
[0030] A method of processing touch input includes recognizing a first touch input, and then, after conclusion of the first touch input, recognizing a second touch input temporally separate from the first touch input. The temporally separate combination of the first touch input and the second touch input is then tra...
The routing of requests in a shared hosting environment. The shared hosting environment includes a network farm of servers, each capable of processing the request corresponding to the host name. When a request is received, a router determines whether or not there is already a host name affinitization of subset of th...
[0043] A method of presenting a hierarchically-organized collection of
objects includes displaying a first-level set of first-level objects in a prominent scale; and while displaying the first-level set of first-level objects in the prominent scale, displaying one or more second-level sets of second-level objects i...
Embodiments of the present invention relate to systems, methods and computer storage media for transforming data defining a first data schema to data defining a second data schema by way of a declarative transformation. The transformation includes identifying data defining the first data schema. A declarative transf...
Embodiments of the invention provide techniques for ensuring that the contents of a non-volatile memory device may be relied upon as accurately reflecting data stored on disk storage across a power transition such as a reboot. For example, some embodiments of the invention provide techniques for determining whether ...
A media system is described including a graphical display that presents an iconic menu and a textual menu. The iconic menu includes a plurality of icons arranged in a two-dimensional collection, where each icon provides access to media content. The textual menu includes a structured textual list that provides access...
The provision of a haptic input with an integrated touch screen input is disclosed. One disclosed embodiment provides a control apparatus for an electronic device. The control apparatus comprises a haptic input mechanism configured to provide haptic feedback responsive to a push input, and an integrated touch sensit...
ABSTRACT ADVERTISING-DRIVEN THEME PREVIEW AND SELECTION
[0065] An advertisement is associated with an advertiser-sponsored theme. An
application generates a page that includes the advertisement. If a first user input event is detected with respect to the advertisement, the advertiser-sponsored theme is temporari...
Targeted advertising using object identification techniques is described. In an implementation, an object is identified by a client that is placed on a surface of the client. An advertisement is located that corresponds to the identified object and is output.
Methods, systems, and computer-readable media for automating the expression of functional aspects of a target service to a client service via a vehicle referred to herein as a contract are provided. Generally, the methods are performed in the context of a distributed computing environment configured to underlie oper...
The described implementations relate to dynamically painting user-controls. One method dynamically determines a highlight color of a user-control under a cursor on a graphical user-interface. The Method also paints at least a portion of the user-control with the highlight color.
A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity. The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising s...
An acoustic pass through is provided in telephone handsets for sounds transmitted from a hands free operation speaker laid out underneath the handset. One or more cutouts in a middle portion of the handset in various shapes such as rectangular, round, elliptical, and similar allows enhanced sound quality when the sp...
A programmable effects system for graphical user interfaces is disclosed. One embodiment comprises adjusting a graphical user interface in response to a tilt of a device. In this way, a graphical user interface may have viewable content not shown in a first view, where the viewable content may be displayed in a tilt...
Motion adaptive user interface service is described. In embodiment(s), a user interface can be displayed on an integrated display of a device when an application is executed on the device. Context data associated with movement of the device can be received and used to determine an enhancement of the user interface f...
A block transform-based digital media codec achieves faster performance by re-mapping components of the digital media data into vectors or parallel units on which many operations of the transforms can be performed on a parallel or single-instruction, multiple data (SIMD) basis. In the case of a one-dimensional lappe...
Video conference rate matching may be provided. A video conference server may receive video source streams from clients on a video conference. The server may analyze each client""s capabilities and choose a video stream to send to each client based on those capabilities. For example, a client capable of encoding and...
Rendering RSS subscriptions on a calendar may be provided. First, an RSS feed may be received by an RSS client. The RSS feed may contain a data item associated with an event date. A recipient computer running an electronic calendar program may display the received data item on the surface of an electronic calendar. ...
A system, method, and medium are provided for presenting a user-interface to a user during a search session that includes information about the user""s search history during that search session. A search session is instantiated, and search queries, search results, user selections of search results, and other informa...
Subscriptions in a video conference may be provided using multiple bit rate streams. A video conference server may receive video streams from each client in a video conference and may receive subscription requests from each client. The subscription requests may include requests to see video streams from specific oth...
A user interface that may utilize two different command routing protocols may be provided. The two different command routing protocols may comprise a first command routing protocol and a second command routing protocol. The first command routing protocol may use a pull model. The second command routing protocol may ...
A data visualization interactivity architecture may be provided. The architecture may allow the creation of a data visualization, such as a chart, and may expose an interactive feature on the visualization. The architecture may provide integration with multiple rendering platforms. When a user selects the exposed fe...
Techniques involving control function gestures are described. In an
implementation, a control function is identified in response to gesture input at a touch screen of the remote control device. Execution of the identified control function is initiated a client device that is communicatively coupled to the ...
An extensible activation exploit scanner may have a modular structure, such that
capabilities of the activation exploit scanner may be updated easily. The extensible activation exploit scanner may include an exploit data file, at least one detection module, at least one response module, and a base scanner. The expl...
ABSTRACT
PROVIDING RELEVANT ADVERTISMENT OR OTHER CONTENT BASED
ON A COMMUNICATIONS IDENTIFIER
Described is a technology by which a communications identifier such as a telephone number is used in selecting relevant content (e.g., an advertisement) for outputting as audible and/or visible information to a destinat...
ABSTRACT CLIENT SIDE ATTACK RESISTANT PHISHING DETECTION
A phishing detection client component and method is provided. The component can be employed as part of a system to detect and, optionally prevent phishing attacks. The phishing detection client component can provide password reuse event report(s), for exampl...
Textual preview of a voicemail is generated and provided through email or similar media to users along with the audio version. Transcription of the textual version, as well as additional capabilities such as actionable terms, playback-jump, switching between text and audio versions, direct or metadata based searchab...
One or more pages are displayed on a touch display. A page-turning gesture directed to a displayed page is recognized. Responsive to such recognition, a virtual page turn is displayed on the touch display. The virtual page turn actively follows the page-turning gesture. The virtual page turn curls a lifted portion o...
Storage devices can provide for hardware encryption and decryption of data stored by them. The hardware cryptographic functions can be applied with reference to cryptographic information of a communicationally, and physically, separable key device. Disconnection of the separable key device can render encrypted data ...
Tools and techniques for indexing and searching dynamically changing search corpora are provided. These tools may receive requests to upload documents over a network to an online document repository, and present a user interface to facilitate the upload. The user interface may include devices that are responsive to ...
Touch sensitive computing systems and methods are provided. The touch sensitive computing device may include a touch sensitive display configured to receive a touch input. A gesture recognition module may be coupled with the touch sensitive display, and may be configured to receive the touch input. The gesture recog...
ABSTRACT
Detailed herein is a technology which, among other things, identifies and provides an audience-appropriate version of a document, upon request. In one approach to this technology, a request for the document is received at a document-specific access point associated with that document. This document reques...
A touch-sensitive electronic display device including one or more touch-sensitive display screens and interface software. The touch-sensitive display screen(s) and interface software are configured to be responsive to touch inputs and, in the case of a multi-screen workspace, the interface software is operable to al...
Supporting a plurality of content protection systems in a single container file. The protection systems share an encryption method which is accessible from a sample encryption box in the file. Each of the protection systems stores, in a protection system header box, information for decrypting the content in accordan...
NAME CHALLENGE ENABLED ZONES
ABSTRACT OF THE DISCLOSURE
[0031] A method and system for implementing name challenge enabled zones is
described herein. A DNS server receives an update from a client device. If the DNS server hosts an authoritative zone for the update, the DNS server determines whether there is a rec...
ABSTRACT
TWO TIERED TEXT RECOGNITION Systems and methods that exploit unique properties of a language script (e.g., condition joining rules for Arabic language) to enable a two tier text recognition. In such two tier system, one tier can recognize predetermined groups of linked letters :hat are connected based on j...
Conversation rights for multi-modal communications are managed and enforced in an enhanced communication system. Through physical and/or software components, rights are assigned to a communication session and related components upon user request. Permitted participants of the session are provided access tools such a...
Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user"s interactions with the computing system. The technology may increase or decrease an authentication or authoriz...
Generally described, the present invention is directed at identifying malware. In one embodiment, a method is provided that performs a search for malware during the boot process. More specifically, the method causes a software module configured to scan for malware to be initialized at computer start up. Then, in res...
A data analysis program receives a selection of data fields defining multiple row header areas and/or multiple column header areas for display in a summary table. Data is read from a data source containing values for the data fields and transformed into summary level data for building the summary table. A display is...
A unified user interface ("UI") is provided that includes functionality for defining both simple and complex animations for an object. The unified UI includes a UI for defining a single animation for an object and a UI for defining a more complex animation. The UI for defining a single animation for an object includ...
Systems, methods and computer readable media are disclosed for a vectorized tile differencing algorithm for a remote desktop protocol (RDP). A server executes a CBC-variant vectorized hash algorithm that is used to produce a big key that identifies the tile, and keeps track of these big keys. Where a serial version ...
Techniques for variable resolution encoding and decoding of digital video arc described. An apparatus may comprise a video encoder to encode video information into a video stream with a base layer and an enhancement layer. The base layer may have a first level of spatial resolution and a first level of temporal reso...
Portions of content are transformed into portions of rendered content. While the portions of the content are being transformed into portions of the rendered content, each discrete portion of the rendered content can be provided to the application program after that portion is completed.
Fig. 1
...
A system, method, and computer-readable medium for providing a traffic information service user with traffic information adaptive to the user"s travel are described. The user"s origin information, such as departure location and departure time, are identified. Upon identifying the user"s origin information, the user"...
A first device discovers the capabilities of a second device. The first device determines which of the first device and the second device is to execute a controlling boot image based at least in part on the capabilities of the first device and the second device. A first boot image is executed by the first device whe...
Architecture for correcting incorrect recognition results in an Asian language speech recognition system. A spelling mode can be launched in response to receiving speech input, the spelling mode for correcting incorrect spelling of the recognition results or generating new words. Correction can be obtained using spe...
A computing system provides a graphical user interface having hierarchically- organized control galleries. The computing system displays the graphical user interface on a display device. The graphical user interface contains a document area and a control ribbon. The document area contains at least a portion of a doc...
A database server application program is provided that is configured to provide a
programmable interface into a database application by way of database services uniform
resource locators (URLs). A database services URL utilized by the database application
can be updated programmatically by program code executing ...
A system is disclosed for media content search and retrieval, and a virtual television channel capable of using that system. A first aspect of the present system relates to a media download control engine which enables a client device with limited capabilities to play media content which comes from a website in a fo...
Conserving call logic during hand off may be provided. First, a call may be received at a first server. Next, the first server may determine that it cannot handle the call. Then the call may be transferred by the first server to a second server with enough information so that the second server can take up the call w...
Authentication is widely used to protect consumer data and computing services, such as email, document storage, and online banking. Current authentication models, such as those employed by online identity providers, may have limited options and configurations for authentication schemes. Accordingly, as provided here...
Column organization of content is described. In an implementation, a mobile communications device configures a user interface to include a plurality of representations of content arranged according to a plurality of columns that permits navigation between first and second said columns upon detection of a gesture inp...
As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network connection. A proxy server is installed on a first computing device and shared encryption keys are generated for the first device ...
Computer-readable media and computerized methods for governing treatment of digital communications (e.g., emails and instant messages) upon identifying the communications as potentially phishing emails are provided. A service provider is employed to control behavior of an account that is assigned to an intended reci...
The present application relates to network configurations and specifically to scalable load balancing network configurations. One implementation includes an external client coupled to a scalable load balancing system. The scalable load balancing system includes a load balancing layer that is configured to encapsulat...
Functionality is described by selecting a channel in an environment in which non-privileged entities have subordinate access rights to spectrum compared to privileged entities. The functionality operates by identifying spectrum that is available to all nodes involved in communication (where the nodes are associated ...
Embodiments related to making an optic comprising a cladding are disclosed. One example embodiment comprises forming a wedge-shaped light guide having opposing first and second faces and comprising a material having a first refractive index. The embodiment further comprises applying a cladding layer to the first fac...
Techniques for generating an avatar model during the runtime of an application are herein disclosed. The avatar model can be generated from an image captured by a capture device. End-effectors can be positioned an inverse kinematics can be used to determine positions of other nodes in the avatar model. FIG.5
...
Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The...
Transport pipeline decryption may be provided. Consistent with embodiments of the invention, a protected message may be received and decrypted. The decrypted message may be provided to pipeline agents, such as anti-virus, anti-spam, journaling, and/or policy enforcement agents. The message may then be re-encrypted a...
Call control information regarding a phone call that a user of a mobile communications device is currently engaged in with an individual is displayed on a screen. A request to display in-call contact information is received, and in response to the request the in-call contact information regarding the individual is d...
A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associ...
Embodiments of the present invention relate to systems, methods, and computer readable media for providing to a first user of a first social-networking site information associated with a second user of a second social-networking site, where the second user is not registered at the first social-networking site. In so...
A mobile device such as a cell phone is used to remotely control an electronic appliance such as a television or personal computer. In a setup phase, the mobile device captures an image of the electronic appliance and identifies and stores scale-invariant features of the image. A user interface configuration such as...
A context-aware mobile device such as a cell phone automatically determines appropriate user interface (UI) settings to implement at different times and/or locations. A behavior of the mobile device is tracked by determining locations visited and UI settings which are manually configured by the user. Patterns in the...
A digital escrow pattern is provided for backup data services including searchable encryption techniques for backup data, such as synthetic full backup data, stored at remote site or in a cloud service, distributing trust across multiple entities to avoid a single point of data compromise. In one embodiment, an oper...
Multiple structured extension definitions can be obtained, each structured extension definition corresponding to one or more categories, and each structured extension definition being written in a software extension language. Data representing one or more registrations maintained in a format native to a registration...
A mobile communications device user interface is described. In an implementation, a method is implemented by a mobile communications device that includes outputting a user interface having a portion that is configured to accept content. When an option is selected in relation to the portion to initiate a communicatio...
Systems and methods for controlling ad delivery to mobile clients while maintaining user privacy are herein provided. One exemplary method involves a location broker service. The method includes receiving, at an ad delivery service, a location use token from a mobile client, which may be a single use token. The meth...
One or more extension registrations are received for each of multiple software components installed on a computing device. The one or more extension registrations identify the software components as providers of functionality. A record of the one or more extension registrations for each of the multiple software comp...
Persistent media playback techniques are described. In an implementation, a media player is served via a network for display by a browser of a device. Web pages are served via the network for display by the browser of the device. Each of the web pages is configured for integration with the media player so that the m...
Functionality is described for reducing the unauthorized reproduction of optical media, such as optical discs of various types. The functionality operates by adding a physical descriptor to an optical medium, forming reference descriptor information based on the descriptor, signing the reference descriptor informati...
A mobile media device user interface is described. In one or more implementations, output of a plurality of audio content is monitored by a mobile media device. Each of the audio content was received via a respective one of a plurality of broadcast channels by the mobile media device. A user interface is displayed o...
Using facial recognition and gesture/body posture recognition techniques a system can naturally convey the emotions and attitudes of a user via the user""s visual representation. Techniques may comprise customizing a visual representation of a user based on detectable characteristics deducting a user""s temperamen...
Data captured with respect to a human may be analyzed and applied to a visual representation of a user such that the visual representation begins to reflect the behavioral characteristics of the user. For example, a system may have a capture device that captures data about the user in the physical space. The system ...
ABSTRACT TABLE OF CONTENTS FOR SEARCH QUERY REFINEMENT
Computer-implemented methods and a computing system are provided for
presenting a new user interface paradigm which allows users to explore facets related to a
search query term while maintaining the original state of the search query term or staying
within ...
Detecting the absence of tagged objects near a computing device and attempting to locate the absent, tagged objects using other computing devices in a power-efficient manner. The computing device is monitored for triggering conditions. Upon occurrence of at least one of the triggering conditions, the computing devic...
A dual-mode includes a light source configured to project a structured illumination from which visible light can be filtered. The dual-mode imager also includes a detector configured to capture both the structured illumination and visible light from the scene. A temporal or spatial filter is used to selectively bloc...
A low latency streaming system provides a stateless protocol between a client and server with reduced latency. The server embeds incremental information in media fragments that eliminates the usage of a typical control channel. In addition, the server provides uniform media fragment responses to media fragment reque...
Assembling streamed content for on-demand presentation is described. In embodiments, a media asset can be requested from a content distributor, and cacheable segments of the media asset are streamed to the requesting client device. The cacheable segments are received in an initial quality display format for uninterr...
Image descriptor identifiers are used for content-based search. A plurality of descriptors is determined for an image. The descriptors represent the content of the image at respective interest points identified in the image. The descriptors are mapped to respective descriptor identifiers. The image can thus be repre...
A large format digital camera has a primary camera system configured for collecting panchromatic image data and two or more secondary camera systems configured for collecting color image data. Each of the secondary camera systems has an optical system that has a longer focal length than the optical system of the pri...
A large format digital camera has a primary camera system configured for collecting panchromatic image data and a secondary camera system configured for collecting color image data. The secondary camera system has an optical system that has a longer focal length than the optical system of the primary camera system. ...
A host device comprises a controller and connector. The host connector comprises fixed-function and multi-function pins. A first group of host connector pins comprises one or more of the fixed-function pins and a second group of pins comprises the remainder of fixed-function pins and multi-function pins. The host co...
Techniques for managing a presentation of information in a gesture-based system, where gestures are derived from a user"s body position or motion in the physical space, may enable a user to use gestures to control the manner in which the information is presented or to otherwise interact with the gesture-based system...
The viewing functionality of an application may be extended by use of an adapter. An application is instantiated and the application may provide a view box that contains a scrolling feature as part of its interface. The adapter uses the application "behind the scenes" to collect information in a way that is not visi...
Contacts lists are dynamically managed in association with communication and collaboration applications and devices. Automated and user defined factors are determined based on information from various resources such as user profile contact information past communication information application / device types and com...
A cellular communication system in which overload of a base station is averted by offering users the option to communicate using a spectrum outside of the spectrum allocated for cellular communication. Incentives are offered to connect to the base station using the alternative spectrum which may not support communic...
One or more computers manage power consumption in a plurality of computers by repeatedly evaluating power consumption of pluralities of computers such that any given plurality of computers is evaluated by aggregating indicia of power consumption of the individual computers in the given plurality. The evaluation iden...
Automatic story production is implemented by the utilization of theme scripts with user assets to generate a quality finished product with minimum user input or direction. A user chooses a predesigned theme script to be applied to the user s assets to automatically create a story with a particular look and feel. Met...
The embodiments described herein generally relate to methods and systems for tunneling arbitrary binary data between an HTTP endpoint and an arbitrary destination. Such tunneling of data is valuable in an environment for example in which a browser based client communicates in the HTTP protocol and desires to exchang...
A host device comprises a configurable connector. The host device connector can be connected to a configurable connector of an accessory device. The host device can select connector functions to be enabled for connecting to the accessory device connector. The selection of connector functions can be based on accessor...
Alerts based on detected hardware and/or software problems in a complex distributed application environment are mapped to recovery actions for automatically resolving problems. Non mapped alerts are escalated to designated individuals or teams through a cyclical escalation method that includes a confirmation hand of...
Methods and systems for automatically synthesizing product information from multiple data sources into an on line catalog are disclosed and in particular for automatically synthesizing the product information based on attribute value pairs. Information for a product may be obtained via entity extraction feed ingesti...
A service that receives feedback from players in a game playing service. Tl
service provides an aggregation of the feedback so that a reputation score can be
determined by various players in the system. The service takes into account direct feedback
from other players about positive and negative experiences w...
Program code enabling the streaming of HD content in real-time to a game console is stored on a storage medium remote from the game console. The game console executes software that facilitates transfer of the program code from the remote storage medium to the game console. The program code ensures that sufficient ba...
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the ...
In some embodiments a database may store a plurality of content claims for previously evaluated data items with each of the plurality of content claims being associated in the database with a corresponding stored digital fingerprint of a previously evaluated data item. One or more servers may be configured to receiv...
A wireless station is connected to a wireless network through an access point and can establish a direct client-to-client connection to a second wireless station. The wireless station can communicate directly with the second wireless station without involving the access point. The wireless station communicates with ...
A system, method, and computer-readable media are disclosed for remotely controlling playback of content stored on a device. The system, method, and computer-readable media can transmit state-based commands from a host unit to the device in order to control playback of the content. The host unit can control playback...
A unified architecture for enabling remote access to a network is provided. The network may comprise, as examples, a virtual private network (VPN) and/or a peer-to-peer network. In one embodiment, the architecture includes components installed on a client device/node and a gateway/supernode. Components implemented o...
Frequency segmentation is important to the quality of encoding spectral data. Segmentation involves breaking the spectral data into units called sub-bands or vectors. Homogeneous segmentation may be suboptimal. Various features are described for providing spectral data intensity dependent segmentation. Finer segment...
Single leader provisioning is enabled through a locking mechanism in a directory service environment. A service running in a domain is enabled to take leader role by writing to a shared file maintained at a relative identity (RID) master server. The service taking the leader role is further enabled to extend its rol...
Within a content item set particular content items may be identified as trending based on changes in a frequency of references to the content items. For example users of a social network may reference web resources by posting the uniform resource locators (URLs) thereof in messages and trending web resources may be ...
A scene comprising a set of visual elements may allow a user to perform "zoom" operations in order to navigate the depth of the scene. The "zoom" semantic is often applied to simulate optical visual depth wherein the visual elements are presented with different visual dimensions and visual resolution to simulate phy...
GGPGPGPThere is provided a method of encoding and decoding data using an error control code having a codebook . The codebook is a sub codebook of a codebook . Each codeword g in the sub codebook G has an autocorrelation amplitude that is different from and higher than each correlation amplitude between g and each of...
The objects of an on object set may be synchronized across many clients (e.g. various devices may synchronize files of a mirrored filesystem). However the synchronization of an object may be complicated and an object may not yet be synchronized in the object set of a client for many reasons such as an incomplete rec...
Techniques are disclosed for connecting a user to all of his resources (e.g. remote desktop or remote application) in a deployment of server farm(s). The user s client sends a message to the deployment requesting any disconnected resources for the user and/or any active resources communicating with a different clien...
1. A computer implemented system that facilitates web-crawling, comprising at least a processor, one or more memories with following components stored thereon: a managing component that performs a predictive analysis to predict when a web page will change, and determines when, and how to perform web-crawling; a serv...
Content is encrypted according to a content key (CK) to result in (CK(content)) and the content key (CK) is protected according to a public key for a license server (PU-RM). Rights data is retrieved from a rights template to be associated with the content, and rules for modifying the retrieved rights data are also r...
A system is for use in printing data on a printer. A client interfaces with an applications program that has print capability. A print server in communication with the client controls a printing of data communicated to the print server by the client. A user interface manager communicates with the print server by an ...
A method comprising receiving at one of a plurality of nodes in a peer-to-peer network, an indication of a change in membership by another said node in the peer-to-peer network, and broadcasting a report that describes the change, and for receipt by each said node referenced in a routing table included in the one sa...
A system that facilitates real-time information exchange between users in a conference environment, comprising:
at least two Data Clients that receive conference-related information and present it to respective users, each Data Client comprising a user interface with a Presentation Chute icon therein; and
a Room S...
Architecture that integrates an unmanaged application as a hosted application into a design environment in a coherent yet usable manner such that the developer can use the hosted application"s native functionality yet leverage rich productivity features provided by the IDE. The IDE includes a hosting component that ...
A system and method for securely roaming private data from a first client computer to a second client computer linked via a communication network. A user of the first client computer executes a home client application and designates private data for roaming. The home client application generates a first key in respo...
An enhanced graphics pipeline is provided that enables common core hardware to perform as different components of the graphics pipeline, programmability of primitives including lines and triangles by a component in the pipeline, and a stream output before or simultaneously with the rendering a graphical display with...
A data overlay is built as a data structure on a logical space defined by a distributed hash table (DHT) in a peer-to-peer network. The data overlay includes a tree having tree nodes that each have a zone mapped to a corresponding DHT node in the logical space of the DHT. The logical space of the DHT is mapped to ma...
The present invention provides a method and system for providing a security element that is directed at inhibiting malicious activity by displaying a browser window in such a way that the user can trust and know the source of the window. Additional information and ornamentation is displayed on the window to help ens...
A computer readable medium storing a data structure defining a window for drawing on a desktop representation displayed on a display device, comprising:
a first data field storing base content object properties for a base content object of the window; and
a second data field storing content object properties for a...
The mechanisms described herein are directed at hosting content of a web
site on multiple computing devices. A relative importance for each file associated with the web site is calculated. This relative importance is used to calculate several subsets of the content which are distributed to several devices within a...
Modular content framework and document format methods and systems are described. The described framework and format define a set of building blocks for composing, packaging, distributing, and rendering document-centered content. These building blocks define a platform-independent framework for document formats that ...
A reproduction apparatus adapted to selectively reproduce data from a first recording medium having a program area collaterally storing program numbers and the passed-by addresses of each program in addition to information on the programs stored on it and a controlled area for controlling the start address of...
A three-dimensional (3D) view of a data collection based on an attribute is disclosed. A timeline is provided for displaying files and folders. The timeline may include a focal group that displays detailed information about its contents to me user. Remaining items on the timeline are displayed in less detail and may...
In an Item-based system, Images (e.g., JPEG, TIFF, bitmap, and so on) are treated as core platform objects ("Image Items" or, more simply, "Images") and exist in an "Image Schema" that provides an extensible representation of an Image in the system—that is, the characteristics of an Image and how that Image relates ...
Described is a web services application protocol (WSAP) comprising a SOAP-based protocol that defines a web service application model based on a set of common message operations. WSAP provides a foundation for defining web services in terms of how they interact with each other. In WSAP, the behaviors of a service ar...
Various embodiments of the present invention are directed to conflict handling for conflicts that occur in a peer-to peer synchronization system, where the ability to correctly and effciently handle conflicts minimizes data loss while retaining good usability and reduces the need for user intervention during synchro...
The present invention provides a virtualized computing system and methods for transitioning in real time between LONG SUPER-MODE and LEGACY SUPER-MODE in the x86-64 architecture. In doing so, a virtual machine, which relies on the traditional 32-bit modes, i.e., REAL MODE and PROTECTED MODE (V86 SUB-MODE, RING-0 SU...
An email manager for an inbox directs emails to various categories based on importance assigned by an email recipient and provides a user interface for presenting emails to the recipient in groups prioritized by importance. In one implementation importance is based in the sending source and in one implementation imp...
A system and method are disclosed for enforcing a normalized set of policy based behaviors across two or more disparate client devices. The policy definition can be a common description of expected behavior while a client side policy engine interprets and implements platform specific details associated with the clie...
An automated workflow services system can accommodate a wide variety of workflow scenarios. A composition service, a constraint service, and a tracking service can be provided to client programs. The composition service can support client-directed instantiation of actions for activity flows. Activity flows can be ba...
The present invention provides an efficient application oriented security model. Prior to execution, an application is authenticated, and security information associated with the application is retrieved. The security information is than used to generate a token that is attached to the application. The security info...
A method, system, and computer-readable medium are provided for creating, inserting, and reusing document parts in an electronic document. According to a system, a word processing application program receives a selection of a document part category. In response to the selection of the document part category, a galle...
A gain-constrained noise suppression for speech more precisely estimates noise, including during speech, to reduce musical noise artifacts introduced from noise suppression. The noise suppression operates by applying a spectral gain G(m, k) to each short-time spectrum value S(m, k) of a speech signal, where m is the...
Described is a system and method in which a system and method in which a device manufacturer or software image provider controls which devices are allowed to install or to run a software image. An image keying mechanism uses UUID and package data associated with the device or class of devices to key an image. Becaus...
Described is a system and method used in manufacturing computer devices, in which a single manufacturing image file contains an internal partition and file system layout into which individual operating system component packages are written. The image file is independent of any particular storage technology. To gener...
1. A method of providing a simulated off condition in a computing device, said method comprising:
receiving a signal to power off the computing device;
notifying system components of a low power request; and
reducing power consumption of said system components to a low power state such that said computing device ...
A method, comprising; analyzing a transport stream; and preparing the transport stream for processing that bypasses encrypted portions of the transport stream.
A system and method for facilitating the selection and implementation of software updates while minimizing the bandwidth and processing resources required te select and implement the software updates. In one embodiment, an update service controls aceess to software ......
The present mechanism obtains constraints within an interactive environment, associates these constraints.with constructs, and then applies these constraints to the constructs when encountering the constructs. The constraints may be saved in metadata associated with the respective construct. The constraints may spec...
A text colorization system is described herein that automatically sets foreground text color based on one or more background colors over which the text is displayed. The text colorization system identifies a background color neighboring each pixel of a string of text. For each pixel region the system selects a color...
An operation center stores a plurality of programs, sone of which are prerecorded, and some of which are in the process of being recorded. Pause and resumption functionality allows the user to pause the presentation of such programs using different pause, modes and to later resume the presentation of the programs. I...
Efficient virtual application updating is enabled. An old version of a virtual application can be compared to a new version of the virtual application and updated as a function thereof. A file unchanged from the old version to the new version can be hard linked from the new version to the old version. For a changed ...
Strategies are described for creating a resource item list, for transferring the resource item list from one user to another user or to another destination, and for retrieving resource items from an operation center based on resource descriptors specified in the resource item list. The resource item list can include...
A navigation structure is generated at runtime based upon the hierarchy of a site. The navigation structure includes the ability to author specific links throughout the structure. These specific links or child objects allow the navigation structure to be customized while maintaining site organizatoin accordance to...
A new persistence format for storing objects of a user defined type in a database store enables information about the structure of the type to be communicated to the store. This information enables a number of store optimizations, including direct structural access to members of the type. Specifically, metadata is e...
The present invention provides a unique system and method that facilitates incrementally updating spam filters in near real time or real time. Incremental updates can be generated in part by difference learning. Difference learning involves training a new spam filter based on new data and then looking for the differ...
A method and system authenticates and securely enrolls an untrusted device over a cellular network. In operation, a mobile device transmits an identifier (such as the phone number of the mobile device) via a communication transport over a first network (which may be untrusted or partially untrusted) network (such as...
A method and system for fragment-based serialization places one or more object members in fragments. Fragments may comprise a header and a payload. A header can provide useful information about the fragment, such as an indication of fragment type and an indication of fragment length. A payload may comprise one or mo...
A system and method for automating the web service selection based on reputation information, to help negotiate a contractual web service binding between a client and a server. Reputation information may be schematized into behavioral attributes such as web service responsiveness, web service latency, web service u...
A rules-based software architecture (100) that provides the infrastructure for the definition and execution of end-user rules logic. This enables end-user automation of data in a unified storage platform using simple IF-THEN rules. The architecture includes a monitoring component (102) that tracks items associated w...
An in-place data input panel provides a user with access to a list of alternate characters to which displayed characters may be converted. The data input panel provides an indicator, such as an indicator bar, corresponding to segmentation of the characters. A user can change the segmentation of the characters by exp...
User interfaces for editing text in pen-based computing systems include: (a) a display portion that displays text; and (b) a correction interface that displays an editable text portion corresponding to at least a portion of the text. The correction interface accepts input via a stylus to enable changes to the editab...
The creation of multiple recoverable units within a database allows a database partition to be reconstructed during maintenance and disaster recovery operations. A method of creating a recovery unit includes partitioning a database into at least two recovery units. A primary catalog of metadata relating to the logic...
A publishing using publishes digital content and issue to itself a corresponding digital publisher license to allow itself to render the published digital content. The publishing user is supplied with a publishing certificate from a digital rights management(DRM)server, where the publishing certificate allows the pu...
A multi connection information system is described herein that uses multiple connections to connect to a resource in a single file system session in a way that is controllable from protocols above a transport layer. The system also allows a single connection to be shared by multiple sessions. Sessions can be bound t...
The present systems and methods disclose a system for personalizing computer functionality. End-users are provided with tools to easily write rich and complex preferences, for example, by using a plurality simple IF-THEN prepositional logic. The preferences are then transformed into queries and executed efficiently ...
A method and apparatus are provided for adapting an exponential probability model. In a first stage, a general-purpose background model is built from background data by determining a set of model parameters for the probability model based on a set of background data. The background model parameters are then used to ...
A media server in a Universal Plug and Play (UPnP) network includes a resource sharing service to govern the distribution of media resource information to rendering devices. The media server includes: a media service module operating in a clamped down user context (e.g., a local service user context) and configured ...
A system and related techniques relate to the retrieval of a media object list with associated properties from a media device such as a digital video camcorder, audio player or other source or device. According to embodiments the retrieved list or set of media objects and their attributes or properties, for example ...
A system and methods perform an automatic TV signal/tuner setup in a tuner device (e.g., a PC, a personal video recorder, a set-top box, etc.) that has one or more tuners. The setup identifies the number of tuners in the device, whether the tuners are analog or digital, and what broadcast standard each tuner support...
Embedded within at least some Real-Time Control Protocol (RTCP) messages sent from a media content source to a recipient is a session description message (186) that describes a media presentation (186) being streamed to the recipient (102). The session description message (186) can be associated, for example, with o...
Fast startup for streaming media includes one or both of a technique for predictive start and a technique for switching delivery channel(s) during streaming. Predictive start allows a media content source to predict which media stream(s) are desired by the requesting client device and begin streaming those predicted...
The invention is directed to systems and methods for the synchronization of two clients both utilizing a common storage platform (e.g., the new storage platform of the related inventions) to synchronize through an intermediary that is not using the same common storage platforrn {e.g., instead using a legacy storage ...
A TV viewer selects viewing interests and a corresponding highlighting from a user interface. An enhanced Electronic Programming Guide (EPG) display is output and includes TV shows, channels and time slots within a programming range. TV shows having characteristics that match the TV viewer’s selected viewing interes...
Techniques and tools are described for scalable video coding and decoding. For example, a video encoder and decoder perform adaptive operation in lifting-based motion-compensated temporal filtering, and inverse motion-compensated temporal filtering respectively. The encoder, in a prediction stage, computes a motion-...
A method and apparatus for protecting regions of an electronic document are provided. According to the method, the entire electronic document is protected. The selection of a region within the electronic document is received along with identity of one or more users authorized to freely edit the selected region. The ...
Described is a mechanism for exposing a volume shadow copy of a shared volume over a network to a remote client. A shared volume is accessed at a client computing system having a root. A volume shadow copy (or "snapshot") of the volume is identified as a child resource of the shared volume. The child resource repres...
The invention relates to a system lor filtering messages - the system includes a seed filter having associated therewith a false positive rate and a false negative rate. A new filter is also provided tor filtering the messages, the new filter is evaluated according to the false positive rate and the false negative r...
A data stream is encrypted to form encryption units that are packetized into RTP packets. Each RTP packet includes an RTP packet header, one more payloads of a common data stream, and a RTP payload format header for each payload and including, for the corresponding encryption units, a boundary for the payload. The p...
A database view of a database is created which provides a transaction-consistent view of an existing database at a previous time. Each database view contains all the information needed to, along with the primary database; determine the contents of the primary database at a previous time. The database view consists o...
A restore advisor may generate and apply a recovery plan to restore a database to a specified point in time. A restore/recovery scenario may be specified; resources, and backups available may be specified and one or more optimized restore plans may be generated. One or more alternate plans may be requested. The plan...
Secure network access is provided by connecting a secure network provisioning device to a security authority, acquiring one or more network profiles, configuring one or more network interfaces of the secure network provisioning device with data corresponding to attributes of the acquired network profiles, switching ...
Collateral content editor functionality may be provided to an electronic message application such that an electronic message interface includes an integrated collateral content editor interface for creating formatted and editable collateral content in–line within the body of an electronic message. The collateral con...
A "PeerStreamer" provides receiver-driven peer-to-peer (P2P) media streaming for loosely coupled P2P networks. Peers in the network perform only simple operations, may cache all or part of the streaming media, do not collaborate with other peers, may be unreliable, and may drop offline or come online during any give...
The present invention provides for trusted side-band communications between components in a computer system, so that use of the system bus may be avoided. Two components may be connected by means other than a bus (e.g., an infrared port, a wire an unused in, etc.), whereby these components may communicate without th...
A system and methods for joining the correct wireless network are provided. The invention allows a device connecting to an unsecure wireless network to choose the correct network from many available wireless networks which are in range. A piece of code is executed on one of the PCs already on the network, then the d...
Vision-based document segmentation identifies one or more portions of semantic content of a document. The one or more portions are identified by identifying a plurality of visual blocks in the document and detecting one or more separators between the visual blocks of the plurality of visual blocks. A content structu...
The subject invention provides a system and/or a method that facilitates interacting with a device component to provide uniform communication, discovery, and management. A device service provider interface (DSPI) component can provide a uniform manner to communicate and/or manage a radio frequency identification (RF...
The subject invention provides a system and/or a method that facilitates employing a model based at least upon a framework, wherein the model can be utilized to build an RFID application. A receiver component can receive data, wherein a model component can create a model based at least in part upon the received data...
The subject invention provides a system and/or a method that facilitates implementing an RFID process by providing creation and/or execution of the RFID process as it relates to a provider(s) and the associated devices related to such provider(s). A receiver component can receive information relating to at least one...
Concepts and technologies are described herein for interacting with contextual and task focused computing environments. Tasks associated with applications are described by task data. Tasks and/or batches of tasks relevant to activities occurring at a client are identified and a UI for presenting the tasks is generat...
A mobile electronic device, such as a smart personal object includes an antenna system for emitting and receiving signals. The antenna system includes at least two antennas electrically connected in parallel to define an equivalent circuit having a reduced inductance with a substantially unaffected induced voltage f...
The subject invention provides a system and/or a method that facilitates extending data within an RFID network to a business application. An interface can receive real-time RFID data from a process with at least one device collection within the RFID network. An integration component can seamlessly expose such real-t...
A method for diagnosing problems with protection of a data source and recovery of the same. The method includes diagnosing a copy of data located at the storage location and diagnosing a temporal version of the copy of data. Based on the diagnosis it is determined whether an error or a warning was detected. If eithe...
A system and related techniques host and serve selective, orchestrated advertising campaigns and other content to users depending on contributing advertisers" campaign strategies as well as use interests, prior history or experiences. According to embodiments, users may navigate to a Web or other network site which ...
The present invention extends to methods, systems, and computer program products for organizing resources into collections to facilitate more efficient and reliable resource access. Namespace managers communicate with one another to form a federation namespace infrastructure. The infrastructure can efficiently route...
Redirection of streaming content is described. In an implementation, a method includes receiving a request at a client from another client, wherein the request is to redirect on-demand content being streamed from a head end to the other client and includes a bookmark that specifies a point in time during an output o...
A thin film inductor according to one embodiment includes one or more arms; one or more conductors passing through each arm; a first ferromagnetic yoke wrapping partially around the one or more conductors in a first of the one or more arms the first ferromagnetic yoke comprising a magnetic top section a magnetic bot...
A method is provided for analyzing a plurality of search sessions to identify intent-based clusters therein. Each session comprises at least one received query from a user and a corresponding set of returned search results, and each set of search results includes or refers to at least one piece of content. Each clus...
A method and system for rendering graphics based on user customizations in a computer graphics application are disclosed. The customizations relate to various properties of one or more graphical elements in the graphic. Such properties include positioning, size, formatting and other visual attributes associated with...
A data organization system that utilizes associations, pointers and/or links in connection with novel container types is provided. A "list" is a container of items, like a folder, but is different in that a file or other data component can be accessed via multiple lists (whereas an item must appear in exactly one fo...
A system and method of testing and tuning a speech recognition system by providing pronunciations to the speech recognizer. First a text document is provided to the system and converted into a sequence of phonemes representative of the words in the text. The phonemes are then converted to model units, such as Hidden...
A Smart Client solution for an enterprise application (e.g., a Customer Relationship Management system) includes a base application (e.g., Microsoft Outlook), and add-in software that interacts with the base application. The add-in software allows the base application to be used to access data and functions of the e...
A system and method for organizing and sorting targets received in a referral response and for realizing a target fail-back and a target priority policy in a distributed file system is provided. In one embodiment, a sorting method includes receiving a referral response in the form of a list of targets that are sorte...
A method and system for combining and enforcing security policies is provided. The security system is provided with security policies that have process set criteria and associated rules. The security system combines the security policies by generating a rule list of the security policies and associated process set c...
The present invention extends to efficient and flexible business modeling based upon structured business capabilities. A computer system receives a plurality of business modeling attributes representing different layers of a business. The computer system extracts business capability attributes from among the receive...
Systems and methods are described for constructing predictive models, based on statistical machine learning, that can make forecasts about traffic flows and congestions, based on an abstraction of a traffic system into a set of random variables, including variables that represent the amount of time until there will ...
Methods and apparatus for managing business interactions between opposing parties. Business interactions are mapped to service contracts. The service contracts are mapped to machine readable code. The machine readable code is defined by business transaction patterns and service interaction patterns. The machine read...
A Universal Serial Bus (USB) device may comprise a controller including a USB interface and a USB connector in communication with the USB interface. The USB device may also comprise a decision component for receiving a credential, and in response to a valid credential, for providing access to an operation of the USB...
A computer-readable portable media device is used for transferring network settings and other configuration data to a thin client network device to simply the task of configuring the thin client device for network connectivity and other functions. A configuration program on a personal computer assists a user in crea...
A simplified fault tolerant algorithm is presented for operating a distributed computing system in a fault tolerant manner. A system comprising three computing devices need only have two devices agree to perform any proposed function. Thus, when soliciting a vote for a proposed function, a leader device can also sen...
[0034] A system and method for creating a mnemonics Language Model for use with a speech recognition software application, wherein the method includes generating an n-gram Language Model containing a predefined large body of characters, wherein the n-gram Language Model includes at least one character from the pr...
The present invention extends to methods, systems, and computer program products for rendezvousing resource requests with corresponding resources. Doubly linked sorted lists are traversed using modulo arithmetic in both directions. Sorted lists can be partitioned based on a multiple proximity metrics. Node routing t...
Methods and systems for describing device capabilities are described. An exemplary schema is presented and constitutes the communication language between applications and devices. The schema is built on a framework that uses schema keywords to express the full set of user configurable capabilities for a particular d...
A content page is configured by a user and located on a network. Changes made to the content page are automatically communicated with notifications to a group of contacts for the user. Only contacts with permission to view the content page, or the changed content, will receive the notification and have permission to...
A system and process for generating High Dynamic Range (HDR) video is presented which involves first capturing a video image sequence while varying the exposure so as to alternate between frames having a shorter and longer exposure. The exposure for each frame is set prior to it being captured as a function of the p...
A system and method are described to programmatically manage access between one or more nodes (12) and a plurality of associated devices (16, 18, 20, 22), such as shared storage units. Each node (12) is programmed to include a data structure (40, 46), which identifies whether an associated device (16, 18, 20, 22) is...
The present invention extends to methods, systems, and computer program products
for reliably and securely transferring queued application messages. Application messages
are (e.g.,. binary or text) encoded and then encapsulated in transfer messages, enqueue
messages, and dequeue responses such that composable pro...
An application providing a common interface allowing access and login to a electronic mail system and instant messaging system. The application allows responding to an email using an instant message, replying to an instant message using an email, sending and receiving both email and instant messages from one applica...
A computing environment can dynamically respond to user preferences and personal abilities by enabling computer users to configure their computing experience by implicitly gathering information about the users" needs. The system can detect users" issues during the natural course of interaction with the system and of...
A system and process for controlling the coding bit rate of streaming media data is presented. This coding bit rate control involves dynamically adjusting the coding bit rate to control client buffer duration to prevent the buffer from underflowing, while keeping the average coding bit rate close to the average tran...
A web services namespace pertains to an infrastructure for enabling creation of a wide variety of applications. The infrastructure provides a foundation for building message-based applications of various scale and complexity. The infrastructure or framework provides APIs for basic messaging, secure messaging, reliab...
The invention provides mechanisms for transferring processor control of secure Internet Protocol (IPSec) security association (SA) functions between a host and a target processing devices of a computerized system, such as processors in a host CPU and a NIC. In one aspect of the invention, the computation associated ...
NAMethods and systems provide for breaking a computer-generated document into a number of components where the components have explicit relationships with each other. A relationship representation is generated for the components of the document. A user may then navigate the relationships between the components to qu...
An extensible file system format for portable storage media is provided. The extensible file system format includes the specification of primary and secondary directory entry types that may be custom defined. The primary and secondary directory entry types can be further classified as critical and benign directory ...
The present invention is directed to making a guest operating system aware of the topology of the subset of host resources currently assigned to it At virtual machine boot time a Static Resource Affinity Table (SRAT) will be used by the virtualizer to group guest physical memory and guest virtual processors into vir...
Described is a system and method by which an auxiliary computing device having an auxiliary display platform that displays information corresponding to data that originated on the main computer system may be extended by a device manufacturer. Extended hardware is added to the device, such as a radio receiver and/or ...
The subject invention provides a system and/or method that facilitates prescribing a navigation within an application utilizing a topology and a navigation path. The topology is created based upon received metadata and is a network of node objects and link objects. The navigation path is a sequential list over the t...
Systems and methods for applying virtual machines to graphics hardware are provided. In various embodiments of the invention, while supervisory code runs on the CPU, the actual graphics work items are run directly on the graphics hardware and the supervisory code is structured as a graphics virtual machine monitor. ...
Accelerated channel change (ACC) strategies are described for supplying a client module with media information by transitioning between a first delivery of media information provided by first delivery functionality and a second delivery of media information provided by second delivery functionality without exceeding...
In a computer with a trusted platform module (TPM), an expected hash value of a boot component may be placed into a platform configuration register (PCR), which allows a TPM to unseal a secret. The secret may then be used to decrypt the boot component. The hash of the decrypted boot component may then be calculated ...
An efficient lapped transform useable in digital media codecs is realized using a reversible 2-dimensional overlap operator for pre/post filtering that is applied on a staggered grid relative to a core transform. The 2-dimensional lapped operator is based on a separably applied 1-dimensional reversible lapped operat...
One or more techniques and/or systems are disclosed for improving location awareness of a device. A device position can be determined (e.g. via GPS or location service) and this position can be used to identify a user experience that may be in an area around device such as within a desired position threshold. A near...
This document describes grouping personal accounts to tailor a web service. By grouping personal accounts a service provider may tailor a web service to multiple people based on information about those people.
Described is a method and system a system and method for dynamically and intelligently configuring a computer system"s video-related settings upon connection of a monitor, and/or reconfiguring upon disconnection. A monitor configuration may include one or more display mechanisms, their video settings, relative posit...
A listener operating in user-mode can dispatch control of a client connection to a listener without exposing system memory or other sensitive services or components. For example, a client component requests access to a network component through connection with a user-mode listener. Based on information contained in ...
The present invention is directed generally toward referencing objects in a virtual environment. One aspect of the invention is directed toward a computer-implemented method for referencing an object in a virtual environment that includes receiving a command from a user to designate an object and designating the obj...
System and methods are herein disclosed for reconciling image metadata in an image the between different metadata schemas, both in the utilization of said metadata by an application or device, as well as proactively reconciling conflicts when detected in said image file. Several embodiments are directed to logicall...
A license is issued to a user as decryption and authorization portions. The decryption portion is accessible only by such user and has a decryption key (KD) for decrypting corresponding encrypted digital content and validating information including an identification of a root trust authority. The authorization porti...
Client-side presence documentation is implemented in an instant messaging architecture. In a described implementation, respective presence documents are stored locally at respective client devices. Accordingly, presence information can be shared and disseminated in accordance with a peer to peer paradigm. In another...
Exemplary embodiments disclosed herein may include a method and system for integrating multiple identities and identity providers, including, receiving the security policy of a service provider, determining the attributes requested by the service provider, obtaining authenticated attributes requested by the service ...
A digital media content (e.g., image, video, audio, etc.) encoder/decoder employs a spatially varying parameter to condition the application of an overlap pre-process and post-process to adjacent transform block edges for the spatial-domain lapped . This conditional application of Che lapped transform to sub-blocks ...
A discovery secret is transmitted from the source domain to the correspondent domain. The discovery secret includes a data element specific to the correspondent domain and. The discovery secret includes a source domain address to which the correspondent domain is permitted send a message in order to determine that a...
Various techniques and tools for coding and decoding interlaced video are described, including (1) hybrid motion vector prediction for interlaced forward-predicted fields, (2) using motion vector block patterns, (3) selecting between dominant and non-dominant polarities for motion vector predictors, (4) joint codin...
A reliable request-response mechanism allows a requesting computer system and a responding computer system in an established end-to-end connection to send and receive messages in a manner that the responding computer system processes a request as intended by the requesting computer system, such that all the mes...
The present invention extends to trusted third party authentication for Web services. Web services trust and delegate user authentication responsibility to a trusted third party that acts as an identity provider for the trusting Web services. The trusted third party authenticates users through common authentica...
Systems and methods are provided that determine the actual amount of time a processor consumes in executing a code portion. The actual execution time of a code portion may be accurately determined by taking into consideration context switches and/or overhead time corresponding to the code portion. Determining the ac...
A permission manager detects when the message including the link is forwarded and sends a notification to the author indicating that the message was forwarded to another recipient. A notification may also be sent to the recipient who received the forwarded message indicating that the author has been notified that th...
The present invention is directed to a system and method lor a unified composition engine that in general, combines prevniusly separate composition services. The unified composition engine provides a composition service used both in-process in conjunction with applicaiioii programming interfaces (API s) and on the d...
Innovative techniques for identifying and distinguishing content, such as commercials, can be used with means for marking key frames within the commercials to facilitate replacement of commercials and other programming segments in such a way as to provide improved focus and relevance for targeted advertising based o...
A network peripheral device driver maintenance framework and corresponding method is disclosed. The framework includes a driver version identification level comprising a set of driver version descriptions. Each driver version comprises a set of component versions that make upon each particular driver version. A driv...
The present invention can provide an extensible file format compatible with previous, current, and future versions of an application program. The present invention can comprise including file version watermarks in an original data file of an application program. The file version watermarks can indicate various prope...
An enhanced telephony (ET) computer user interface that seamlessly integrates features of personal computer (PC) and a telephone into a coherent user interface. The user is provided with a rich variety of functionality that leverages the fact that the PC has considerably more processing power and greater access to v...
The present invention thus uses a composite statistical model and rules-based grammar language model to preform both the speech recognition task and the natural language understanding task.
The present invention provides a system and method for combining VoiceXML with an speech application development tool such as SALT. In one aspect of the present invention, a VoiceXML module includes VoiceXML executable instructions. A SALT module includes speech application language tas to execute instructions ass...
A middle layer network protocol enhancement, virtual connectivity (VC) makes the network attachment point changes of local and remote peers transparent to applications that use network services. A virtual connectivity module local to each peer translates communication connection parameters from apparent to real and ...
A distributed query engine pipeline architecture comprises cascaded analysis engines that accept an input query and each identifies a portion of the input query that it can pass on to an execution engine. Each state rewrites the input query to remove the portion identified and replaces it with a placeholder. The rew...
A method of selecting textual advertisements for display on a web page based on user history. In the method, a user accessing a web site is identified. Keywords in articles displayed on web pages viewed by the user are identified and stored in a user profile. The advertisements displayed on a current user selected w...
The present invention provides a systems, methods, and products for enhanced user navigation to compliment (but not necessarily replace) a computer keyboard and mouse by providing a robust navigation interface. The present invention may comprise: a minimally necessary group of commands; combining the functionality a...
A speech understanding system includes a language model comprising a combination of an N-gram language model and a context-free grammar language model. The language model stores informaion related to words and semantic information to be recognized. A module is adapted to receive input from a user and capture the inp...
A wireless device that adaptively makes the determination of whether or not to pre-authenticate. If the wireless device is running an application that is sensitive to latency (also referred to herein as a low latency application), then pre-authentication is performed and latency is reduced during the switch between ...
Indexing functionality can be shifted to one or more backup servers in a backup system. In one implementation, a backup server can receive one or more data backups from one or more production servers. The backup server can then build or create one or more indexes at the backup server, which correspond to the co...
A computing system that includes a main housing, a display, and a keyboard. The display is coupled to the upper surface of the main housing, an pivots about an axis that is approximately parallel to and towards the front surface of the main housing. In device mode, the keyboard is largely hidden within or under...
A multi-user multi-input application for education is described. In one aspect, a user interface (UI) presenting pedagogical tasks of varied type and multiple cursors are presented on a single display. Each cursor is assigned to a particular user of multiple users. Actions associated with cursor control event data a...
Stored pages in an electronic database are re-ordered such that the data that is being requested by multiple processes is re-ordered to be spread over several different pages such that a lock on a first page will no longer lock processes from data on the locked page.
A sever application allows an administrator of a server to selectively designate contact data of a particular individual to be encrypted prior to storage in a shared electronic directory. The server application encrypts any designated content and stores the encrypted content in the shared electronic directory. The s...
A computer-implemented method of providing information to a user is disclosed. The method includes providing a user interface that includes a data element containing a first numeric value. An input is received from the user and represents a selection of the data element. The input is responded to by disp...
A business system interface for accessing data from a Line-of-Business (LOB) system from within an information worker productivity (IWP) application is provided. The business system interface includes an embedded business system user interface contained within a user interface of the IWP application. Also included, ...
Certain aspects of a generic user interface command architecture allow an application to host commands for presentation on a computing device. The commands can be written by the same designer or author as the application, or alternatively by other parties (e.g., by a third-party developer). Other aspects of the gene...
A system and related techniques accept user-inputted search terms to perform a search for files within a file system hierarchy. A user searches a current level of a file system (120) by entering a search term in a search term input box (112) of a user interface (104). A search box (114) is dynamically created and ma...
A protection system is described herein that dynamically determines whether a computer system can access a particular resource based on a combination of a dynamic health state of the computer system and a dynamic reputation of the resource. When a user attempts to access a resource, the protection system intercepts ...
A server computer includes a performance monitor module and a throttling logic module. The performance monitor module includes performance monitors that monitor system parameters of the server computer. The throttling logic module determines whether a system parameter monitored by a performance monitor exceeds a pre...
One or more techniques and/or systems are provided for assigning power management classifications to a process transitioning a computing environment into a connected standby state based upon power management classifications assigned to processes and transitioning the computing environment from the connected standby ...
The most efficient water irrigation systems today for gardens and/or fields typically use dripping systems that release drops of water at certain distance intervals for example for about 30-60 minutes per day (for example every 30-100 cm of the pipe there is dropper that releases typically 2 litters of water per hou...
In one aspect, an encoder/decoder receives information (1905) for four field motion vectors for a macroblock in an interlaced frame-coded, forward-predicted picture and processes the macroblock using the four field motion vectors. In another aspect, a decoder decodes skipped macroblocks of an interlaced frame. Skipp...
The present invention extends to methods systems and computer program products for creating a snapshot of a shared volume that is application consistent across various nodes of a cluster. The invention enables a snapshot of a volume to be initiated on one node which causes all applications in the cluster that use th...
Strategies are described for organizing the runtime components of an application into an entity domain framework. The entity domain framework includes one or more entity domains arranged in a hierarchical fashion. Each entity domain further groups one or more components together in a hierarchical fashion. Each entit...
A system and process for ensuring the smooth flow of electronic ink (1203) is described. Dynamic rendering (1201) is give priority over other event handlers. Priority may be the use of one or more queues (1205, 1206) to order when events occur and may be performing dynamic rendering (1201) prior to other steps
...
A system and method are provided for implementing a search engine to output search results scored for a particular user. The method includes receiving a set of input user search terms and accessing a set of input user preferences. The method additionally includes obtaining scored search results based on the set of s...
An accelerated video decoding system utilizes a graphics processing unit to perform motion compensation, image reconstruction, and color space conversion processes, while utilizing a central processing unit to perform other decoding processes.
Systems, methods and computer readable media are disclosed for grouping complementary sets of standard gestures into gesture libraries. The gestures may be complementary in that they are frequently used together in a context or in that their parameters are interrelated. Where a parameter of a gesture is set with a f...
Strategies are described for processing image information in a linear form to reduce the amount of artifacts (compared to processing the data in nonlinear form). Exemplary types of processing operations can include, scaling, compositing, alpha-blending, edge detection, and so forth. In a more specific implementation...
Architecture for maintaining connection state of network address translation (NAT) devices by employing an out-of-band (OOB) technique externally to application connections without imposing additional requirements on the underlying native application(s). The OOB solution can be applied to arbitrary connections witho...
The subject invention provides a unique system and method that facilitates management and navigation of various data objects by making use of a unique time-line based navigation tool. In particular, objects can organized into a plurality of bands based on their respective subject matter. Each band can be created to ...
To accommodate different types and versions of execution environments on mobile devices, requests for applications from a programmable device, such as a smart phone or other mobile device include status dat*' about the characteristics of the device. Information about the display, memory, storage, ar-d/or script engi...
Providing for search to facilitate discovery or access to configuration functions of a computer application is described herein. By way of example metadata can be appended to configuration functions of the computer application. A matrix correlating subsets of metadata with related configuration functions can facilit...
Various embodiments of the present invention are directed to systems and methods for synchronizing mixed elements (MEs) comprising structure data and unstructured filestreams between peer computer systems in a hardware/software interface system environment that does not permit snapshotting of large unstructured ME f...
Technologies are described herein for allowing a user of an interactive summary table to specify multi-condition data filters to modify the data displayed in the summary table. A user interface is displayed to the user that allows the user to specify a multi- condition data filter. The specification of the multi-con...
A 10-Koot media user interface is herein described. A computer user interface may be designed for primary use as a 10-Foot user interface, where a user controls the compute1' using a remote control device, instead of as a traditional 2-Foot user interface where the ase-controls the computer using keyboard and mouse ...
A system and method for improved vertical handoff between different types of wireless network. Network allocation vector occupation and packet collision probability are used as quality of service measures, enabling vertical handoffs to be delayed until actually beneficial to quality of service. Improved wireless net...
Systems and methods for synchronizing data between endpoints using elements of centralized and decentralized synchronization systems and communication topologies are disclosed. Such systems and methods may in some cases synchronize some subset of data with a centralized endpoint while another subset of data is synch...
Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed wi...
The description relates to cloud edge topologies. Some aspects relate to cloud edge applications and resource usage in various cloud edge topologies. Another aspect of the present cloud edge topologies can relate to the specification of cloud edge applications using a temporal language. A further aspect can involve ...
The present invention extends to methods, systems, data structures, and computer program products for organizing electronic mail messages into conversations. Electronic mail conversation items store attribute values representing attributes of corresponding electronic mail conversations and included electronic mail m...
A method, system, and apparatus are provided for receiving and responding to knowledge interchange ("KI") queries KI queries are search queries directed to database of KI profiles A KI profile identifies the interests of a user, the individuals with which a user has communicated, and the topics on which communicatio...
MECHANISM TO CONVEY DISCOVERY INFORMATION IN A WIRELESS NETWORK
ABSTRACT
Discovery of services between devices is provided prior to establishing a connection between devices, including wireless-enabled devices or devices that are communicatively coupled to wireless access points or other wireless communication dev...
Transitioning between an editing view and a backstage view of an electronic document may be provided. A user interface may be displayed on a computer which includes an editing view of the electronic document. The computer may then receive an input in the editing view for transitioning from the editing view to the ba...
Described herein are implementations for providing a platform adaptation layer that enables applications to execute inside a user mode hardware protected isolation container while utilizing host platform resources that reside outside of the isolation container. The platform adaptation layer facilitates a system serv...
In the context of an instant messaging application, a conversation is analyzed and contextually or textually relevant keywords and/or phrases are identified. Keywords or phrases are highlighted in a visually-identifiable manner for selection by an individual participating in the conversation. Once selected by an ind...
The claimed subject matter relates to systems and/or methodologies that facilitate intelligent distribution of backup information across storage locations in network-based backup architectures. A virtual layering of backup information across storage locations in the backup architecture can be implemented. Statistica...
Embodiments are disclosed herein that are related to input devices with curved multi-touch surfaces. For example, in one disclosed embodiment, a method of making a multi-touch input device having a curved touch-sensitive surface comprises forming on a substrate an array of sensor elements defining a plurality of pix...
An architecture is presented that automatically detects a location of a user and forwards messages to a pre-configured number associated with the detected location. A location system is provided that comprises a location component and a routing component. The location component publishes presence information of a mo...
A method for selectively utilizing a plurality of disparate solid state storage locations is disclosed. The technology initially receives class types for a plurality of disparate solid state storage locations. The characteristics of the received data are determined. The received data is then allocated to one of the ...
A method and apparatus is described for receiving and storing data from a first host device and performing actions or events on a second host device based on the stored data. Also, a priority factor value may be determined for the stored data such that actions or events performed on the second host device may be bas...
An adaptive streaming system is described herein that provides a stateless connection between the client and server for streaming media playback in which the data is formatted in a manner that allows the client to make decisions and react more quickly to changing network conditions. The client requests uniform chunk...
Systems and methods that distribute load balancing functionalities in a data center. A network of demultiplexers and load balancer servers enable a calculated scaling and growth operation, wherein capacity of load balancing operation can be adjusted by changing the number of load balancer servers. Accordingly, load ...
Embodiments are disclosed herein that are related to input devices with curved multi-touch surfaces. One disclosed embodiment comprises a touch-sensitive input device having a curved geometric feature comprising a touch sensor, the touch sensor comprising an array of sensor elements integrated into the curved geomet...
Several embodiments of the present invention employ synchronization adapters for synchronizing information between "WinFS" and non-"WinFS" data sources. Examples of adapters include an adapter that synchronizes address book information between a "WinFS" contacts folder and a non-WinFS mailbox. In these instances, ad...
A method, apparatus, and computer-readable medium are provided for creating and laying out a graphic within a drawing application program. The method includes receiving a data model defining a set of data and data relationships to be represented in the graphic, receiving a graphic definition describing the mapping o...
A user interface for building a componentized workflow model. Each step of the workflow is modeled as an activity that has metadata to describe design time aspects, compile time aspects, and runtime aspects of the workflow step. A user selects and arranges the activities to create the workflow via the user interface...
Rules for the signaling and interpretation of chroma position are described. One rule, called the short rule, defines fifteen discrete chroma centering positions and corresponding four-bit syntax element. Another rule, called the extended rule, defines 81 discrete chroma centering positions and corresponding seven-b...
A read-only management object is created to contain information rela10g| firmware components that can be updated. This information includes a component identifier, a component version and a user-friendly name for the component. The information also includes a state identifier that indicates a state of a device ...
In accordance with embodiments of the present invention, systems and methods for providing customized advertising content are provided. When a user is browsing a webpage, client script code embedded in the webpage monitors the user"s mouse and keyboard activity, for example, the time it takes the user to click on a ...
ABSTRACT FILTERING OF DATA LAYERED ON MAPPING APPLICA I IONS
Provided is a mapping application that displays detailed data information as a function of multiple sets of layered data. When portions of at least two sets of layered data overlap, a set opcraiion is applied to the overlapping portions to create a new se...
The present invention extends to methods, systems, and computer program products for composing message processing pipelines. Embodiments utilize intra-pipeline communication links to physically and/or temporally decouple pipeline stages, configure branching message flows, and bridge protocols. The use of intra-pipel...
Messaging content that is associated with a user is selected for sharing and transferring with one or more other recipients. A user may select all/portion of the messaging content to transfer. For example a user may select a single folder from their mailbox their entire mailbox one or more conversation threads one o...
Aggregated data associated with a geographic area may be obtained. The aggregated data may be dynamically distilled to obtain a presentation set of data based on a dynamically changing geographic location associated with the geographic area. A transmission of a stream of personalized audio data that is based on the ...
A computing system includes a touch display and a virtual keyboard visually presented by the touch display. The virtual keyboard includes one or more slider buttons, and each slider button includes a plurality of touch-selectable items. The computing system further includes a touch-detection module configured to rec...
A method is presented for preserving metadata during an undo operation at a client computer. A first section of a document is modified on a word processing application on the client computer by performing one or more user actions in the first section of the document. While modifying the first section of the document...
A containment system may include generating and/or sending an alert as the basis for safely sharing knowledge about detected worms. An alert may contain information that proves that a given program has a vulnerability. The alert may be self-certifying such that its authenticity may be independently verified by a com...
Cross slide gestures for touch displays are described. In at least some embodiments cross slide gestures can be used on content that pans or scrolls in one direction to enable additional actions such as content selection drag and drop operations and the like. In one or more embodiments a cross slide gesture can be p...
Search based system management may be provided. A management interface comprising a search input element and a result list element may be displayed. A keyword may be received via the search input element and a plurality of matching configuration properties associated with the received keyword may be identified. At l...
The claimed subject matter relates to architectures for facilitating network- accessible or local backup or restore features in a manner that leverages event-oriented contextual information associated with one or more users of the data to be backed up or restored. In particular, a first restore-based architecture ca...
Network and connection provisioning framework for configuring and provisioning aspects of network connectivity (e.g., multiple networks, media types, and/or connections). The framework may comprise a unified configuration interface enabling an administrator to configure different types of network connectivity. A sin...
A video encoding system encodes video streams for multiple bit rate video streaming using an approach that permits the encoded bit rate to vary subject to a peak bit rate and average bit rate constraints for higher quality streams, while a bottom bit rate stream is encoded to achieve a constant chunk rate. The video...
A method and apparatus is described for recording or auditing events. In one example, a device is connected to a first host device and may receive data from the first host device. The first host device may further be connected in a network of devices. The device may be disconnected from the first host device and may...
The present technique provides a combined file space for files from multiple partner computing devices. An individual cache policy associated with each partner computing device determines the manner in which the files in the combined file space are filtered for the respective partner computing device. Files data tha...
A method of sending an identity information document comprising:
selecting identity information from a self-identity information store for inclusion in the identity information document, wherein the selected identity information comprises a subset of identity information relating to the principal in the self-identi...
The present invention is directed to a system (500) for automatically recording information indicative of actions of an author in completing steps in an overall task performed on a user interface (205). Recording systems (200) are used to record the steps taken to perform the task on different computers (502, 504) h...
A platform extensibility framework may be provided. A visualization platform may register feature extensions and receive requests to create objects. The objects may be created according to drawing instructions provided by the visualization platform, an application requesting the object's creation, and/or at least on...
Various embodiments proactively monitor and efficiently manage resource usage of individual tabs. In at least some embodiments one or more tabs can be dehydrated in accordance with various operational parameters and rehydrated when a user actually activates a particular tab. In at least some embodiments rehydration ...
A user interface having zoom functionality is described. In an implementation, a user interface is displayed having representations of a plurality of content. Each of the representations is formed using a respective piture-in-picture stream of respective content. When an input is received to select a particular one ...
Events occurring with respect to metrics are defined. When an event occurs with respect to a metric, a notification of the event is generated in a social network, such as an enterprise social network. The notification might include the name of a user associated with the event and the name of the event. Comments may ...
The present invention generally relates to conflict management resolution. Typically systems for resolving conflicts between television programs with coinciding broadcast schedules use preferences, a confusing and limited display, or a combination thereof. The present invention, on thee other hand, provides for dete...
An extensible architecture for untrusied medium (e.g., wireless) device configuration via trusted medium. The architecture can be employed to associate a device that-an uotrusted medium {e.g.. wireless connection). Association is effected using a trusted medium, for example, a wired connection.
The architecture can...
Described is a technology in which data items (e.g., files) are processed through an extensible data processing pipeline, including a classification pipeline, to facilitate management of the data items based upon their classifications. A discovery module locates data items to process. An independent classification p...
Various embodiments provide an ability to describe independent of a programming language one or more interfaces associated with an operating system. Alternately or additionally a compiler associated with a specific programming language can be configured to map the independent interface description(s) to the specific...
Systems methods and computer storage media having computer executable instructions embodied thereon that provide content items selected based on context are provided. Contextual indicators associated with a user are identified and utilized to determine one or more content items that the user is likely to desire to a...
In a method for providing unified support for solid state storage, a solid state storage class drive is provided to enable uniform operating system access to plurality of dissimilar solid state storage devices. A common functionality of the plurality of dissimilar solid state storage devices is abstracted via a soli...
ABSTRACT
CREATING HOST-LEVEL APPLICATION-CONSISTENT BACKUPS OF VIRTUAL MACHINES
A host server hosting one or more virtual machines can back up host volumes and the one or more virtual machines installed thereon in an application-consistent manner. In one implementation, a host-level requestor instructs a host-leve...
A method of tracking a target includes receiving an observed depth image of the target from a source and obtaining a posed model of the target. The model is rasterized into a synthesized depth image, and the pose of the model is adjusted based, at least in part, on differences between the observed depth image and th...
A business programming library for use by an enterprise resource planning system provides a run-time environment and a library of API services for accessing common data types and business methods, accessing table and form meta-data, and database administration and retrieval/modification. The library provides the abi...
A method is presented for merging document metadata at a client computer. A document obtained from a server computer is opened by a user at the client computer. If the document does not include paragraph identifiers, a paragraph identifier is assigned to each paragraph in the document. When the document is opened by...
Techniques and tools for encoding enhancement layer video with quantization that varies spatially and/or between color channels are presented, along with corresponding decoding techniques and tools. For example, an encoding tool determines whether quantization varies spatially over a picture, and the tool also deter...
The present invention relates to systems and methods that mitigate the intrusiveness of communications between message senders and receivers while facilitating more courteous, seamless, and timely interactions. In one aspect, instant messaging and other forms of communications, such as push-to-talk voice communicati...
A dual module portable device may be provided. A motion of a first module of the dual module portable device may be detected. Based at least in part on the detected motion, a position of the first module may be determined relative to the second module of the portable device. Once the relative position of the first m...
Selecting and applying a behavioral component to a portion of a componentized workflow. The behavioral component defines error and exception handling, among other concerns, to the portion of the workflow selected by a user. During execution of the workflow, the behavioral components executes responsive to output fro...
Disclosed herein is a topologically protected p/8 gate which becomes universal when combined with the gates available through quasi particle braiding and planar quasi particle interferometry. A twisted interferometer and a planar p/8 gate in CTS implemented with the help of the twisted interferometer are disclosed. ...
The claimed subject matter relates to systems and/or methodologies that facilitate distributed storage of data. A distributed file system can be implemented on storage nodes such that the system places multiple copies of data (e.g., replicas) on a variety of disparate storage nodes to guarantee availability of the d...
An advertising framework for transmitting advertisements from wireless access points to client devices that need not be connected to the wireless access point. The client device can display the advertisements on a user interface of the client device. Such advertisements may be transmitted, for example, as part of a ...
Systems methods and apparatus for generating and validating product keys. In some embodiments a product key includes security information and identification information identifying at least one copy of a software product. The identifying information may be used to access validation information from at least one sour...
A digital media encoder/decoder includes signaling of various modes relating to computation complexity and precision at decoding. The encoder may send a syntax element indicating arithmetic precision (e.g., using 16 or 32-bit operations) of the transform operations performed at decoding. The encoder also may signal ...
In some embodiments of the invention, techniques may make private identifiers for private network resources usable to establish connections to those private network resources from computing devices connected to an outside network. For example, when a computing device is connected to an outside network and attempting...
Strategies are described for processing image information using a data structure which conveys color information. The color information describes color-related formatting applied to the image information. The data structure can be passed down a video processing pipeline, where each functional component in the pipeli...
A computing device with a configurable antenna. The antenna is configured through a switching circuit operating under software control. Operating characteristics of the antenna are configured based on connections between conducting segments established by the switching circuit, allowing the nominal frequency, bandwi...
A method, system, apparatus, and computer-readable medium for providing spreadsheet-driven key performance indicators are disclosed. According to the method, a spreadsheet-driven key performance indicator is created that includes a location of a spreadsheet, a location of a cell within the spreadsheet to be utilized...
Computerized methods and systems for dynamically rendering visual representations of data sets are provided. Upon receiving a request for a particular data set (for instance, in response to receiving a search request), a data set is identified and a minimum portion thereof is retrieved that is necessary to render a ...
An application programming interface (API) layer is implemented on a computing device. The API layer allows a local application(s) executing on the computing device to access web data in a data store layer, and further allows a remote application(s) that is executing on some other computing device to access the web ...
Modular content framework and document format methods and systems are described. The described framework and format define a set of building blocks for composing, packaging, distributing, and rendering document-centered content. These building blocks define a platform-independent framework for document formats that ...
Computer-readable media, computerized methods, and computer systems for alerting a user that an operating system has entered a secure mode is provided. Initially, inputs are received at an operating system residing in a default mode. Typically, the default mode allows applications running on the operating system to ...
Described is maintaining cached hash values for files in association with state data for each file that represents the state of that file"s contents at the time of hashing. For example, in a journaling file system, the state data may comprise the update sequence number of the file in the journal and a journal identi...
Techniques for collaborating on a spreadsheet file by client computers in real time are disclosed herein. In particular, a revision manager module is preferably provided with a host machine which receives updates from the client computers, processes such updates, and then applies them to the spreadsheet file. Additi...
Various embodiments enable repetitive gestures such as multiple serial gestures to be implemented efficiently so as to enhance the user experience. In at least some embodiments a first gesture associated with an object is detected. The first gesture is associated with a first action. Responsive to detecting the firs...
Embodiments are provided to manage external hardware appliances from a distributed operating system interface in a computer network using a driver model to communicate with device drivers associated with the external hardware appliances. In one embodiment, a request to manage an external hardware appliance in the co...
Various technologies and techniques are disclosed for providing and interacting with a centralized wake service. A server-side wake service is provided that is operable to allow applications to subscribe to the wake service. The wake service receives a wake request directed to a particular computing device from a pa...
A Universal Serial Bus (USB) compatible storage device is utilized as a security token for storage of cryptographic keys. A cryptographic subsystem of a processor accesses cryptographic keys in containers on the USB compatible storage device. Accessing includes storing and/or retrieving. The processor does not inclu...
Technologies are described herein for altering the appearance of a digital image using a shape. A mask edit mode of operation is provided in which an application program displays a mask shape superimposed on a digital image. The application program also provides user interface controls for altering the size, positio...
Provided herein are systems and methodologies for highly efficient restoration in a network-based backup system. As described herein, differential-based analysis can be utilized such that a new complete differential is calculated based on signatures and/or other information relating to a given item to be restored pr...
A computer user may use a computing environment comprising a set of computers that respectively feature a web browser having a browser cache containing many types of data objects, including application resources and user-generated data files. However, the contents of a browser cache significantly contribute to the c...
Technologies are described herein for creating, displaying, and editing a sub-process within a process diagram. A diagramming application provides for the grouping of existing process operations of a process diagram into a sub-process. The sub-process is displayed within the process diagram as a container that may b...
Universal Plug and Play (UPnP) technology may be used over the Internet or other wide area communications networks. In one illustrative example, a first UPnP-enabled device is to provide a UPnP service such as streaming media to various users over the Internet. The first UPnP-enabled device provides an on-line ident...
Techniques to manage media content for a multimedia conference event are described. A media content manager component is operative to generate a visual composition for a multimedia conference event. The media content manager component may comprise a video decoder module operative to decode multiple media streams for...
The present invention adds support for concurrency to a mainstream object-oriented language. Language extensions are provided that can enable program to be developed that can either be run in one address space, distributed across several process on a signal computer, or distributed across a local-area or wide-area n...
Embodiments are configured to provide information based on a user query. In an embodiment, a system includes a search component having a ranking component that can be used to rank search results as part of a query response. In one embodiment, the ranking component includes a ranking algorithm that can use the length...
Architecture for providing and processing a dictionary in a universal format such as XML, for example. The dictionary can be authored while in the universal format, designated for use with multiple compatible applications, and compiled on-the-fly using a dictionary compiler. The dictionary can be shared and/or distr...
Media timeline interaction may be provided. An electronic presentation may comprise a media object. A user may select the media object within a presentation application and use an on-object user interface in conjunction with the application's user interface to modify the media object. The user may also display the m...
Architecture that synchronizes meeting information (e.g., documents, agenda, action items, notes, attendees, join information, etc.) across the different stages of a meeting lifecycle. The architecture provides client-side synchronization across meeting lifecycle services that can include a scheduling server, conten...
Computer-readable media, computerized methods, and user interfaces (UIs) for manipulating display areas on a GUI workspace by transitioning the display areas from an original state to one of a set of enhanced window states are provided. Initially, an indication to resize a display area is received at an operating sy...
Techniques to share information between application programs are described. An apparatus may comprise a first appHcation program to create notes for an operator, and a second application program to display a target item. The apparatus may further include a note interface module to associate the note with the target ...
Various embodiments provide application- or browser-based, copy and paste operations. In one or more embodiments, a web browser supports copy and paste functionality thus enabling the user to easily move data from one location to another. The browser-based solution can thus relieve websites from having to include co...
Systems and methods for providing a system level user interface that can be invoked at any time during operation of a multimedia console are provided, enabling a user to interact with system level user data and/or initiate secondary behaviors or functionality not normally possible to achieve when the multimedia...
Systems and/or methods are described that enable a data-driven action associated with altering a data instance of a network form without altering and/or having access to the data instance. These systems and/or methods, in one embodiment, render a result of a data-driven action for a network form without transforming...
Described is a system and method including an auxiliary display platform having an interface (API) set that provides a way for client applications running on a main computer system to interact with various types of auxiliary displays, irrespective of differences between various device implementations. Interaction i...
Volume adjustment based on listener position is disclosed. A position of one or more speakers is identified, and a position of a listener is tracked. For each of the one or more speakers, a changing distance between that speaker and the listener is assessed. A volume of that speaker is automatically adjusted in real...
Computer systems, methods and media for optimizing an advertisement are provided. Creative elements for an ad campaign are received from an advertiser. In response to an ad call from a target device, device information, application information, and user information are accessed. Based on the accessed information and...
Strategies are described for monitoring resources (e.g., media resource) in a system that includes multiple processing mechanisms (e.g., set-top boxes) and multiple associated presentation devices (e.g., television sets). The strategies involve assigning one of the processing mechanisms the role of master processing...
A system and method for controlling access to a computer provides for loose security within a local network while retaining strong security against external access to the network In one embodiment, a user has access to trusted nodes in a secured group within an unmanaged network, without being required to choose, e...
One disclosed embodiment includes detecting flicker in a photographic setting by introducing a camera into the setting so that light is incident upon the camera. A plurality of samples are captured from a light detector circuit of the camera, each of which is dependent upon intensity of light incident upon the camer...
One or more techniques and/or systems are disclosed herein for relaying a request to a process running on a computing device from a web client and receiving a response from the process. A bridge message client disposed in a web application, running in a browser on a computer, opens a local connection to a process ru...
Described is a technology by which additional network communications capacity is provided to an oversubscribed base network where needed, through the use of dynamically provisioned communications links referred to as fly ways. A controller detects a need for additional network communications capacity between two ne...
A battery carriage is provided, including first and second dual-contact assemblies. The first dual contact assembly is disposed on a body portion of the battery carriage and the second dual contact assembly is disposed on a separable portion of the battery carriage. Each dual contact assembly includes a positive con...
A computer-implemented method (1000, 1100, 1800) of processing one or more video images having plural units, wherein binary symbols indicate whether the plural units are skipped or not. According to the method, a coding mode is selected (1010, 1110) from a group of plural available coding modes. The binary symbols a...
A scalable clustering system is described. In an embodiment the clustering system is operable for extremely large scale applications where millions of items having tens of millions of features are clustered. In an embodiment the clustering system uses a probabilistic cluster model which models uncertainty in the dat...
Providing content and/or functionality through a display of a locked computing device. Configuration data defined by a user or application vendor identifies the content and/or functionality to be made available. Upon receipt of the content, the computing device modifies the received content based on the configuratio...
A system and method are described to programmatically manage access between one or more nodes (12) and a plurality of associated devices (16, 18, 20, 22), such as shared storage units. Each node (12) is programmed to include a data structure (40, 46), which identifies whether an associated device (16, 18, 20...
Methods, systems, and computer program products that, by defining a common interface, allow for a single implementation of operations common to' both kernel mode and user mode processing, relative to a hardware adapter. Corresponding kernel mode and user mode implementations of the operations are provided. F...
The various methods and systems described herein are directed to3 supplying a secure channel for software executing on a host computer. The4 methods and systems address and provide solutions for an attack model in which5 rogue software executing on the host computer attempts t...
A technique to simplify L2CAP channel/configuration for a node is presented. The method enables a node to determine how involved it is in the L2CAP channel connection creation and management process. There are three levels of participation that the node may specify. The three levels are no involvement at all...
Methods, systems, and computer program products that reduce buffer requirements in a messaging system so that the messaging system can send or receive relatively larger messages using a given buffer size. Message handlers are provided, each identifying a corresponding processing operation to perform on a mes...
ABSTRACTACCESS TO AUDIO OUTPUT VIA CAPTURE SERVICEAn operating system has an audio system service that can capture all of thestreaming audio destined for an output device and make it available for processing.An application can perform the processing upon the captured streaming audio. ...
A video encoding system performs packetization of FGS/PFGS encodedvideo bitstreams by selecting encoded bitstream segments for packetization basedon an estimated total contribution-to distortion^ reduction associated, with eachencoded bitstream segment. The selected bitstream segments are t...
An architecture and methodology provides for automatic creation of arbitrary virtual network topologies form a physical computing system. The architecture and methodology allows automated and remote installation of multiple distributed applications on the same physical computing system without having to...
A method for segregating network traffic amongst a plurality of end stations incommunication with a network device comprising receiving from a first end station insaid plurality of end stations a request to crate a new personal VLAN at said networkdevice, wherein at least said first end sta...
User values and selections are collected and provided to a report server that customizes a generically defined report pursuant to the user values and selections. An ordered set of report parameters is declared in the definition of a report and then this parameter definition is used to drive user prompting an...
A method of interacting with aclient/server architecture with a 2.5G mobile phonehaving a data channel for transmitting data and avoice channel for transmitting speech. The methodincludes receiving a web page from a web serverpursuant to an application through the...
1. A command-based group text messaging system comprising:an initiating mobile communication device that creates a message forsubsequent broadcast to a recipient group; anda communication server that analyzes the message received from theinitiating mobile communication device a...
1. A method for detection and diagnosis of faults in a network comprising:detecting a discrepancy in operation of a network by:supplying data that describes the network to a network simulation (210) so that the network simulation provides an estimation of network performance (504); and
A method for power management of a network including a plurality of computing devices, comprising:identifying an order of flows between one or more computing devices within a prescribed time period; andreducing a number of wakeups for at least one computing device by increasing a number of adjace...
The universal input device provides a common user interface for a variety of different computing platforms including printed documents. Using the present system, one may use the universal input device to control various computing devices as well as capture handwritten electronic ink and have the electronic i...
A software update distribution system for distributing a software update over a communication network for distribution to client computers, comprising: a root update service node; and at least one child update service node; wherein the root update service node and the at least one child update service node a...
An extensible wireless framework for connecting to a wireless network is provided. The extensible wireless framework includes a network roaming service with a registration component and a network service component. The registration component registers extensible service modules and extensible drivers for pro...
A method of keyframing an object, comprising:identifying at least one property and a time for the object; creating a first compound key frame at the time; receiving a second time for the object; and creating a second compound key frame at the second time.
Predictive lossless coding provides effective lossless image compression of both photographic and graphics content in image and video media. Predictive lossless coding can operate on a macroblock basis for compatibility with existing image and video codecs. Predictive lossless coding chooses and applies one ...
The present invention provides a method and system for location-based digital rights management. Digital rights for protected content are restricted to a specific location or region by specifying the approved location of the consuming device within the license. This allows the content owner to specify the geographic...
A network security module, interposed between a computing device and a network such that all network activities between the computing device and the network pass through the network security module, for protecting the computing device from an identified security threat on the network, the network security mo...
A device comprising:a search effectuator that effectuates a search responsive to selection of a link that is included as part of an electronic program guide (EPG);a search results scrubber that scrubs search results, which are in a first format, from the effectuated search to produce scrubbed sea...
A header object (210) for a data file (200) is comprised of sub-objects (220, 230, 240, 250) which specify properties of the data stream and contains information needed to properly verify and interpret the information within the data object (290). In order to allow the protection of any set of sub-objects(22...
Methods and systems are provided for mapping and linking elements in a document to corresponding fields or queries in a database. A document is annotated with structural elements of a markup language, such as Extensible Markup Language (XML), in order to map portions of the document to the corresponding data...
A computer system uses a large heat sink to provide noiseless cooling, thereby avoiding the need for a conventional cooling fan that can be very noisy. The heat sink forms a part of a chassis that contains the motherboard and hard drive of the computer. The motherboard and hard drive are mounted in the chass...
A publishing program can provide continuous and real-time feedback on possible design problems while a document is being edited or created. The feedback can include displaying a user interface that has a real-time list of any design problems that may be a result of the current edits or creations in a documen...
Converting text may be provided. A user selectable element may be used to select text. The selected text may include a first text within an electronic document and a second text within an image. The second text within the image may be converted to character information by receiving the image. The image may have imag...
Receipts may be received at a location that a customer normally uses to receive electronic correspondence, such as an e-mail address, an instant messaging address, etc. Among the items that are sent to that location, those items that contain a receipt may be identified. The identified receipts, or information extrac...
A mining system applies queries to retrieve result items from an unstructured resource. The unstructured resource may correspond to a repository of network-accessible resource items. The result items that are retrieved may correspond to text segments (e.g., sentence fragments) associated with resource items. The min...
A method described herein includes acts of extracting at least one entity from an arbitrary web page being viewed by an individual on a computing device and comparing the at least one entity with social network data of the individual, wherein the social network data comprises a plurality of messages generated by mem...
A product key for a software product is obtained and an activation service is accessed by a device to activate the software product with the product key. A digital license associated with the software product is received from the activation service, and the digital license is bound to a set of user-identifying crede...
The present invention extends to methods, systems, and computer program products for resolving lock conflicts. For a state persistence system, embodiments of the invention can employ a logical lock clock for each persisted state storage location. Lock times can be incorporated into bookkeeping performed by a command...
A data center system includes a memory cache coupled to a data center controller. The memory cache includes volatile memory and stores data that is persisted in a database in a different data center system that is located remotely from the data center system rather than in the first data center system. The data cent...
User role based customizable searches where crawled documents may be evaluated against user roles or attributes during crawl time are provided. Metadata retrieved from searched documents may also be evaluated against the user roles and/or attributes such that customized search results ranking documents based on thei...
ABSTRACT SHARED FACE TRAINING DATA
Face data sharing techniques are described. In an implementation, face data for a training image that includes a tag is discovered in memory on a computing system. The face data is for a training image that includes a tag associated with a face. The face data is replicated in a lo...
One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the mathematical pairings for the curve are aggregated (e.g. into a single inversion in respective levels of a binary tree represe...
A system and method are disclosed for providing an extensible email having rich interactive browser capabilities. The system includes a service provider for receiving extensible emails from a third party platform and presenting the emails to a user s computing device. The extensible email includes URL metadata which...
Managed code, including applications, runtime, and driver, have a priori knowledgeof the client's exact hardware configuration, just as the JIT compiler has a priori knowledgeof the microprocessor type on the target computer system. At compile time, the compilerknows the effective version v...
[105] Systems and methods useful in communicating messages over a peer-to-peer network, optionally over transient connections to participants in a collaborative session (e.g., an "electronic whiteboard" session), are described. Examples of such systems and methods may include establishing a session for data...
As described herein, an intermediate representation of a source code file may be used to explicitly express exception handling control flow prior to generating object code for the source code. As further described herein, a single uniform set of instructions of the intermediate representation may be used for express...
A method of creating a menu for a handheld digital device in a development environment includes selecting a target device which has an associated operating system available to the development environment. An editor is called for creation of the menu. The editor uses the constraints of the associated target device op...
A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associ...
Multiple software component identifiers are maintained in a catalog of an operating system running on a device. Each of these software component identifiers corresponds to one of multiple software components installed on the device. The catalog is accessed in response to a request regarding one of the multiple softw...
Methods and devices are provided for adapting an I/O pattern with respect to a processing device using a non-volatile block storage device based on feedback from the non-volatile block storage device. The feedback may include information indicating a status of the non-volatile block storage device. In response to...
Information aggregation techniques are described. In an implementation a communication is received that includes an indication of a source of information associated with a non-member of the social network. Information associated with the non-member is aggregated from the source. The aggregation may be performed ...
[Class : 9] Computer Programs For Developing Other Computer Programs; Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications; Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs; Computer Programs For Running Development Programs And Application Programs In A Common Development En...
[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Electronic Spreadsheets And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Electronic Spreadsheets; Providing Technical Information In The Field Of Computer Software And Cloud Computing.
[Class : 9] Downloadable Software For Video Game Services.[Class : 42] Providing An Online Portal For Video Game&Nbsp;Services And&Nbsp;Social Networking
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Database Management Software[Class : 42] Cloud Computing Featuring Software For Use In Database Management And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Database Management; Providing Technical Information In The Field Of Computer Software And Cloud Computing.
[Class : 9] Battery Receptacles Featuring Dual Contact Assemblies To
Allow Battery Installation Without Regard To Batter Polarity
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 35] Advertising Services, Namely, Promoting And Marketing The Goods And Services Of Others Through Online Interactive Video Games By Enabling Consumers To Interact With Third Party Advertising Content Through Voice Or Body Gestures Via Computer Game Console And Sensor Devices.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Generating Displaying And Printing Fonts
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Consulting, Design, And Development Services Related Thereto In The Field Of Software For Facilitating Communications And Information Storage And Sharing Among People, Groups, Software Programs And Devices; Software As A Service (Saas) Services, Namely, Hosting Software For Use By Others For Facilitating Communications And Information Storage And Sharing Among P...
[Class : 38] Electronic Transmission Of Data Via The Internet And Other Computer And Electronic Communication Networks.[Class : 9] Operating System Software; Computer Software Enabling Users To Purchase, Download, Manage Software Applications For Mobile Devices, Portable Hand Held Devices, And Other Computing And Electronic Communication Devices.[Class : 35] Online Retail St...
[Class : 9] Mobile Phones; Television Receivers; Monitors For Computers; Lap Top Computers; Computers; Digital Versatile Disc Players; Portable Hard Disk Drives; Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images; Computer Application Software For Mobile Phones; Audio Receivers; Colour Printers; Tablet Personal Computers; Settop Boxes; Mouses For Comput...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically.[Class : 39] Electronic Storage Of Files And Documents For Others.[Class : 42] Providing Temporary Use Of Non Downloadable Software For Receiving, Displaying, Storing, Organizi...
[Class : 9] Computer Software, Namely Software For The Transmission, Recording, Reproduction, Display, Organization, Management, Manipulation And Review Of Messages, Text, Images, Files, Audio, Video And Audio Visual Content And Other Data For The Facilitation Of Communications Between Two Or Multiple Users Via Computer Networks, Communication Networks And The Global Informa...
[Class : 9] Computer Software, Namely, Programs For Creating Presentations, Graphics And Videos.[Class : 42] Cloud Computing Featuring Software For Use In Presentation Graphics And Accessing Remotely Stored Data For Such Applications: Providing Temporary Use Of On Line Non Downloadable Software And Applications For Presentation Graphics: Providing Technical Information In Th...
[Class : 9] Application Programming Interface (Api) For Computer Software Which Facilitates Online Services For Social Networking, Building Social Networking Applications And For Allowing Data Retrieval, Upload, Download, Access And Management; Computer Software To Enable Uploading, Downloading, Accessing, Posting, Displaying, Tagging, Blogging, Streaming, Linking, Sharing O...
[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Designing, Creating, Editing And Completing Electronic Forms And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Designing, Creating Editing And Completing Electronic Forms; Providing Technical Information In Th...
[Class : 9] Computer Software For Viewing Information And Content About Sports.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software, Computer Programs, Particularly For
The Preparation And Delivery Of Presentations Employing
Graphics, Visual Aids, And Subject Outlines For Viewing
Audiences
[Class : 9] Computer Software For Use In Note Taking, Namely, Computer Software For Recording, Organizing, Editing And Transmitting Audio And Visual Information And Images In Electronic Form; Computer Software For Viewing And Editing Meeting
Agendas And To Do Lists; Computer Software For Reminding Users Of Dates And Events; Computer Software For Accessing Shared Documents O...
[Class : 9] Software For Allowing Communication And Interaction Between Phones, Mobile Devices, Televisions, Video Game Consoles, Media Players, Computers, Digital Media Hubs, And Audiovisual Devices.
[Class : 9] Computer Software For Use In Displaying Fonts On Computer Screens And Other Display Devices; Computer Programs For Use In Creating Programs To Display Fonts; Computer Programs, Namely Font Programs; Computer Software For Enhanced Pixel Rendering; Display Screens Optimized For Enhanced Pixel Rendering And Resolution.
[Class : 35] Retail Store Services And Online Retail Services Featuring
Computers, Computer Hardware, Software, Computer
Games, Computer Peripherals, Portable Music Players And
Accessories, Personal Digital Assistants, Cell Phones And
Accessories, Video Game Consoles And Accessories,
Webcams, Books, Clothing, Back Packs, Messenger Bags,
Computer Bags And Novelty Items.
[Class : 9] Wireless Communication Devices,Namely ,Mobile Phones,Cellular Telephones,Personal Digital Assistants,And Hand Held Computers;Computer Software For Wireless Telecommunications For Use With Wireless Devices;Computer Operating System Software For Wireless Devices;Computer Operating System Software For Wireless Communication Device[Class : 38] Telecommunications Serv...
[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Presentation Graphics And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Presentation Graphics; Providing Technical Information In The Field Of Computer Software And Cloud Computing
[Class : 9] Computer Software, Namely, Spreadsheet Software; Computer Programs For Creating Charts And Graphs From Electronic Spreadsheets[Class : 42] Cloud Computing Featuring Software For Use In Electronic Spreadsheets And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Electronic Sprea...
[Class : 36] Providing Grants For Youth In The Fields Of Education, Training, Employment, And Entrepreneurship[Class : 41] Providing Information For Youths In The Fields Of Youth Education, Employment Training And Entrepreneurship Training; Providing Training Programs Relating To Opportunities For Youth In The Fields Of Education, Employment, And Entrepreneurship.
[Class : 9] Wireless Communications Devices, Namely, Mobile Phones, Cellular Telephones, Personal Digital Assistants, And Hand Held Computers; Computer Software For Use With Wireless Communication Devices.[Class : 38] Telecommunications Services, Namely, Offering Personal Communications Services Via Wireless Networks.
[Class : 9] Computer Software: Computer Server Software; Computer Database
Software.[Class : 42] Computer Services: Cloud Computing Services; Providing Information About Computers, Computer Software And Computer Servers: Online Computer And Computer Software Support And Troubleshooting Services: Services Related To Computer Server Software And Database Software.
[Class : 9] Cameras; Portable Communications Apparatus; Set Top Boxes; Smart Phones; Notebook Computers; Digital Colour Printers; Computers; Television Receivers; Personal Portable Terminal Devices For Recording, Organizing, Transmitting, Manipulating, Reviewing And Receiving Text, Data, Images And Audio Files Relating To Health And Wellness; Wearable Smart Phones In The For...
[Class : 9] Computer Game Software[Class : 41] Entertainment Services ,Namely ,Providing And On Line Computer Game.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Feature Of Non Downloadable Software Application Tool For Use On Smart Phones And Tablets To Edit An Electronic Document[Class : 42] Non Downloadable Software Application Tool Used To Edit Electronic Documents On A Website"
[Class : 9] Software For Creating And Managing Computer Template[Class : 42] Cloud Computing Featuring Software For Use In Designing, Creating, Editing And Completing Electronic Forms And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Designing, Creating Editing And Completing Electronic...
[Class : 9] Video Game Software[Class : 41] Providing A Website Through Which People Locate Information About Video Games; Entertainment Services, Namely, Providing Online Video Games.
[Class : 9] Computer Hardware; Computer Display And Input System Comprised Of A Projector, Camera And Computer Software For Displaying Images And Detecting Objects, User Gestures And Commands
[Class : 42] Web Site Hosting Services, Software Leasing Services, Consulting Services In The Fields Of Computers, Consulting Services In The Fields Of Computer Software, Consulting Services In The Fields Of Security And Authentication, Consulting Services In The Fields Of Telecommunications, Consulting Services In The Fields Of Electronics, Consulting Services In The Fields...
[Class : 42] Computer Services For Computer Networks And Global Communication Networks, Namely, User Identification, Registration And Authorization Services; Automating Login Procedures To Access Web Sites Or Internal Computer Networks; Encrypting And Securely Maintaining Personal And Financial Information And Data For Use In Electronic Commerce Transactions; Maintaining And...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software, Computer Programs, Namely Utility Programs And Programs To Assist Developers In The Creation And Modification Of Other Computer Programs.
[Class : 42] Providing On Line Magazines In A Wide Variety Of Fields, Namely, News, Sports, Entertainments, Television, Video Games, Computer , Technology, And The Internet, Via Cable And Satellite Networks,Wireless Networks, Computer Network And Global Communication Networks, Computer And Technical Consulting And Support Services, Namely, Troubleshooting And Computer Hardwa...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software; Computer Utility Programs; Computer Software For Encryption; Computer Software For Restricting & Access To Data And Computer Programs Stored On External Data Storage Media;
[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signaling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images, Magnetic Data Carries, Recording Discs, Automatic Vending Machines And Mechanisms For Coin Operated ...
[Class : 16] Publications, Namely, User Manuals, Instruction Guides, Referenc Guides, Newsletters, Magazines, Books About Computer Systems And Computer Programmes , Magazines And Newletters Distributed Over Computer Networks And Global Communications Network, Pens , Pencils Markers, Stationery,S Tationery Type Portfolios, Clipboards, Desk Sets,,Pen And Pencil Holders, Mounte...
[Class : 9] Computer Hardware And Peripherals; Webcams; Computer Software For Use As An Interface Between Webcams And Computers
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 39] Electronic Storage Of File And Documents For Other.[Class : 42] Non Dowloadable Software For Receiving, Displaying, Storing, Organzing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Image And Data Stored Electronically.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Utility Software; Computer Software For The Detection And Removal Of Computer Viruses And Threats; Computer Software For Managing And Filtering Electronic Communications; Computer Software For Protecting And Securing Computer Network And Applications; Computer Software For Encrypting And Authenticating Data; Computer Software For Detecting And Repairing ...
Renewal of trademark is due. Renewal request in prescribed form is to be filed by the applicant.
[Class : 9] Computer Hardware And Peripherals; Webcams; Computer Software For Use As An Interface Between Webcams And Computers.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Developing Other Computer Programs Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications; Computer Programs For Assisiting Developers In Creating Program Code For Use In Multiple Application Programs; Computer Programs For Running Development Programs And Applicatioin Programs In A Common Development E...
[Class : 9] Scientific Nautical, Surveying Electric Photographic Cinematographic; Optical Weighing Measuring Signaling Checking (Supervision) Life Saving And Teaching Apparatus And Instruments Apparatus For Recording Transmission Or Reproduction Of Sound Or Images, Magnetic Data Carriers Recording Discs Automatic Vending Machines And Mechanisms For A Coinoperated Apparatus, ...
[Class : 9] Tablet Computers And Peripherals Therefor; Computer Operating System Software; Operating System Programs; Graphical User Interface Software
[Class : 9] Operating System Programs; Computer Software For Controlling The Installation And Execution Of Software On Individual Computers In A Computer Network.
[Class : 9] Video Game Players; Electronic Devices For Accessing Global Computer And Communication Networks; Computer Hardware And Peripherals; Keyboards, Joysticks, Pointing Devices; Computer Software For Playing Video Games And For Accessing And Browsing Global Computer And Communication Networks; Computer Software For Compressing And Decompressing Data And Video Images, W...
[Class : 9] Computer Software For Enabling Data Communication Between Application Programs And Documents, Computer Software For Use In Developing Application Programs And Documents Capable Of Exchanging Data With Other Application Pograms And Documents; Computer Operating System Programs And Utility Programs For Data Exchange.
[Class : 9] Computer Software Used To Facilitate And Coordinate Synchronous And Asynchronous Communications And Collaboration Among Users, Third Party Software Programs, Computer Servers Or Processors.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Computer Virus Protection Services; Computer Security Services, Namely, Restricting Access To And By Computers And Computer Networks To And Of Undesired Web Sites, Media, Individuals And Facilities; Technical Support Services, Namely, Troubleshooting Of Computer Hardware And Software Problems; Maintenance Of Computer Software And Hardware; Monitoring The Compute...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software, Namely, Software For Information Management, Creating Spreadsheets, Tables, Graphs, And Charts, And For Organizing And Analyzing Data; Computer Software For Word Processing; Computer Software For Creation And Display Of Presentations Including Text And Graphics; Computer Software For Use In Note Taking, Namely, Computer Software For Recording, ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Enabling And Managing Simultaneous, Multiple Modes Of Communication Over Local Area Networks And The Internet Via Instant Messaging. Voice Over Internet Protocol (Voip), Video Conferencing, Audio Conferencing, Application Sharing, Computer Desktop Sharing, File Transfer, Sensing And Providing User Presence Information, And Telephony.[Class :...
[Class : 9] Computer Programs For Accessing And Using The Internet And The World Wide Web; Computer Programs For Disabling The History And File Caching Features Of A Web Browser; Computer Software For Notifying A User Of A Web Browser When Others Are Tracking Web Use And For Controlling The Information Others Can Access About Such Use
[Class : 9] Computer Operating System Programs: Operating System Software For Mobile Phones: Mobile Phones; Internet Browser Software: Computer Software For Managing And Controlling Servers For Backup, Storage And Organization Of Files And Data; Computer Programs For Operating And Managing Network Servers; Computer Network Operating Software And Utilities: Computer Software ...
[Class : 16] Paper, Cardboard And Goods Made From These Materials, Not Included In Other Classes, Bookbinding Materials, Printed Matter, Publications, Namely, Books, Newsletters, Magazines, Brochures And Pamphlets Concerning Cities, City Services Events And Business Located In And Around Cities, Including Maps, Schedules Information And Reviews On Sports, Entertainment, Educ...
[Class : 9] Computer Operating System Software; Operating System Programs
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Providing Information To Consumers Over Computer Networks,
Wireless Networks And The Internet In The Fields Of
Energy Usage And Consumption, Energy Conservation
[Class : 42] Computer Services And Consulting Services Related To Integration Of Private And Public Computing Environments To Facilitate Engagement And Interaction Between Local Governments And Citizens And Businesses In Connection With Resources, Energy, Water, Waste, Buildings, Infrastructure And Planning, Public Safety And Justice, Travel And Tourism, Recreation And Cultu...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 28] Toys And Games, Namely, Action Figures And Accessories Therefor; Balloons; Bathtub Toys; Toy Building Blocks; Dolls And Accessories Therefor; Doll Clothing; Board Games; Card Games; Play Cosmetics For Children; Costume Masks; Miniature Die Cast Vehicles; Toy Airplanes And Helicopters; Battery Operated Remote Controlled Toy Vehicles; Flying Discs; Inflatable Viny...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Publications, Namely Newsletters, Pamphlets, Magazines, Books, Instruction Manuals, Usert Guides And Reference Guides In The Field Of Computers, Software, And The Development Of Computer Systems And Software.
[Class : 9] "Computer Software, Namely Operating System Program";
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Use In Displaying Fonts On Computer Screens And Display Devices, Computer Programs For Use In Creating Programs To Display Fonts, Computer Programs, Namely Font Programs.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs, Namely, Game Software For
Use On Computers And Video Game Players In Class 9[Class : 41] Providing An On Line Magazine And Web Site
Featuring Information In The Field Of Computer Games,
Science Fiction, Games And Entertainment: Providing
Information On Line Relating To Computer Games And
Computer Enhancements For Games: Entertainment
Serv...
[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing An On Line Magazine And Web Site Featuring Information In The Field Of Computer Games, Science Fiction, Games And Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Pr...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Providing Enhanced Electronic Mail And Scheduling Capabilities, For Use By Individual Computer Users, Namely, Computer Programs For Managing, Viewing, And Editing Files, Documents, Electronic Mail Messages And Private Network And Global Computer Network Communications; Computer Programs For Meeting And Event Scheduling, Managing Group Calend...
[Class : 9] Computer Operating System Software; Computer Utility Programs; Computer Software For The Administration Of Computers Used By Multiple Users; Computer Software For Restricting User Access And Authorizations On Computers Used By Multiple Users; And Computer Software For Automating Updates To Software Programs And Computer Virus And Security Information.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 35] Advertising And Marketing Services,
Namely, Promoting The Goods And Services Of
Others By Placing Advertisements And Promotional
Displays In An Electronic Site Accessed Through
Computer Networks And By Delivery Advertisements
And Promotional Materials To Others Via Electronic
Mail.[Class : 38] Electronic Mail Services.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 35] Advertising And Marketing Services, Namely,
Promoting The Goods And Services Of Others By Placing
Advertisements And Promotional Displays In An Electronic
Site Accessed Through Computer Networks And By Delivery
Advertisements And Promotional Materials To Others Via
Electronic Mail.[Class : 38] Electronic Mail Service
[Class : 9] General Purpose Computer Database Management Software.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 41] Providing An On Line Magazine And Web Site Featuring Information In The Field Of Computer Games, Science Fiction, Games And Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing An On Line Computer Game ;[Class : 9] Computer Programs, Namely, Game Software For Use On...
[Class : 41] Educational Services And Entertainment, Namely, Sponsoring Competitions And Providing Incentives To Students To Demonstrate Excellence Through The Issuance Of Awards, All In The Field Of Computers, Computer Programming And Web Design, Graphic Design And Animation, And Film And Video Production.
[Class : 9] Computer Software For Simultaneous, Multiple Modes Of
Communication Over Local Area Networks And The Internet
Via Instant Messaging. Voice Over Internet Protocol
(Vo Ip"), Video Conferencing, Audio Conferencing,
Application Sharing, Computer Desktop Sharing, File
Transfer, Sensing And Providing User Presence Information,
And Telephony.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Computer Services Creating And Distributing Media For Use On Computer Network, Wireless Networks And Global Communication Networks; Web Site Hosting Services; Software Leasing Services; Consulting Services In The Fields Of Computers, Software, Electronics, Telecommunications, Security And Authentication; Providing Information On A Wide Variety Of Topics Over Com...
[Class : 35] Promoting The Goods And Services Of Other Via An Online Marketplace Website Providing Information About Vendors And Their Goods And Services.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking [Supervision],Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images, Magnetic Data Carriers. Recording Discs; Automatic Vending Machines And Mechanisms For Coinoperated ...
[Class : 41] Entertainment Services, Providing Interactive Multiplayer Game Services For Games Played Over Computer Networks And Global Communications Networks, Electronic Message And Chat Services For Use In Connection With Interactive Games Played Over Computer Network And Global Communications Networks, Providing Computer Games And Video Games That Can Be Accessed, Played...
[Class : 35] Retail Store Services And Online Retail Services
Featuring Computers, Computer Hardware,
Software, Computer Games, Computer
Peripherals, Portable Music Players And
Accessories, Personal Digital Assistants, Cell
Phones And Accessories, Video Game Consoles
And Accessories, Webcams, Books, Clothing,
Back Packs, Messenger Bags, Computer Bags
And Novelty Items
[Class : 16] Computer Hardware And Software Manuals; Computer Documentation Namely Reference, User, Instructional And General Utilities; Manuals And Data Sheets For Computer Hardware And Software Manufacturers, Producers And Users.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software For Mobile Phones; Computer Search Engine Software; Computer Programs For Searching Email, Text Messages, Address And Contact Information.
[Class : 9] A Feature Of Interactive Video Game Software Which Allows Players To Obtain Statistical Information Of Internal And External Features Of A Vehicle And To Virtually Navigate And Operate Those Vehicles.
[Class : 35] Promoting The Goods And Services Of Others By Means Of A Preferred
Customer Program Featuring Training, Certification, And Sales, Marketing And
Technical Support In The Fields Of Business, Sales, Marketing, And Cloud
Computing: Business Information Services, Namely, Providing Business
Assessment Tools To Others: Providing Information In The Fields Of Busines...
[Class : 9] Computer Software For Drawing And Illustrating, Computer Software For Graphic Design And Editing, Web Site Design, Computer User Interface Design, Design Of Multimedia Presentations, Animation And Film, Computer Software Development Tools And Web Site Development Software.
Renewal of trademark is overdue. Renewal with Restoration request in prescribed form is to be filed by the applicant.
[Class : 41] Entertainment Services, Namely, Website Providing Online User Reviews And Ratings For Videos Offered For Download Via The Internet.[Class : 38] Streaming Of Video Material On The Internet.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Downloading And Installing Other Software On A Personal Computer, And For Creating Back Up Copies Of The Downloaded Software.[Class : 35] Online Retail Store Services In The Field Of Software;[Class : 39] Electronic Storage Of Files And Documents For Others; Electronic Storage Of Documents And Files, Archival Copies Of Software, Software P...
[Class : 9] Computer Software For Browsing And Searching Photographs, For Viewing Photographs In Three Dimensional Models, For Creating Photographic Tours, And For Annotating Photographs And Photograph Collections[Class : 41] Online Photo Editing, Viewing And Animation Production Services; Online Photo Viewing And Sharing Services For Others Featuring Browsing, Editing And T...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software; Computer Utility Programs; Computer Software For Memory Managememt.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Providing Enhanced
Electronic Mail And Scheduling Capabilities,
For Use By Individual Computer Users, Namely,
Computer Programs For Managing, Viewing,
And Editing Files, Documents, Electronic Mail
Messages And Private Network And Global
Computer Network Communications; Computer
Programs For Meeting And Event Scheduling,
Manag...
[Class : 9] Word Processing Software; Computer
Programs For Creating, Editing, Sharing,
Storing, And Printing Documents Comprised Of
Text And Graphics And Utility Programs For Use
Therewith
[Class : 9] Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Game Consoles, Game Controllers, And Software For Operating Game Controllers; Electronic Devices, Namely Computer Hardware For Accessing Global Computer And Communication Networks; Computer Hardware And Computer Peripherals; Cameras; Computer Software For Playing V...
[Class : 9] Computer Software, Computer Pgograms For Developkng Other Computer Pograms, Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications, Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs, Computer Programs For Running Development Programs And Applications Programs In A Co...
[Class : 9] Computer Software For Providing, Network And Personal Computer Security, Anti Virus Protection, Intrusion Detection And Prevention, Computer System And Software Maintenance, Software Updates And Computer Backup And Restoration Included In Class 9.[Class : 42] Computer Virus Protection Services, Computer Security Service, Namely, Restricting Access To And By Compu...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Use In Not Taking, Namely, Computer Software For Recording, Organizing, Editing And Transmitting Audio And Visual Information And Images In Electronic Form; Computer Software For Viewing And Editing Meeting Agendas And To Do Lists; Computer Software For Reminding Users Of Dates And Events; Computer Software For Accessing Shared Documents (No...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Publications, Namely, User Manuals, Instruction Guides, Reference Guides, Newsletters, Magazines, Books About Computer Systems And Computer Programs, Magazines And Newsletters Distributed Over Computer Networks And Global Communication Networks, Pens, Pencils, Markers, Stationery, Stationery Type Portfolios, Clipboards, Desk Sets, Pen And Pencil Holders, Mount...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software, Namely, Operating System Programs And Utilities, Word Processing Programs, Address Book Programs, Calculator Programs, Terminal Emulation Programs, Programs For Downloading And Playing Audio And Video, Programs For Managing Computer Power Supplies, Programs For Use In Transmitting Data Between Computers And Other Electronic Devices, Computer Ma...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer, Software For Drawing And Illustating, Computer Software For Graphic Design And Editing Web Site Design, Computer User Interface Design, Design Of Multimedia Presentations Animation And Film, Computer Software Development Tools,And Web Site Development Software
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computers; Computer Peripherals; Computer Monitors; Personal Digital Assistants; Hands Held Computer; Set Top Boxes For Television; Cellular Phones; Encoded Smart Cards Containing Memory; Computer Servers; Computers And Software For Use In Transmitting And Receiving Data Over Wireless Networks; Computer Operating Systems And Computer Programs For Use Therewith, N...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Providing Access To The
Internet; Computer Software For Providing A Graphical
User Interface To Access Commands And Website Links[Class : 35] Providing Online Information In The Field Of Business;
Online Telephone Directory Services; Online Business
Directory Services; Providing Online Consumer
Information Concerning Automobiles; Provid...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Magazines, Newspapers, Newsletters, User Guides, User Manuals And Bboks Relating To Computer And Computer Software
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs Pre Recorded On Disks, Diskettes, Cartridges, Optical Disks, Computer Chips And Compact Disk Read Only Memories; Computers; Computer Components; Computer Peripherals; Information Stored In Or On Electronic, Magnetic, Optical Or Other Media; Holograms, Display Devices For Controlling Menu Selections And Images On A Display Screen.
[Class : 38] Telecommunications Services; Services Offered Over Wireless Networks; Electronic Mail Services; Instant Messaging Services; Providing Information In The Field Of Telecommunications; Providing Multiple User Access To A Global Computer Information Network; Providing Online Chat Rooms And Electronic Bulletin Boards For Transmission Of Messages Among Users In The Fi...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Scientific, Nautical, Surveying, Electric Photographic,Cinematographic, Optical Weithing Measuing, Signalling, Cheking, (Supervision) Life Saving And Teching Apparatus And Instruments, Appratus For Recording Transmission Or Reproducation Of Sound Of Images, Magnetic Data Carriers, Recording Discs, Autometic Vending Machines And Machinsims For Coin Operated Appa...
[Class : 9] Computer Software For Simultaneous, Multiple Modes Of
Communication Over Local Area Networks And The Internet
Via Instant Messaging. Voice Over Internet Protocol
(Voip), Video Conferencing, Audio Conferencing,
Application Sharing, Computer Desktop Sharing, File
Transfer, Sensing And Providing User Presence
Information, And Telephony.
[Class : 9] Game Software.[Class : 41] Providing A Website Featuring Information In The Field Of Games And Home Entertainment; Entertainment Services, Namely, Providing Online Video Games.
[Class : 9] Computer Software For Recording, Organizing Editing And Transmitting Information In Typed, Handwritten And Voice Format, Computer Software For Viewing And Editing Calendars, Meeting Agendas, To Do Lists And Slide Presentations, Computer Software For Reminding Users Of Dates And Events, Computer Software For Accessing Web Messaging And Shared Documents, Computer S...
[Class : 9] Computer Programs For Use On Network Servers And For Administering Computer Networks, Namely Operating System Programs, Network Management Tools And Utility Programs For Use By Network Administrators, Systems Management Tools For Managing Personal Computer Hardware & Software Over The Network, Communication Programs For Linking A Network To Another Computer Syste...
[Class : 9] Computer Software For Browsing The Internet And Private Networks, And For Enhancing The Abilities Of Web Browser Software; Computer Software For Viewing And Listening To Video, Animation And Audio; Computer Software For Creating And Authoring Of Web Based Applications, Video, Animation And Audio
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer, Software For Analyzing And Comparing Images; Computer Software For Identifying Individuals Using Images.[Class : 42] Online Non Downloadable Computer Software For Analyzing And Comparing Images; Online Non Downloadable Computer Software For Identifying Individuals Using Images.
[Class : 42] Providing Online Information Concerning The Design, Development And Implementation Of Software; Providing A Website For Students To Download Computer Software, Website And Game Development Tools And Obtain Technical Support Information Concerning Computer Software, Computer Systems And Computer Software, Website And Game Application Development, Deployment And M...
[Class : 16] Paper, Cardboard And Goods Made From These Materials, Not Included In Other Classes, Printed Matter, Books, Documentation For Computer Programs, Computers, Computer Components, Computer Peripherals And Display Devices For Controlling Menu Selections And Images On A Display Screen, User Manuals, Reference Manuals And Technical Manuals, Data Sheets, Reference Card...
[Class : 16] Publication, Namely Books, Newsletters, Magazines, And User Manuals; Magazines And Newsletters Distrributed Over Computer Networks And Global Communication Networks'
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 35] Advertising Services Including Dissemination Of Advertising For Others Via The Internet, Business Services Including Providing Links To The Websites Of Others, Providing Consumer And Product Information.[Class : 38] Telecommunication Services, Including Receipt And Delivery Of Information, Messages, Documents, Images And Other Data By Electronic Transmission.[Cl...
[Class : 9] Operating Systems Software; Computer Utility Programs; Computer Software Platforms For Developing And Operating Remote Display Devices; Computer Software Development Tools; Computer Peripherals; Laptop Computers Including Auxiliary Displays; Wireless Computer Peripherals; Wireless Telephones;
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 41] Entertainment Services, Namely, Providing Online Video Games.[Class : 9] Game Software.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Database Management And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Database Management; Providing Technical Information In The Field Of Computer Software And Cloud Computing
[Class : 41] Education Services, Namely, Online Tutorials In The Field Of Computers, Computer Software And Computer Systems; Providing Online Information In The Fields Of Home Entertainment, Games, Digital Photography, Digital Music, Home Finance
[Class : 38] Providing On Line Forums And Chat Rooms For The Transmission Of Messages Among Computer Users Concerning Computer Ha...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software, Computer Utility Programs; Graphical User Interface Software; Computer Software For Use In The Creation, Delivery, Playing And Viewing Of Video, Music, Graphics, Photos, Audio, Text Other Media, Computer Programs And Other Data
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software; Computer Utility Programs; Graphical User Interface Software; Computer Software For Use In Searching And Organizing Programs, Files And Data Stored On A Computer System Or Network";
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 28] Handheld Units For Playing Video Or Computer Games, And Operating Systems Software For Use Therewith; Stand Along Video Output Game Machines And Operating Systems Software For Use Therewith; And Tyos, Games, Video Games And Sporting Goods'
[Class : 16] Publications, Namely, Brochures And Information Sheets In The Fields Of Business, Sales, Marketing, Computer Software And Computer Systems.[Class : 35] Promoting The Goods And Services Of Others By Means Of A Preferred Customer Program Featuring Training, Certification, And Sales, Marketing And Technical Support; Organizing And Conducting Trade Shows And Exhibit...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs And Data In The Form Of A Multi Media Encyclopedia And Instruction Manuals Therefor Sold As A Unit.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Providing Online Non Downloadable Software For Browsing And Searching Photographs, For Viewing Photographs In Three Dimensional Models, For Creating Photographic Tours, And For Annotating Photographs And Phogograph Collections";[Class : 41] Online Photo Editing, Viewing And Animation Production Services; Online Photo Viewing And Sharing Services For Others, Feat...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computerprograms, Namely Computer Software For Recognizing, Analyzing, And Understanding Written Or Spoken Languages; Speech To Text Conversion, Text To Speech Conversion And Speaking Commands To The Computer
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operting System Programs; Computer Software For Viewing, Accessing And Controlling Mobile Phones, Personal Digital Assistants (Pdas), Portable Media Players, Cameras, Printers, Scanners And Other Devices Connected To A Computer.[Class : 35] Advertising And Advertisement Services, Namely Promoting The Goods And Services Of Others Through Advertsisements To Compute...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software, Namely A Business Productivity Program
Feature Providing A Dashboard For Management, Navigation,
Access, Storage, And Sharing Of Documents And Files
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Operating System Software; Network Operating Software; Computer Software Development Tools; Website Development Software; Computer Software That Provides Webbased Access To Applications And Services Through A Web Operating System Or Portal Interface; Computer Software For Developing And Operating Cloud Computer Networks And Applications; Computer Softwar...
[Class : 9] Operating System Software For Storing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Computer Software For Computer System And Web Based Application Development, Deployment, And Management; Computer Software Platforms For Storing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Computer Software For Receiving,...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computers; Computer Peripherals; Hand Held Computers; Mobile Computers; Personal Digital Assistants; Computer Operating System Software; And A Full Line Of Computer Application Software
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 41] Providing A Website Through Which People Locate Information About Video Games; Entertainment Services, Namely, Providing Online Video Games.[Class : 9] Video Game Software.
[Class : 9] Computers, Office Equipments, Business Machines And Electrical And Electronic Equipment Including Computes And Computer Programs Contained Therein, Namely, Answering Machines, Voicemail Equipment And Systems, Vending Machines, Parking Meters, Audio Conferencing Equipment And Systems, Data Conferencing Equipment And Systems, Attendant Console Equipment And Systems...
[Class : 38] "Telecommunication Services; Services Offered Over Wireless Networks; Electronic Mail Services; Instant Messaging Services; Providing Information In The Field Of Telecommunications; Providing Multiple User Access To A Global Computer Information Network; Providing Online Chat Rooms And Electronic Bulletin Boards For Transmission Of Messages Among Users In The Fi...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software, Namely, Software For Information Management, Creating Spreadsheets, Tables, Graphs, And Charts, And For Organizing And Analyzing Data; Computer Software For Word Processing; Computer Software For Creation And Display Of Presentation Including Text And Graphics; Computer Software For Electronic Mail And Instant Messaging Services, Calendar And M...
[Class : 9] Computer Software Platforms And Programming Tools For Applications For Mobile Devices[Class : 42] Computer Software Design, Development, Engineering, Debugging, Technical Support, Maintenance, Updating, And Management Services; Computer Services, Namely, Providing Online Services To Support Mobile Applications, Including Problem Reporting, Mobile Analytics, Data ...
[Class : 9] Computer Software Platforms For Computer Modeling, Digital Simulation, Animation And Visualization Applications; And Computer Software Development Tools.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Browsing The Global Computer Network And Secure Private Networks.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 35] Advertising Services; Business Services; Business Consulting Services[Class : 16] Publications, Namely, User Manuals, Instruction Guides, Reference Guides, Newsletters, Magazines, Books, All About Computers, Computer Software, Computer Systems, Business, Business Management And Accounting[Class : 9] Computer Software, Namely A Full Line Of Computer Software For ...
Renewal of trademark is due. Renewal request in prescribed form is to be filed by the applicant.
[Class : 9] Computer Software For Use By Business Enterprises To Manage Their Financial Business And Customer Information Computer Software For Supply Side Management Customer Relationship And Accounting
[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players; Downloadable Electronic Games And Content For Use In Electronic Games Via The Internet And Wireless Devices
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software; Computer Search Engine Software; Computer Programs For Accessing Computer Networks, Wireless Networks And The Internet; Computers And Computer Peripherals; Cable And Satellite Television Boxes And Accessories Therefor For Providing And Utilizing On Screen Electronic Schedules For Broadcast, Cable And Satellite Program Listings And Entertainment...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software, Computer Software For Use With Audio And Video Devices, Computers, Computer Hardware, Computer Peripherals, Television Set Top Boxes, Remote Controllers For Audio Devices, Video Devices And Personal Computers; Computer Software For Viewing, Searching And Playing Prerecorded Audio And Internet Radio, Computer Software For Viewing, Sear...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Webcam Hardware And Computer Software For
Analyzing Scenes And Automatically Providing
Exposure Settings To Improve Image Quality.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Hard Drives For Computers; Computer Memory Hardware; Computer Software For Controlling Personal Computer Power Supplies And Hard Drives For Use Therewith; Operating System Software; And Computer Utility Programs;
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Accessing And Using The World Wide Web; Computer Programs For Deleting Search History After Accessing Websites .
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 38]
Broadcasting Services, Providing Video And Television Programming Over Broadband, Cable, Satellite And Wireless Networks; And Video On Demand Services Via Broadband Networks.
[Class : 41] Entertainment Service; Providing Information Concerning Television And Video Programming; Providing Online User Guides Featuring Information On Television And Video Programs...
[Class : 42] "Non Downloadable Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically"[Class : 9] "Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Im...
[Class : 9] Computer Memory Hardware; Computer Peripherals; Computer Software For Controlling Computer Memory Hardware; Operating Systems Software; And Computer Utility Programs.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Email, Calendaring, Contacts Management And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Email, Calendaring, And Contacts Management; Providing Technical Information In The Field Of Computer Software And Clou...
[Class : 9] Word Processing Software; Computer Programs For Creating, Editing And Printing Documents Comprised Of Text And Graphics And Utility Programs For Use Theirwith.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Providing Online Information Concerning The Design, Development And Implementation Of Software; Providing A Website For Small And Medium Sized Business To Download Computer Software, Website And Software Development Tools; And Providing A Website For Small And Medium Sized Business To Obtain Technical Support Information Concerning Computer Software, Computer Sy...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs, Namely, Operating System Programs And Utilities; Browser Programs For Accessing Information Stored On Computer Networks And Golbal Communication Networks; Computer Programs Providing Enhanced Multimedia And Graphics Displays; Computer Programs For Receiving Graphics And Display Information Over Computer Networks And Global Communication Network...
[Class : 9] Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically.[Class : 42] Electronic Storage Of Files And Documents For Others.[Class : 42] Providing Temporary Use Of Non Downloadable Software For Receiving, Displaying, Storing, Organizi...
[Class : 9] Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Game Consoles, Game Controllers, And Software For Operating Game Controllers; Electronic Devices, Namely Computer Hardware For Accessing Global Computer And Communication Networks; Computer Hardware And Computer Peripherals; Cameras; Computer Software For Playing V...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software, Computer Software For Controlling The Operation Of Audio And Video Devices, Namely, For Recording Playback Storing And Sorting Using Such Devices, Computers, Computer Hardware, Computer Peripherals Television Set Top Boxes, Remote Controllers For Audio Devices, Video Devices And Personal Computers, Computer Software For Viewing Searchin...
Renewal of trademark is overdue. Renewal with Restoration request in prescribed form is to be filed by the applicant.
[Class : 39] Physical Storage Of Electronically Stored Files And Documents.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Photographic And Cinematographic Apparatus And Instruments, Animated Cartoons; Apparatus For Recording, Editing, Transmission Or Reproduction Of Sound Or Images (Including Television Programs): Compact Disc Players, Computer Game Programs, Computer Software And Programs, Audio And Video Compact Disc, Tapes And Cassettes, Dvd Players, Films, Exposed, Juke Boxes Fo...
[Class : 9] House Mark For A Full Line Of Computer Software.[Class : 42] House Mark For A Full Line Of Online Non Downloadable Software.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Developing Other Computer
Programs: Compiler Programs, Debugger Programs And
Utility Programs For Creating Graphical Applications;
Computer Programs For Assisting Developers In Creating
Program Code For Use In Multiple Application Programs:
Computer Programs For Running Development Programs
And Application Programs In A Common Developm...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] "Computer Software; Network Software; Workgroup And Project Management Software; Software For Designing, Creating, Maintaining And Accessing Customized Internal Network Sites And Global Communication Network Sites; Computer Authoring Software For Use On Internal Computer Network And Global Communication Networks, Namely, Software For Creating, Editing And Deliver...
[Class : 9] Computers, Computer Peripheral Devices Handheld Computers, Dvd Players, Set Top Boxes For Television , Pages, Cellular Phones, Smart Cards, Servers, Operating Systems Programs Therefor And A Full Line Of Computer Applications, Programs For Use Therewith, Computer Programs For Managing Communications And Data Exchange Devices, Electronic Equipments For Playing Gam...
[Class : 9] Computer Software For Delivery Of Broadcast Quality Video And Television Programming Over Broadband, Cable, Satellite And Wireless Networks; Computer Software For Providing Video On Demand Services; Downloadable Films And Tv Programs Provided Via Video On Demand; Computer Software For Transmitting Personal Photos, Video And Music Over Broadband, Cable, Satellite ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computers; Tablet Computers; Laptop Computers; Mobile
Computers; Reader For E Books And Other Electronic Publications; Computer Peripherals; Wireless Computer Peripherals; Mobile Communications Modules For Use With Tablet Computers; Headphones; Audio Speakers; Computer Keyboards; Electronic Musical Keyboards; Computer Mouse; Webcams; Digital Pens; Power Cords; B...
[Class : 42] Computer Services, Namely, Providing Search Engines For Obtaining Data On A Global Computer Network; And Computer Services, Namely, Search Engine Services For Assessing The Frequency Of Search Terms On The Internet And The Popularity Of Search Topics Among Internet Users.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Sharing, Managing Viewing And Editing Files, Documents Electronic Mail Messages And Internal Network And Global Communications Network Communication Group Calendars Computers Programs For Task Managements Delegations And Reporting Computer Progress For Recording Notes. Computer Programs For Transferring Data To And From Databases And To From...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Publications, Namely, Strategy Guides, User Manuals, Comic Books, Series Of Fiction And Nonfiction Books, Magazines And Newsletters All In The Fields Of Computers, Computer Hardware, Computer Peripherals, Computer Software, Computer Networks, The Internet, Interactive Television, Computer Games, Video Games, Science Fiction, Games, Entertainment Science, Social ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Technical Support And Technical Consultation Services In The Field Of Software Development For Video Game And Computer Game Software; And Providing Online Information In The Field Of Software Development And Technical Support For Video Game And Computer Game Software';[Class : 41] Educational Services, Namely, Conducting Seminars, Conferences And Workshops In Th...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Utility Software; Computer Software For The Detection And Removal Of Computer Viruses And Threats; Computer Software For Managing And Filtering Electronic Communications; Computer Software For Protecting And Securing Computer Networks And Applications; Computer Software For Encrypting And Authenticating Data; Computer Software For Detecting And Repairing...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] A Feature Of Interactive Video Game Software Which Allows Players To Obtain Statistical Information Of Internal And External Features Of A Vehicle And To Virtually Navigate And Operate Those Vehicles.
[Class : 9] Computer Software, Namely, Operating System Programs And Utilities, Word Processing Programs, Address Book Programs, Calculator Programs, Terminal Emulation Programs, Programs For Downloading And Playing Audio And Video, Programs For Managing Computer Power Supplies, Programs For Use In Transmitting Data Between Computers And Other Electronic Devices, Computer Ma...
[Class : 9] Operating System Software And Utilities; Computer Software For Administratioin Of Computer Networks; And Computer Software Development Tools For Use By Computer Network Administrators.
[Class : 9] Computer Programs, Computers, Computer Components, Computer Peripherals, Information Stored In Or On Electronic, Magnetic, Optical And Other Media Holograms, Display Devices For Controlling Menu Selections And Images On A Display Screen.
[Class : 9] Software, Namely, Operating System Software; Server Software; Network Operating And Management Software; Utility Programs; Software Development Programs; Computer Software Development Tools; Web Site Development Software; Security And Authentication Software; Software That Provides Web Based Access To Applications And Services Through A Web Operating System Or Po...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Drawing And Illustrating, Computer Software For Graphic Design And Editing, Web Site Design, Computer User Interface Design, Design Of Multimedia Presentations, Animation And Film, Computer Software Development Tools, And Web Site Development Software.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Operating System Software; Operating System Programs; Graphical User Interface Software.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Accessing Computer Networks And Global Communication Network, Computers And Computer Peripherals Handheld And Portable Computers And Communication Devices Personal Digital Assistants (Pdas), Global Communication Network Appliances, Television, Television Set Top Boxes, Cable Television Controller, Remote Control Devices For Television, Elect...
[Class : 9] Computer Software That Searches, Analyzes And Compiles Information From More Than One Source Into An Iterated Display, Computer Software For Building And Development Websites And Web Software Components, Web Site Hosting Computer Software[Class : 42] Computer Software Development And Programming Services, Web Site Hosting Services For Others, Computer Services, N...
[Class : 9] Computer Software, Computer Hardware, Computer Peripherals Including Computer Screen Cursor Control Devices, Computer Keyboards, Joysticks And Keypad Control Devices For Use With Computer Video Games.
[Class : 42] Computer Services; Technical Support Services, Providing Information On Various Topics Via The Internet; Providing Online Chat Rooms And Electronic Bulletin Boards For Transmission Of Messages Among Users; Providing Information In The Fields Of Computers, Computer Software And Computer Systems; Consultation Services In The Fields Of Selection, Implementation And...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] 'Computer Software Specifically Designed For Creating, Delivering, Playing And Viewing Of Video, Graphic, Audio And Music ; Operating System Software; Computer Software For Controlling The Operation Of Audio And Video Devices, Namely ,For Recording, Playback, Storing And Sorting Using Such Devices; Computer Software For Processing Digital Music Files; Computer So...
[Class : 9] Sceintific, Nautical Surveying Electric , Cienematographic, Photographic, Optical Weighing Measuring Signaling,Cheking (Supervision) Life Saving Teaching Apparatus And Instruments Apparatus For Recording Transmission Or Reproduction Of Sound Or Im,Ages Magnetic Data Carries, Recorsing Discs, Automatic Vending Machineand Machinisms For Coin Opreated Apparatus Cash...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System For Mobile Phones (Cell Phones).
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Allowing Mobile Device Users To Send Messages, Make Payments And Access And Play Music,Games And Videos On Mobile Devices;Computer Software Platforms For Developing Mobile Applications;Computer Software,Namely,Software Development Tools For The Creation Of Mobile Applications;Computer Software For Running Retail Store Site For Purchase And D...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Synchronizing Files And Data
Stored On Different Computers; Computer Software
For Remotely Accessing Other Computers.
[Class : 9] Computer Software For Use By Healthcare Providers; Computer Software For Collecting, Storing, Editing, Organizing, Modifying, Reviewing, Analyzing, Transmitting And Sharing Of Data And Information In The Fields Of Healthcare, Social Care, Medicine And Prescribing Of Medicines Including Patient Records, Clinical Care Information, Facilities Information, Health Pro...
[Class : 9] Browsers, Namely, Software For Browsing The Global Computer Network And Secure Private Networks, And Software Programs To Connect Computers To The Global Computer Network And To Secure Private Networks.
[Class : 9] Computer Application Software For Mobile Phones, Handheld Computers, Laptops And Desktop Computers, Namely, Software For A Word Finding Game.
[Class : 9] Application Programming Interface (Api) For Computer Software Which Facilitates Online Services For Social Networking, Building Social Networking Applications And For Allowing Data Retrieval, Upload, Download, Access And Management; Computer Software To Enable Uploading, Downloading, Accessing, Posting, Displaying, Tagging, Blogging, Streaming, Linking, Sharing O...
[Class : 9] Computers And Computer Peripherals Featuring Near Field Communication ("Nfc) Connectivity; Computer Software For Providing Near Field Communication (Nfc) Connectivity.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 36] Providing Information Concerning Real Estate, Real Estate Financing, Real Estate Agents And The Purchase, Sale And Rental Of Real Estate, All Via Computer Networks And Global Communication Networks, Providing Information Over Computer Networks And Global Communication Networks In The Fields Of Finance, Investment, Money And Banking, Retirement Planning And Wills...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Software Capable Of Causing Transmission Of A Message From A Message Originator To Multiple Predefined Recipients Across A Wired And/Or Wireless Network.
[Class : 9] Computer Programs For Accessing Computer Networks And Global Communication Networks; Computers And Computer Peripherals Handheld And Portable Computers And Communication Devices; Personal Digital Assistants (Pdas); Global Communication Network Appliances; Televisions; Television Set Top Boxes; Cable Television Controllers; Remote Control Devices For Televisions; ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software Platform And Development Tools, Namely Programming, Models, Class Libraries And Utilities For Writing And Running Applications Written With Managed Code.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software; Graphical User Interface Software.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical Weighing, Measuring, Signaling, Checking (Supervision), Life Saving And Teaching Apparatus, And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Mages, Magnetic Data Carriers, Recording Discs. Automatic Vending Machines And Mechanisms For Coin Operat...
[Class : 9] Computer Programmes Prerecorded On Tapes, Disks, Diskettes, Cartridges, Cassettes, And Within Ready Only Memories, Computer Programmes And Related User Manuals And Instructional Guides Sold As A Unit.
Renewal of trademark is due. Renewal request in prescribed form is to be filed by the applicant.
[Class : 9] Scientific, Nautical, Surveying, Photographic, Cinematographic, Optical, Weighing, Measuring, Signaling, Checking, (Supervision), Life Saving And Teaching Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating, Or Controlling Electricity, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images, Magnetic Data ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software; Computer Software For Displaying Video And Three Dimensional Images As Background On A Computer Screen
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Providing Online Information The Design,!
Development And Implementation Of Software; Providing A Website For Designers,
Developers And Hosts Of Sites On Computer Networks To Download Computer Software,
Website And Software Development Tools; And Providing A Website For Designers,
Developers And Hosts Of Sites On Computer Networks To Obtain Technical Support...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Software, Namely; Operating System Software ; Server Software; Network Management Software; Utility Programs; Software Development Programs; Security And Authentication Software; Copmputer Programs For Operating Computer Peripherals, Handheld Computers, Personal Digital Assistants, Radio Pagers, Cellular Phones, Tlevision And Cable Set Top Boxes,Game Consoles, Di...
[Class : 9] Computer Software For Use In Note Taking,
Namely, Computer Software For Recording,
Organizing, Editing And Transmitting Audio And
Visual Information And Images In Electronic
Form; Computer Software For Viewing And
Editing Meeting Agendas And To Do Lists;
Computer Software For Reminding Users Of
Dates And Events; Computer Software For
Accessing Sha...
[Class : 42] Non Downloadable Computer Software In The Fields Of Storing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Nondownloadable Computer Software In The Fields Developing Online Systems And Applications; Providing Information In The Fields Of The Development Of Computer Systems, Networks And Software, Over Computer Networks, Wireless Netwo...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Application Software For Mobile Phones, Handheld Computers, Laptops And Desktop Computers, Namely, Software For A Word Finding Game.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For The Transmission And Display On Computers, Computer Displays And Mobile Devices Of Graphics And Application Programs Running On Another Computer; Computer Software For Facilitating Communication Between Computers.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Game Consoles, Game Controllers, And Software For Operating Game Controllers; Electronic Devices, Namely Computer Hardware For Accessing Global Computer And Communication Networks; Computer Hardware And Computer Peripherals; Cameras; Computer Software For Playing V...
[Class : 36] Equipment Financing Services; And Lease Purchase Financing[Class : 35] Licensing Of Computer Software; Electronic Payment Services; And Retail Store And Online Retail Services Featuring Computers, Computer Peripherals, Personal Digital Assistants And Computer Software[Class : 42] Leasing Of Computers, Computer Equipment And Computer Software; And Providing Tempo...
[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical , Weighing, Measuring, Signalling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Of Images, Magnetic Data Carriers, Recording Discs, Sutomatic Vending Machines And Mechanisms For Coin Operat...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Books, Documentation For Computer Programs, Computers, Computer Components, Computer Peripherals And Display Devices For Controlling Menu Selections And Images On A Display Screen, User Manuals, Reference Manuals And Technical Manuals, Data Sheets, Reference Cards And Templates Periodicals, Magazines And Newsletters, Labels And Holographic Labels.
[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Entertainment Services, Namely, Providing An Online Computer Game.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Developing Other Computer Programs; Debugger Computer Programs And Utility Computer Programs For Creating Graphical Applications; Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs.
[Class : 9] Operating System Software; Computer Utility Programs; Graphical User Interface Software; And Computer Software For Use In The Creation, Delivery, Playing And Viewing Of Video, Music, Graphics, Photos, Audio, Text, Other Media, Computer Programs And Other Data";
[Class : 16] Telecommunication, Data, Electronic And Multidedia Communications; Internet Services, Connecting, Supplying And Transmitting Data, Information And Communications By Telephones, Computer, Electronic Mail, Laserbeam, Satellite Or By Electrinic Or Optical Means; Audio And Videio Conferencing And Communications; Telecoferencing In Class 16
[Class : 35] Organizing, Arranging, Conducting And Promoting Of Trade Shows, Exhibitions And Business Conferences In The Fields Of Computer Hardware, Software, Telecommunications, And High Technology And In The Field Of Development Of Computer Programs And Systems; Computer Software Licensing Services; Providing Information In The Fields Of Business, Business Communication A...
Renewal of trademark is due. Renewal request in prescribed form is to be filed by the applicant.
[Class : 9] Computers, Computer Boards And Peripherals, And Computer Software For Speech, Speaker, Voice And/Or Voice Print Recognition, Identification, Authentication, Validation, Verification And Processing, And For Language Recognitions, Computer Software Applications Using Speech, Speaker, Voice And/Or Language Recognition Technology In The Fields Of Banking And Financia...
[Class : 16] Computer Hardware And Software Manuals, Comuter Documentation Namely Reference, User, Instructional, And General Utilities Manuals And Tata Sheets For Computer Hardware And Software Manufacturers, Producers And Users.
[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments; Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images; Magnetic Data Carriers, Recording Discs; Automatic Vending Machines And Mechanisms For Coinoperated...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 35] Advertising And Marketing Services Included In Class 35.[Class : 38] Communication Services, Telecommunication Services, And Electronic Mail Services Included In Class 38.
Renewal of trademark is overdue. Renewal with Restoration request in prescribed form is to be filed by the applicant.
[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking(supervision), Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images, Magnetic Data Carriers, Recording Discs, Automatic Vending Machines And Mechanisms For Coin Operated...
[Class : 9] Computer Software For Connecting Users To Web
Messaging Services And For Voice And Video Transmissions
Over The Internet And Wireless Networks.[Class : 35] Advertising And Marketing Services, Namely,
Promoting The Goods And Services Of Others By Placing
Advertisements And Promotional Displays In An Electronic
Site Accessed Through Computer Networks And By De...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Operating System Software; Computer Software For Computer Security, Internet Browsing, Viewing Photographs And Videos, Listening To Music And Other Sound Recordings; And Computer Software For Word Processing, Drawing, Small Business Accounting, Desktop Publishin, Project Management, Presentation Graphics, Email, Calendaring, Note Taking, Internet And Net...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Providing Remote Access To Computer Systems Within A Designated Network For The Purpose Of Administering, Monitoring, And Auditing Computer Systems And Software; Computer Software For Use In Delivering And Deploying Software Applications And Data Over Computer Networks; Computer Software For Diagnosing And Repairing Software Problems; Comput...
[Class : 9] Computer Software For Browsing The Internet And Private Networks, And For Enhancing The Abilities Of Web Browser Software; Computer Software For Viewing And Listening To Video, Animation And Audio; Computer Software For Creating And Authoring Of Web Based Applications, Video, Animation And Audio
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Publications, Namely, Strategy Guides, User Manuals, Magazines And
Newsletters All In The Fields Of Computers, Computer Hardware, Computer
Peripherals, Computer Software, Computer Networks, The Internet, Interactive
Television, Computer Games, Video Games, Education; Pens, Pencils,
Stationery, Stationery Type Portfolios, Desk Sets, Pen And Pencil Holders,
M...
[Class : 9] Computer Programs, Namely, Game Software For Use On Computer.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Graphical User Interface Software; Computer Software For Word Processing, Drawing, Small Business Accounting, Desktop Publishing, Project Management, Presentation Graphics, Email, Calendar, Note Taking, Internet And Network Conferencing, Information Gathering And Sharing, Website Creation And Maintenance, Electronic Spreadsheets, And Database Management:.
[Class : 9] Computer Software For Browsing And Searching
Photographs, For Viewing Photographs In Three Dimensional
Models, For Creating Photographic Tours,
And For Annotating Photographs And Photograph
Collections; Computer Software For Geolocating
Photographs And Images; Computer Software For
Extracting Three Dimensional Data From Photographs,
Images And Three Dimens...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software, Naemly, Spreadsheet Software; And Computer Programs For Creating Charts And Graphs From Electronic Spreadsheets.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software; Graphical User Interface Software.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Developing Other Computer Programs; Compiler Programs, Editor Programs, Debugger Programs And Utility Programs For Creating Other Computer Programs; Computer Programs For Assisting Developers In Creating Program Code For Use In Multiple Application Programs; And Computer Programs For Running Development Programs And Application Programs
[Class : 16] Publications, Namely, Strategy Guides, User Manuals, Magazines And
Newsletters All In The Fields Of Computers, Computer Hardware, Computer
Peripherals, Computer Software, Computer Networks, The Internet,
Interactive Television, Computer Games, Video Games, Education: Pens,
Pencils, Stationery, Stationery Type Portfolios, Desk Sets, Pen And Pencil
Holders, M...
[Class : 9] Computer Programs For Use In Accounting, Word Processing, Desktop Publishing, Electronic Spreadsheets, Graphics, Drawing, Address Storage And Retrieval, Creation Of Multimedia Presentations, Charting, Database Access, Connecting Mainframe And Other Computers, Computers, Computer Aided Design And Drafting, Optical Character Recognition, User Training, Investment A...
[Class : 9] Scientific, Nautical,Surveying, Electric, Photographic, Cinematographic, Optical,Weighing,Measuring, Signalling, Checking(supervision), Life Saving And Teaching Apparatus And Instruments; Apparatus For Recording, Transmission Or Reproduction Of Sound Or Images; Magnetic Data Carriers, Recording Discs; Automatic Vending Machines And Mechanisms For Coin Operated Ap...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Books; Documentation For Computer Programs, User Manuals, Reference Manuals, Technical Manuals, Periodicals, Magazines And Newsletters, All Being Printed Matter Included In Class 16
[Class : 9] Computer Software For Administration Of Computer Network; Computer Software For Network Server Virtualization;
Computer Software Enabling Multiple Operating Systems To Run Concurrently On A Single Computer; And Computer Software For Using, Monitoring, Testing And Managing Multiple Operating Systems.
[Class : 9] Computer Hardware, Software And Peripherals For Use In Video Teleconferencing, Network Conferencing, Recording Meetings And Viewing Recorded Meetings Included In Class 9.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] "Computers; Computer Peripherals; Computer Monitors; Personal Digital Assistants; Hand Held Computers; Set Top Boxes For Television; Cellular Phones; Smart Cards; Computer Servers; Computers And Software For Use In Transmitting And Receiving Data Over Wireless Networks; Operating Systems And Computer Programs For Use Therewith, Namely, Utility Programs, Calendar ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] ;Software, Namely; Operation System Software; Servver Software; Networks Management Software; Utility Programs; Software Development Programs; Security And Suthentication Software; Computer Programs For Operations Computer Peripherals, Handheld Computers, Pwersonal Digital Assistants, Radio Pagers Cellular Phine, Televisionand Cable Set Top Boxes, Game Consoles, ...
[Class : 9] Computers; Computer Peripherals; A Full Line Of Computer Software For Home, Business And Entertainment Use;
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] House Mark For A Full Line Of Business And Home Software; Operating System
Software: Computer Software For Use On Networks And Services; Computer Software
For Security And User Authentication; Computer Software For Use By Software
Developers To Create, Edit And Test Other Computer Programs And Web Sites;
Compiler Programs, Editor Programs, Debugger Programs A...
[Class : 9] Computers, Office Equipment, Business Machines And Electrical And Electronic Equipment Including Computers And Computer Programs Contained Therein, Namely, Answering Machines, Voicemail Equipment And Systems, Vending Machines, Parking Meters, Audio Conferencing Equipment And Systems Data Conferencing Equipment And Systems, Attendant Console Equipment And Systems,...
[Class : 9] Computer Programs, Namely, Game Software For Use On Comuters And Video Game Players;
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Computer Services, Namely , Providing Computer Software To Users Via The Internet, Providing Online Information Concerning Computers, Computer Peripherals And Computer Software, Online Technical Support In The Fieldof Computer And Computer Software.
Renewal of trademark is overdue. Renewal with Restoration request in prescribed form is to be filed by the applicant.
[Class : 35] Advertising Services; Advertising Via Electronic Media And Specifically The Internet; Advertising By Transmission Of On Line Publicity For Third Parties Through Electronic Communications Networks; Dissemination Of Advertising For Others Via The Internet, Wireless Networks And Online Gaming And Entertainment Networks; Consulting Services In The Field Of Advertisi...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software; Computer Operating System Software; Network
Operating Software; Computer Software Development Tools; Website
Development Software; Computer Software That Provides Web Based
Access To Applications And Services Through A Web Operating System Or
Portal Interface; Computer Software For Developing And Operating Cloud
Computer Networks And ...
[Class : 9] Word Processing Software; Computer Programs For Creating, Editing, Sharing, Storing, And Printing Documents Comprised Of Text And Graphics And Utility Programs For Use Therewith.[Class : 42] Cloud Computing Featuring Word Processing Software: Non Downloadable Computer Programs For Creating, Editing, Sharing, Storing, And Printing Documents Comprised Of Text And G...
[Class : 16] Books, Magazines And Newsletters Relating To Programming Systems, Utility Programs And Application Programming Interfaces.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] A Collection Of Interactive Reference Works And Computer Programs For Use Therewith, Including Computer Programs For Accessing And Retrieving Stored Reference Data And For Sharing Referance Data With Word Processing Programs, Instructional Manuals, User Guides And Reference Guides Therefore Sold As A Unit.
[Class : 16] Books, Instruction Manuals, Newsletters And Magazines, Relating Ot Computers, Computer Programs And Office Equipment, Business Equipment And Electrical And Elecctonic Equipment Including Computers And Computer Programs.
[Class : 9] Computer Programs, Namely Utility Programs And Programs To Assist Developers In The Creation And Modification Of Other Computer Programs.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Namely, Computer Server Software, Computer Network Management Software; Computer Utility Programs, Computer Software Development Programs, Computer Security And Authentication Software For Controlling Access To And Communications With Computer; Application And Business Software For Use In Word Processing, Spreadsheets, Databases, Data Collection, Data An...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] "House Mark For A Full Line Of Business And Home Software; Operating System Software; Computer Software For Use On Networks And Services; Computer Software For Security And User Authentication; Computer Software For Use By Software Developers To Create, Edit And Test Other Computer Programs And Web Sites; Compiler Programs, Editor Programs, Debugger Programs And ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 41] Providing Information Over Computer Networks And Global Communication Networks In The Fields Of Entertainment, Music, And Interactive Games; Education Services, Namely On Line Tutorials In The Field Of Computers And Computer Software.[Class : 42] Computer Services, Including Providing Technical Support, Information And Consultation Services In The Fields Of Comp...
[Class : 36] Providing Information Concerning Real Estate, Real Estate Financing, Real Estate Agents And The Purchase, Sale And Rental Of Real Estate, All Via Computer Networks And Global Communication Networks; Providing Information Over Computer Networks And Global Communication Networks In The Fields Of Finance, Investment, Money And Banking, Retirement Planning And Wills...
[Class : 42] Computer Services, Computer Programming Services, Computer Consultancy And Technical Support, All Relating To The Design & Use Of Computer Programs, Computers, Computer Hardware & Computer Systems , Mail Order Services In The Field Of Computer Programs, Computer Related Books & Publications, & Other Computer Related Products, Arranging & Conducting Conferenc...
[Class : 9] Computer Programs For Connecting To Remote Computers And Computer Networks, Computer Programs For Searching The Contents Of Remote Computers And Computer Networks, Computer Programs For Transmitting And Receiving Data And Files To And From Remote Computers And Computer Networks, Computer Programs For Assisting Users In Navigating Through Computer Networks, Includ...
[Class : 38] Communication Services, Namely, Electronic Transmission Of Data And Documents Among Users Of Computers; Electronic Mail Services; Web Messaging Services; Paging Services; Streaming Of Audio Material On The Internet; Wireless Voice Mail Services; Voice Activated Dialing Services; And Providing Wireless Acccess To Computer Networks And The Internet.[Class : 42] Te...
Renewal of trademark is overdue. Renewal request with surcharge in prescribed form is to be filed by the applicant.
[Class : 9] Computer Programs For Providing Enhanced Electronic Mail And Scheduling Capabilities, For Use By Individual Computer Users, Namely, Computer Programs For Managing, Viewing, And Editing Files, Documents, Electronic Mail Messages And Private Network And Global Computer Network Communications; Computer Programs For Meeting And Event Scheduling, Managing Group Calend...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] General Purpose Computer Database Management Software.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Programs For Providing Enhanced Electronic Mail And Scheduling Capabilities, For Use By Individual Computer Users, Namely, Computer Programs For Managing, Viewing, And Editing Files, Documents, Electronic Mail Messages And Private Network And Global Computer Network Communications; Computer Programs For Meeting And Event Scheduling, Managing Group Calend...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Use In Not Taking, Namely, Computer Software For Recording, Organizing, Editing And Transmitting Audio And Visual Information And Images In Electronic Form; Computer Software For Viewing And Editing Meeting Agendas And To Do Lists; Computer Software For Reminding Users Of Dates And Events; Computer Software For Accessing Shared Documents (No...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Word Processing Softwre; Computer Programs For Creating, Editing And Printing Documents Comprised Of Text And Graphics And Utility Programs For Use Therewith.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Use By Business Enterprises To Manage Their Financial Business And Customer Information Computer Software For Supply Side Management Customer Relationship And Accounting
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software And Hardware; Including Computer Search Engine Software And Downloadable Software.[Class : 35] Advertising Services Including Dissemination Of Advertising For Others Via The Internet, Business Services Including Providing Links To The Websites Of Others, Providing Consumer And Product Information.[Class : 38] Telecommunication Services, Includin...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software For Stroing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Computer Software For Computer System And Web Based Application Development; Deployment And Management, Computer Software Platforms For Storing, Accessing And Sharing Files And Data Over Computer And Wireless Networks; Computer Software For Receiving, ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Non Downloadable Computer Software In The Fields Of Storing, Accessing And Sharing Files And Data Cover Computer And Wireless Networks; Non Downloadable Computer Software In The Fields Developing Online Systems And Applications; Providing Information In The Fields Of The Development Of Computer Systems, Networks And Software, Over Computer Networks, Wireless Net...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Utility Software; Computer Software For The Detection And Removal Of Computer Viruses And Threats; Computer Software For Managing And Filtering Electronic Communications; Computer Software For Protecting And Securing Computer Networks And Applications; Computer Software For Encrypting And Authenticating Data; Computer Software For Detecting And Repairing...
[Class : 9] Computer Utility Software; Computer Software For The Detection And Removal Of Computer Viruses And Threats; Computer Software For Managing And Filtering Electronic Communications; Computer Software For Protecting And Securing Computer Networks And Applications; Computer Software For Encrypting And Authenticating Data; Computer Software For Detecting And Repairing...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Hardware; Computer Display And Input System Comprised Of A Projector, Camera And Computer Software For Displaying Images And Detecting Objects, User Gestures And Commands.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Computer Services: Cloud Computing Featuring Software For Use In: Document Management, Authoring And Publishing; Developing Customized Internal Network Sites; Designing, Creating, Maintaining And Accessing Document Management, Authoring, Storage And Retrieval Systems; And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line No...
[Class : 42] Computer Services; Cloud Computing Featuring Software For Use In Note Taking And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On¬Line Non Downloadable Software And Applications For Note Taking; Providing Technical Information In The Field Of Computer Software And Cloud Computing.
[Class : 9] Downloadable Video Recordings Featuring Sports.[Class : 41] Entertainment Services, Namely, An Ongoing Series Featuring Sports Provided Through Television And Webcasts.
[Class : 9] Computer Software For Use By Healthcare Providers For Developing Application Software And Device Drivers To Work As Part Of A Healthcare Information Sharing System; Computer Software For Collecting, Storing, Editing, Organizing, Modifying, Reviewing, Analyzing, Transmitting And Sharing Of Data And Information In The Fields Of Healthcare, Social Care, Medicine And...
[Class : 9] Software, None Relating To Secure Financial Communications
Or The Facilitation Of Secure Financial Transactions; Artificial
Intelligence And Intelligent Inference Software; Natural Language
Processing Software; Machine Learning Software; Software
For Data Entry; Software For Text Entry; Software For Predictive/
Corrective Text Entry; Software For Data Entry Using...
[Class : 9] Downloadable Computer Software For Streaming, Broadcasting, Transmitting And Reproducing Text, Data, Images, Music And Video[Class : 38] Electronic Transmission Of Software, Messages, Data, Text, Sound, Graphics And Video Via Computer Networks, Wireless Networks And The Internet[Class : 41] Entertainment Services, Namely, Providing An Electronic Database Featurin...
[Class : 9] Computer Software For Computer Programming; Computer Software For Administration Of Computer Networks; Computer Software Development Tools For Use By Computer Network Administrators.
[Class : 42] Computer Services, Namely Collection, Analysis And Display Of Information And Data Generated By Software Applications, Servers, Network Devices, Security Devices, Firewalls And Remote Infrastructure; Computer Services, Namely Collection, Analysis And Display Of Information And Data Regarding Process Events, Registry Events And Network Events On A Network End Poi...
[Class : 42] Software As A Service (Saas) Services For Use In Developing And Testing Other Computer Programs; Software As A Service (Saas) Services Featuring Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications; Software As A Service (Saas) Services For Assisting Developers In Creating Program Code For Use In Multiple Application Prog...
[Class : 42] Platform As A Service (Paas) Featuring Computer Software Platforms For Buyers And Sellers Of Online Advertising To Build, Manage, And Optimize Their Entire Online Advertising Businesses.
[Class : 9] Computer Software For Allowing Communication And Interaction Between Phones, Mobile Devices, Televisions, Video Game Consoles, Media Players And Audiovisual Devices.
[Class : 42] Software As A Service (Saas) Services For Use In Developing And Testing Other Computer Programs; Software As A Service (Saas) Services Featuring Compiler Programs, Debugger Programs And Utility Programs For Creating Graphical Applications; Software As A Service (Saas) Services For Assisting Developers In Creating Program Code For Use In Multiple Application Prog...
[Class : 9] Computer Software For The Design, Execution And Management Of Advertising And Marketing Campaigns; Computer Software For Generating Reports And Analytics For Advertising And Marketing Campaigns.[Class : 42] Software As A Service (Saa S) Featuring Computer Software For The Design, Execution And Management Of Advertising And Marketing Campaigns; Software As A Servi...
[Class : 9] Computer Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images.[Class : 42] Providing Online, Non Downloadable Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images; And Software As A Service (Saas) Feat...
[Class : 9] Computer Software For Customer Relationship Management.[Class : 42] Software As A Service (Saa S) Featuring Computer Software For Customer Service Management
[Class : 9] Operating System Software; Computer Software, Namely, For Projecting Mobile Device Software To Computer Displays And Monitors Via Computer Peripheral Devices And Wireless Networks; Computer Software, Namely, For Automatic User Interface Mode Adaption.[Class : 42] Providing Temporary Use Of Non Downloadable Online Computer Software, Namely, Operating Systems Progr...
[Class : 9] Computer Software For Virtual Reality Visualization, Manipulation, Immersion And Integration Of Holographic Content For The Purpose Of Making Virtual Reality Audio/Visual Content That Incorporates Holograms Or Holographic Content; Operating System Software; Computer Software, Namely, Software For Setting Up, Operating, Configuring, And Controlling Wearable Hardwa...
[Class : 9] Computer Software For Providing Remote Access To Computer Systems And Personal Electronic Devices Within A Designated Network For The Purpose Of Administering, Monitoring, And Auditing Computer Systems, Software And Personal Electronic Devices; Computer Software For Use In Delivering And Deploying Software Applications And Data Over Computer Networks; Computer So...
[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software Downloaded Or Downloadable; Electronic Publications; Computer Software Publications Downloaded; Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Ro Ms, Dv Ds And Other Mag...
[Class : 9] Computer Software For Browsing The Internet; Computer Browsing Software, Namely, Software For Browsing The Global Computer Network And Private Networks; Computer Software For Providing Access To The Internet.
[Class : 9] Computer Software For Displaying, Processing And Uploading To The Internet Information Concerning Healthcare And Fitness; Computer Software For Controlling And Managing Personal And Family Health And Fitness Information; Computer Software For Use By Healthcare Providers For Developing Application Software And Device Drivers To Work As Part Of A Healthcare Informa...
[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Discs, Tapes, Cartridges, Cd Ro Ms, Dv Ds And Other Magnetic, Electronic Or Optical Media, All Bearing Audio Visual Content From Computer And Video Games; Computer Peripherals; Computer Software For Gathering, Monitoring, Processing, Analysing, Managing And Reporting Informa...
[Class : 9] Computer Software, Namely, Operating System Programs And Utilities, Programs, Address Book Programs, Calculator Programs, Terminal Emulation Programs, Programs For Downloading And Playing Audio And Video, Programs For Managing Computer Power Supplies, Programs For Use In Transmitting Data Between Computers And Other Electronic Devices, Computer Maintenance Progra...
[Class : 9] Computer Software For Browsing The Internet; Computer Browsing Software, Namely, Software For Browsing The Global Computer Network And Private Networks; Computer Software For Providing Access To The Internet.
[Class : 9] Computer Software For Displaying, Processing And Uploading To The Internet Information Concerning Healthcare And Fitness; Computer Software For Controlling And Managing Personal And Family Health And Fitness Information; Computer Software For Use By Healthcare Providers For Developing Application Software And Device Drivers To Work As Part Of A Healthcare Informa...
[Class : 9] Computer Software For Customer Service And Help Desk Support Management; Computer Software For Customer Relationship Management And Instruction And User Manuals Therefor, Sold As A Unit; Computer Software For Use In Collecting, Managing And Modifying Data On Social Networks; Computer Software That Monitors The Internet And Social Networks To Provide Alerts, Manag...
[Class : 41] Education; Providing Of Training; Entertainment; Sporting And Cultural Activities;[Class : 38] Telecommunications;[Class : 9] Scientific, Nautical, Surveying, Photographic, Cinematographic, Optical, Weighing, Measuring, Signaling, Checking(supervision), Life Saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Trans...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Technical Support And Technical Consultation Services In The Field Of Software Development For Video Game And Computer Game Software; And Providing Online Information In The Field Of Software Development And Technical Support For Video Game And Computer Game Software';[Class : 9] Computer Software Development Tools For Use In Developing Computer Games And Video ...
[Class : 9] Digital Rights Management Software; And Data Encryption Software";
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 42] Providing Technical Information And Technical Documentation In The Field Of Computer Software And File Formats For The Formatting, Storing, Printing And Reading Of Documents Using A Markup Language; Providing Online Technical Support Services, Namely, Support For Manufacturers Developing Xps Based Printing Solutions And Software Developers Integrating Support In...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software, Namely, Spreadsheet Software; And Computer Programs For Creating Charts And Graphs From Electronic Spreadsheets.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Hardware And Peripherals; Webcams; Computer Software For Use As An Interface Between Webcams And Computers.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software; Computer Operating System Software; Network Operating Software; Computer Software Development Tools; Website Development Software; Computer Software That Provides Web Based Access To Applications And Services Through A Web Operating System Or Portal Interface; Computer Software For Developing And Operating Cloud Computer Networks And Applicatio...
[Class : 9] Computer Software, Namely, Computer Server Software For Use In Re Al Time Communications Featuring Instant Messaging, Audio, Video And Data Exchange, Web Conferencing And Document Sharing; Computer Utility Programs; Computer Software Development Programs; Computer Security And Authentication Software For Controlling Access Rot And Communications With Computers; A...
[Class : 9] Computer Programs For Connecting To Remote Computers
And Computer Networks; Computer Programs For
Searching The Contents Of Remote Computers And Computer
Networks: Computer Programs For Transmitting And
Receiving Data And Files To And From Remote Computer And
Computer Networks; Computer Programs For Assisting
Users In Navigating Through Computer Networks, I...
[Class : 28] Toys, Games And Playthings, Namely, Toy Action Figures And Accessories Therefore, Mechanical Action Toys, Toy Vehicles And Bendable Toy Figurines
[Class : 35] Online Retail Store Services Facilitating The Download Of Computer Software For Use On Mobile Phones, Media Players, And Other Portable Electronic Devices
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Game Software.[Class : 41] Providing A Website Featuring Information In The Field Of Games And Home Entertainment; Entertainment Services, Namely, Providing Online Video Games.
[Class : 9] Software Capable Of Causing Transmission Of A Message From A Message Originator To Multiple Predefined Recipients Across A Wired And/Or Wireless Network.
[Class : 9] Computer Software, Namelv. A Full Line Of Computer Software For Business, Business Management, Accounting, Marketing And E Commerce Applications: Computer Software For Supply Side Management, Customer Relationship Management, Financial Management And Accounting[Class : 42] Computer Services, Namelv. Providing Specific Information As Requested By Customers Via The...
[Class : 9] Game Software; Set Top Boxes.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.
[Class : 42] Providing Temporary Use Of Non Downloadable Software For
Receiving, Displaying, Storing, Organizing And Sharing With
Other Users Documents, Sounds, Music, Videos, Photographs,
Drawings, Images And Data Stored Electronically; Electronic
Storage Of Documents, Sounds, Music, Videos, Photographs,
Drawings, Images And Data For Others.
[Class : 42] Computer Services, Namely, Creating An On Line Community For Registered Users To Participate In Discussions And Get Feedback From Their Peers.
[Class : 42] Providing Temporary Use Of Non Downloadable Software For Mapping And Directions, Language Translation, And Accessing Information Related To Entertainment, Travel, Finance, News, Sports, Weather, Food And Drink, And Health And Fitness Consisting Mainly Of Links To Other Websites; Providing Internet Search Engine Services; Providing Temporary Use Of Non Downloadab...
[Class : 9] Computer Software For Use In Locating, Gathering, Compiling,
Analyzing, Modeling, Graphing, Visualizing, Animating,
Transforming, Presenting And Sharing Data And Other
Information[Class : 42] Computer Software As A Service (Saa S) Services For Use In
Locating, Gathering, Compiling, Analyzing, Modeling, Graphing,
Visualizing, Animating, Transforming, Presenting An...
[Class : 9] Software; Artificial Intelligence And Intelligent Inference Software; Natural Language Processing Software; Machine Learning Software; Software For Data Entry; Software For Text Entry; Software For Predictive/Corrective Text Entry; Software For Data Entry Using Touch Screens; Software For Gesture Recognition; Software For Gesture Based Data Entry.
[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software Downloaded Or Downloadable; Electronic Publications; Computer Software Publications Downloaded; Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Ro Ms, Dv Ds And Other Mag...
[Class : 9] Cases For Mobile Phone; Application Software; Software For Mobile Phones; Computer Application Software For Mobile Phone; Downloadable Computer Programs; Operating System Programs; Application Software For Smart Phone And Tablet Computer; Computers; Computer Software; Smart Phones; Portable Communication Apparatus Namely Handsets, Walkie Talkies, Satellite Teleph...
Renewal of trademark is due. Renewal request in prescribed form is to be filed by the applicant.
[Class : 9] Computer Software For Data Synchronization, Password Management, And Authenticating User Identification; Computer Software For Restricting Access To Data And Computer Programs Stored On Computer Hardware And External Data Storage Media; Computer Software To Prevent Identity Theft And Phishing.[Class : 42] Software As A Service (Saa S) Services Namely, Computer So...
[Class : 9] Computer Software, Namely, Security Software, User Authentication Software, Password Management And Protection Software For Mobile Digital Electronic Devices And Computing Devices.[Class : 42] Online Computer Services, Namely, Online Scanning, Detecting, Managing And Authenticating Security And Log In Credentials For Users Of Mobile Digital Electronic Devices And...
[Class : 9] Computer Game Software[Class : 41] Entertainment Services ,Namely ,Providing And On Line Computer Game.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Games; Computer And Video Games Software; Downloaded Computer Software Publications; Interactive Entertainment Software; Data Recorded Electronically From The Internet; Discs, Tapes, Cartridges, Cd Ro Ms And Other Magnetic, Electronic Or Optical Media, All Bearing Computer Games Software Or Video Games.[Class : 25] Articles Of Clothing; Headgear; T Shirt...
[Class : 42] Computer Services, Namely, Collection, Analysis And Display Of Information And Data Generated By Software Applications, Servers, Network Devices, Security Devices, Firewalls And Remote Infrastructure; Computer Services, Namely, Collection, Analysis And Display Of Information And Data Regarding Process Events, Registry Events And Network Events On A Network Endpo...
[Class : 9] Software, Namely, Computer Software For Accessing Computer Software Applications And Mobile Software Applications, Software For Extracting And Manipulating Text, Images And Data, Software Enabling Users To Share, Edit And Collaborate On Documents With Other Users, And Software Enabling Users To Communicate With Other Users Via Audio And Text.[Class : 42] Software...
[Class : 41] Entertainment Services, Namely, Providing Interactive, Multiplayer Game Services For Video Games, Namely, Charting Progress And Accomplishments Of Users In A Series Of Video Games; Providing Information About Video Games; Providing A Web Site Featuring Information In The Field Of Video Games (Terms Considered Too Vague By The International Bureau Rule 13.2.B) ...
[Class : 9] Computer Software Platforms For Mobile Devices For Use In The Creation, Development And Operation Of Software Applications; Software Development Tools For The Creation Of Applications For Mobile Devices.[Class : 42] Platform As A Service (Paas) Services Featuring Computer Software Platforms For Mobile Devices For Use In The Creation, Development And Operation Of ...
[Class : 9] Computers; Tablet Computers; Laptop Computers: Mobile
Computers; Reader For E Books And Other Electronic Publications: Computer Peripherals; Wireless Computer Peripherals; Mobile Communications Modules For Use With Tablet Computers: Headphones; Audio Speakers; Computer Keyboards; Computer Mouse; Webcams; Digital Pens; Power Cords; Battery Chargers; Electrical Ca...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software Development Tools For Developing Computer Games And Video Games; And Computer Programs, Namely, Game Software For Use On Computers And Video Game Players[Class : 41] Entertainment Services, Namely Providing Online Computer Games
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 41] Providing A Web Site Featuring Information In The Field Of Computer Games, Games And Home Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; And Entertainment Services, Namely, Providing An On Line Computer Game[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players
[Class : 9] Computer Software Including Downloadable Mobile Application Featuring Software For Use In Group Communication Namely, Posting And Instant Messaging, File Sharing, Calendar Synchronization And Automated Integration With External Service Providers.[Class : 42] Software As A Service (Saas) Featuring Computer Software Platforms For Use In Group Communication, Namely ...
[Class : 9] Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.
[Class : 9] Computer Software; Computer Game Software; Computer Games.[Class : 36] Virtual Currency For Use In On Line Community; Virtual Currency For Use In Gaming; Providing A Virtual Currency For Use By Members Of An On Line Community Via A Global Computer Network; Providing A Virtual Currency For Use By Members Of A Gaming Community.[Class : 42] Non Downloadable Software...
[Class : 9] Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.
[Class : 9] Computer Software; Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.[Class : 42] Providing Temporary Use Of Online, Non Downloadable Computer Software; Providing Temporary Use Of Online, Non Downloadable Video Game Software.
[Class : 9] Computer Software For Providing For Interaction Of A User With A Conversational User Interface; Computer Software For Retrieving Information From A User And Delivering To The User Context Sensitive Information And User Specific Information; Computer Software For Providing Information To A User From An Adaptive, Artificially Intelligent Software Agent; Computer So...
[Class : 9] Computer Software; Computer Operating System Software; Network Operating Software; Computer Software Development Tools; Website Development Software; Computer Software That Provides Web Based Access To Applications And Services Through A Web Operating System Or Portal Interface; Computer Software For Developing And Operating Cloud Computer Networks And Applicatio...
[Class : 9] Computer Software; Computer Software For Video Game Development, Operation, Management, And Hosting.[Class : 42] Platform As A Service (Paa S); Platform As A Service (Paa S) Featuring Computer Software Platforms Used For The Operations, Management And Hosting Of Online Video Games; Software As A Service (Saa S); Software As A Service (Saa S) Featuring Computer So...
[Class : 35] Organizing, Promoting And Conducting Exhibitions, Trade Shows And Events In The Fields Of Innovation, Technology, Computer Software And Hardware, Computer Software Development, Business, Cybersecurity, Security, Technology Development, Cloud Technology, Data Analytics, Data, Digital Transformation, Internet Of Things, Artificial Intelligence And Machine Learning...
[Class : 35] Advertising, Marketing, And Promotion Services; Advertising And Marketing Services, Namely, Promoting The Goods And Services Of Others; Consulting In The Fields Of Business, Advertising, Marketing And Data Analytics; Dissemination Of Advertising And Marketing For Others Via The Internet And Other Communications Networks And Platforms; Developing And Providing Ma...
[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing A Web Site Featuring Information In The Field Of Computer Games, Games And Home Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; And Entertainment Services, Namely, Providing An On Line Computer Ga...
[Class : 9] Software To Provide Access To 3 D Virtual Reality Environments, Including Avatars And User Interfaces For 3 D Virtual Reality; Software That Allows Participants To View And Interact With Web Content In A 3 D Virtual Reality Environment And To Interact With Others In A Virtual Reality Environment For Business, Leisure, Entertainment, Or Training Purposes; Software...
[Class : 9] Computer Software For Diagnosing, Troubleshooting And Repairing Computer Software Problems; Computer Software For Use In Setting Up And Configuring Software Applications Via The Internet, Computer And Wireless Networks; Computer Software For Use In Delivering And Deploying Software Applications Vis The Internet, Computer And Wireless Networks.
[Class : 9] Scientific, Research, Navigation, Surveying, Photographic, Cinematographic, Audiovisual, Optical, Weighing, Measuring, Signalling, Detecting, Testing, Inspecting, Life Saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling The Distribution Or Use Of Electricity; App...
[Class : 35] Advertising; Business Management; Business Administration; Office Functions; The Bringing Together, For The Benefit Of Others, Of A Variety Of Goods (Excluding The Transport Thereof), Enabling Customers To Conveniently View And Purchase Those Goods; Digital Marketing, Digital Advertising, Ecommerce Services; Advertising, Public Relations, Publicity, Sales Promot...
[Class : 42] Scientific And Technological Services And Research And Design Relating Thereto; Industrial Analysis And Industrial Research Services; Design And Development Of Computer Hardware And Software; Computer Software Services; All The Aforesaid Only In Relation To Electronic Business Marketing, Digital Marketing, Managing And Controlling Product Display On Websites And...
[Class : 9] Computer Software; Computer Software For Browsing The Internet; Computer Operating Software, Computer Browsing Software, Namely, Software For Browsing The Global Computer Network And Private Networks, Computer Software For Providing Access To The Internet.[Class : 35] Advertising And Marketing Services; Digital Advertising Services; On Line Retail Store Services ...
[Class : 9] Computer Software; Computer Software For Browsing The Internet; Computer Operating Software, Computer Browsing Software, Namely, Software For Browsing The Global Computer Network And Private Networks, Computer Software For Providing Access To The Internet.[Class : 35] Advertising And Marketing Services; Digital Advertising Services; On Line Retail Store Services ...
[Class : 9] Downloadable Computer Game Software; Downloadable
Computer Programs, Namely, Game Software For Use On
Computers And Video Game Players.[Class : 41] Providing A Website Featuring Entertainment Information In The
Field Of Computer Games, Games, Computer Enhancements
For Games, And Home Entertainment; Entertainment Services,
Namely, Providing On Line Computer G...
[Class : 9] Scientific, Research, Navigation, Surveying, Photographic, Cinematographic, Audiovisual,
Optical, Weighing, Measuring, Signalling, Detecting, Testing, Inspecting, Life Saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling The Distribution Or Use Of Electricity; Ap...
[Class : 42] Providing Non Downloadable Software; Software As A Service (Saa S); Hardware As A Service (Haa S); Platform As A Service (Paa S); Computer Consultancy Services.
[Class : 28] Games, Toys And Playthings; Video Game Apparatus; Gymnastic And Sporting Articles; Decorations For Christmas Trees; Game Consoles; Computer Game Consoles; Video Game Consoles; Hand Held Game Consoles; Video Game Consoles For Use With An External Display Screen Or Monitor; Apparatus For Electronic Games Adapted For Use With An External Display Screen Or Monitor; ...
[Class : 28] Games, Toys And Playthings; Video Game Apparatus; Gymnastic And Sporting Articles; Decorations For Christmas Trees; Game Consoles; Computer Game Consoles; Video Game Consoles; Hand Held Game Consoles; Video Game Consoles For Use With An External Display Screen Or Monitor; Apparatus For Electronic Games Adapted For Use With An External Display Screen Or Monitor; ...
[Class : 9] Computer Software, Namely, Software For Manipulating Digital Audio And For Improving Sound; Computer Software Namely, Software For Use In Processing, Recording, Reproduction, Streaming, Transmission, And Reception Of Electronic Or Digital Signals; Computer Software Namely, Software For Operating, Measuring, Signaling And Checking Hearing Aids And Audiological Ins...
[Class : 9] Computer Software; Computer Software For Virtual Desktop Platform And Server Applications; Computer Software For Accessing And Using A Cloud Computing Network; Computer Software For Accessing Virtual Computer Systems And Environments; Cloud Computing Software; Computer Software For Communication And Data Exchange On Computer Networks And Global Computer Networks....
[Class : 36] Financial Services, Namely, Installment Loans, Lease Purchase Financing And Loans, Loan Financing, Clearing And Reconciling Financial Transactions Via Computer And Communication Networks; Financial Services, Namely, Installment Loans, Lease Purchase Financing And Loans, And Loan Financing; Virtual Currency For Use In Gaming; Financial Services, Namely, Providing...
[Class : 35] Business Services, Namely, Business Consultation Services, Business Advice And Information Services; Business Marketing Services; Business Consulting Services; Business Networking; Providing Information In The Fields Of Business And Commerce Over Global Computer Networks And Global Communications Networks; Providing Consumer Product Information Via The Internet;...
[Class : 9] Collaboration Software; Collaboration Software Platforms; Collaboration Management Software Platforms.[Class : 42] Software As A Service (Saa S) Services Featuring Software For Enabling Users To Communicate, Collaborate, And Share Computer Screens, Desktops, Data, Electronic Documents, Video, And Applications Via The Internet.
[Class : 9] Computer Software For The Collection And Analysis Of Business Data And Business Productivity Information; Downloadable Computer Software For Personnel And Project Management; Social Media Management, Peer To Peer Communications, Workplace Management; Computer Software Platform For Organizational Development; Computer Application Software For Mobile Phones, Namely...
[Class : 9] Computer Security Software; Downloadable Computer Software For Security Information And Event Management (Siem) Employing Artificial Intelligence And Machine Learning To Enable Automated Responses In Real Time To Security Vulnerabilities, Threats And Events; Downloadable Computer Software For Collection, Storage, Analysis And Presentation Of Data For Forensic Ana...
[Class : 42] Platform As A Service (Paas) Featuring Computer Software Platforms For Buyers And Sellers Of Online Advertising To Build, Manage, And Optimize Their Entire Online Advertising Businesses.
[Class : 9] Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.
[Class : 35] Organizing, Promoting And Conducting Online, Business To Business Events And Webinars In The Field Of Computing And Digital Transformation.[Class : 41] Educational Services, Namely Providing A Web Video Series For An Enterprise Audience In The Field Of Computing And Digital Transformation.[Class : 42] Providing A Website And Platform As A Service Featuring On Li...
[Class : 9] Computer Programs, Namely, Operating Systems Programs And Utility Programs, Computer Programs For Managing Communications And Data Exchange Between Computers.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Game Software; Computer Game Software; Downloadable Computer Programs, Namely, Game Software For Use On Computers, Video Game Players, And Electronic And Wireless Devices.[Class : 41] Providing A Website Featuring Non Downloadable Game Software; Providing Temporary Use Of Non Downloadable Game Software; Providing Online Non Downloadable Game Software; Entertainme...
[Class : 9] Scinetific, Nautical, Surveying And Electrical Apparatus And Instruments (Incuding Wireless), Photographic, Cinemato Graphic, Optical, Weighing, Measuring, Singnalling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments; Coin Or Counter Freed Apparatus; Talking Machines; Cash Registers; Calculating Machines; Fire Extinguishing Apparatus, C...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Printed Computer Programmes, Books, Periodicals, Manuals, And Other Publications Relating To Computer And Computer Programmes, Paper Tapes And Cards For The Recordal Of Computer Programmes Being Goods Included In Class 16.
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] Books, Instruction Manuals, Newsletters And Magazines Relating To Computers, Computer Programs And Office Equipment, Business Equipment And Electrical And Electronic Equipment Including Computers And Computer Programs Stationery Including Pencil Sharpeners And Staplers.
[Class : 9] Scientific, Nautical, Surveying, Electric, Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments, Apparatus For Recording, Transmission Or Reproduction Of Sounds Or Images, Magnetic Data Carriers, Recording Discs, Automatic Vending Machines And Mechanisms For Coin Operat...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Scientific, Nautical, Surveying, Electric Photographic, Cinematographic, Optical, Weighing, Measuring, Signalling, Checking (Supervision). Life Saving And Teaching Apparatus And Instruments; Apparatus For Recording, Transmision Or Reproduction Of Sound Or Images; Magnetic Data Carriers, Recording Discs; Automatic Vending Machines And Mechanisms For Coin Operated ...
[Class : 9] Computer Programs, Namely Software For Use In The Creation, Delivery, Playing And Viewing Of Video, Graphic, Audio, Text, Computer Programs And Other Data Over Global Computer And Communication Networks.
[Class : 9] Video Game Player Machines For Use With Televisions And Computers, Electronic Devices, Namely Computer Hardware For Accessing Global Computer And Communication Networks, Computer Hardware And Peripherals, Computer Keyboards, Computer And Video Game Joysticks And Game Controllers, Computer Game Pads And Controllers, Computer Peripherals, Namely Computer Mice And O...
[Class : 9] Database Software; Electronic Spreadsheet Software; Software For Use In Word Processing, Electronic Mail, Calendar And Scheduling, Desktop Publishing, Image Editing, Graphics Creation And Editing, Drawing, Computer Aided Design And Drafting, Creation Of Multimedia Presentations, Project Management, Customer Management, Business Planning, Direct Mail, And Business...
[Class : 9] Computer Software, Namely Software To Design Created, Edit And Publish Documents, Computer Programs That Assist Users In Designing, Creating, Editing, Publishing And Completing Documents And Computer Programs For Transmittings Documents Between Users Included In Class 9.
[Class : 41] Providing Interactive On Line Computer Games Via Computer Network And Global Communication Networks, Providing Information In The Fields Of Entertainment, Movies, Music, Sports And Education Over Computer Networks And Global Communication Networks, Entertainment Services, On Line Education Services, Providing Educational Information For Students And Teachers Ove...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 16] In Respect Of "Publications,Namely Newsletters, Pamphlets, Magazines, Books, Instruction Manuals, User Guides And Reference Guides In The Field Of Computers, Software, And The Development Of Computer Systems And Software"[Class : 41] In Respect Of "Providing Informaton Over Computer Networks And Global Communication Networks In The Fields Of Entertainment,Music,...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Viewing, Searching And Playing Pre Recorded Audio And Audio Streaming Over The Internet, Computer Software For Viewing, Searching And Playing Television Broadcasts, Pre Recorded Video And Video Streaming Over The Internet And Computer Software For Viewing, Searching And Displaying Graphic Images Included In Class 9.
Renewal of trademark is overdue. Renewal request with surcharge in prescribed form is to be filed by the applicant.
[Class : 9] Operating System Software,Computer Utility Programs;Computer Software For Displaying Links To Other Programs And Websites,For Launching Other Programs And For Linking Users To Websites
[Class : 9] Operating System Software, Computr Software For Digital Media Playback On Computers; Computer Software For Initializing Digital Media Devices And Software';
[Class : 35] Promoting The Use Of Digital Pre Paid Purchase Services Through The Administration Of An Incentive Award Program[Class : 36] Digital Pre Paid Purchase Services, Namely Processing Online Payments
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Operating System Software; Computer Utility Programs; Computer Software For Encryption; Computer Software For Restricting Access To Data And Computer Programs Stored On A Personal Computer
Renewal of trademark is due. Renewal request in prescribed form is to be filed by the applicant.
[Class : 9] Digital Communication Hardware And Software; Webcams, Computer Keyboards, Telephones, Headsets For Use With Telephones, Computers, Personal Digital Assistants And Digital Music Players, And Computer Mice; Software For Sending And Receiving Instant Messages
[Class : 38] Instant Messaging Services
[Class : 9] Multimedia Player, Entertainment And Communications Devices; Peripherals And Accessories For Use With Multimedia Player Entertainment And Communications Device; Headphones; Earphones; Docking Stations For Use With Multimedia Players; Wired And Wireless Remote Control Devices For Use With Multimedia Players; Battery Chargers; Battery Packs; Electrical Connectors, ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Providing Computer And Computer Network Security, Anti Virus Protection, And Intrusion Detection And Prevention, Computer Software For Managing And Filtering Electronic Communincations; Computer Software For Protecting And Securing Computer Networks And Applications, Computer Software Providing Firewall Protection, And Computer Software For ...
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Computer Software For Use In Project Management; Computer
Software For Designing, Creating, Maintaining And Accessing Customized Internal
Network Sites And Global Communication Network Sites; Computer Authoring Software
For Use On Internal Computer Networks And Global Communication Networks, Namely,
Software For Creating, Editing And Delivering Textual And Gr...
[Class : 9] Computer Software For Compressing And
Managing Data
Trade mark is likely to be removed due to non filing of Renewal request within prescribed time limit In case of any discripancy contact respective TM Registry.
[Class : 9] Scicnliiic. Nauticaf. Survcyinu. Pfiotouraphic. Cinematographic, Optical, Weighing, Measuring. Signaling, Checking (Supervision), Life Saving And Teaching Apparatus And Instruments; Apparatus And Instruments For Conducting, Switching, Transforming, Accumulating, Regulating Or Controlling Electricity. Apparatus For Recording, Transmission Or Reproduction Of Sound ...
[Class : 9] Downloadable Computer Software For Use In E Sports Competitions And Streaming; Electronic Sports Training Simulators; Downloadable And Recorded Computer Software For Accessing The Internet, Computer Networks, And Global Communication Networks; Downloadable And Recorded Computer Software For Accessing A Search Engine And Web Browsing; Downloadable And Recorded Com...
[Class : 35] Providing Information In The Fields Of Business And Commerce Over Global Computer Networks And Global Communications Networks; Business Services, Namely, Business Consultation And Marketing Services, Business Advice And Information Services; Providing Consumer Product Information Via Global Computer Networks; Promoting The Goods And Services Of Others Via Global...
[Class : 9] Downloadable Computer Software Development Tools; Downloadable Computer Software For Artificial Intelligence Processing And Deep Learning; Downloadable Computer Software Development Libraries, Namely, Downloadable Electronic Data Files Consisting Of Software Development Tools For Model Development And Training; Downloadable Computer Software For Implementing A Co...
[Class : 9] Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically.[Class : 38] Telecommunication Services, Namely, Transmission Of Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data By Means Of Telecommunications Network...
[Class : 9] Downloadable And Recorded Computer Software For Accessing The Internet, Computer Networks, And Global Communication Networks; Downloadable And Recorded Computer Software For Accessing A Search Engine And Web Browsing; Downloadable And Recorded Computer Software For Accessing And Searching Online Databases And Websites; Downloadable And Recorded Computer Software ...
[Class : 9] Downloadable Computer Software, Namely, Downloadable Computer Security Software For Computer, Applications, Cloud, And Computer Network Security, Automated Domain Threat Protection And Prevention, Analysis, Management And Integration Of Threat Data, Security Information And Event Management, Detection, Investigation And Elimination Of Computer Threats, Cyberattac...
[Class : 9] Software; Computer Software; Recorded Game Software; Video Game Software; Computer Programs; Downloadable Game Software; Downloadable Computer Game Software; Downloadable Video Game Software; Downloadable Electronic Game Software; Downloadable Electronic Game Software For Mobile And Cellular Telephones; Downloadable Electronic Game Software For Handheld Electroni...
[Class : 9] Software; Computer Software; Recorded Game Software; Video Game Software; Computer Programs; Downloadable Game Software; Downloadable Computer Game Software; Downloadable Video Game Software; Downloadable Electronic Game Software; Downloadable Electronic Game Software For Mobile And Cellular Telephones; Downloadable Electronic Game Software For Handheld Electroni...
[Class : 9] Game Software; Computer Game Software; Downloadable Computer Programs, Namely, Game Software For Use On Computers, Video Game Players, And Electronic And Wireless Devices.[Class : 41] Providing A Website Featuring Non Downloadable Game Software; Providing Temporary Use Of Non Downloadable Game Software; Providing Online Non Downloadable Game Software; Entertainme...
[Class : 9] Computer Hardware, Software And Software Applications To Provide Internet Connectivity Services To White Space Telecommunications Channels, Networks And Databases.
[Class : 9] Computer Software For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presenting And Sharing Data And Other Information; Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer...
[Class : 9] Downloadable Game Software; Computer Game Software; Video Game Software; Computer Game Software For Use With Personal Computers, Home Video Game Consoles, And Arcade Based Video Game Consoles; Computer Game Software Downloadable From A Global Computer Network; Digital Media, Namely, Pre Recorded Cd Ro Ms, Tapes, Cartridges, Digital Video Discs, Digital Versatile ...
[Class : 35] Organizing, Arranging, Conducting And Promoting Of Trade Shows, Business, Commercial, And Promotional Exhibitions And Business Conferences In The Fields Of Computer Hardware, Software, Telecommunications, And High Technology And In The Field Of Development Of Computer Programs And Systems; Providing Business Information Concerning Human Resources, Sales And Mark...
[Class : 9] Computer Software For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presenting And Sharing Data And Other Information; Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer...
[Class : 42] Computer Consultation And Technical Consultation In The Field Of Computers, Updating And Maintenance Of Computer Software And Software Design And Development Services In The Fields Of Speech, Speaker, Voice And/Or Voice Print Recognition, Identification, Authentication, Validation, Verification And Processing And Language Recognition.
[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications In The Nature Of Mag...
[Class : 9] Computer Software For Use In Speech Recognition Applications And Systems; Speech Processing Software; Downloadable Computer Software For Speech Recognition, Natural Language Understanding, Movement Monitoring, Human Feature Recognition, Gathering And Processing Biometric Data, Speaker Diarization, Document Creation, Machine Learning, And Artificial Intelligence; ...
[Class : 9] Computer Software For Use In Speech Recognition Applications And Systems; Speech Processing Software; Computer Software For Document Management; Computer Application Software For Mobile Phones To Enable Voice Activated Dialing, Internet Searching And Navigating Via A Worldwide Computer Network, And Dictation Of Messages; Computer Application Software For Handheld...
[Class : 9] Downloadable Computer Software; Downloadable Computer Software For Data Management, Data Repositories, Data Ingestion, Data Wrangling, Data Aggregation, Data Integration, Data Security, Data Analysis, Providing Data Analytics, Data Reporting, Information Delivery, Online Analytic Processing, Machine Learning, Combining Information From Various Data Sources And Da...
[Class : 9] Downloadable Computer Software; Downloadable Computer Software For Data Management, Data Repositories, Data Ingestion, Data Wrangling, Data Aggregation, Data Integration, Data Security, Data Analysis, Providing Data Analytics, Data Reporting, Information Delivery, Online Analytic Processing, Machine Learning, Combining Information From Various Data Sources And Da...
[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications In The Field Of Vide...
[Class : 9] Video Game Software[Class : 38] Streaming Of Audiovisual Material In The Nature Of Video Game Competitions And Play Via The Internet; Streaming Of Audiovisual Video Game Related Material Via The Internet[Class : 41] Entertainment Services, Namely, Providing Online Video Games; Rental Of Video Games; Providing Entertainment Information And Video Game Tournaments A...
[Class : 9] Silicon Microprocessors; Microcontroller Units; Microcontrollers And Chipsets For The Secure Receipt And Transmission Of Data; Microcontrollers And Chipsets Optimized For Use In Access Control, Identification, Authentication, Security And Safety; Communications Receivers; Data Exchange Units; Computer Hardware Modules For Use In Security And Secure Power Manageme...
[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications In The Field Of Vide...
[Class : 9] Software; Computer Programs; Applications; Mobile Applications; Software And Mobile Application Software For Use In Advertising, Marketing, And Promotion Services; Artificial Intelligence, Machine Learning, And Deep Learning Software; Generative Artificial Intelligence Software; Generative Artificial Intelligence Applications; Software Using Artificial Intelligen...
[Class : 9] Downloadable Software For Use In Data Governance, Data Management, Data Protection And Data Compliance, Namely, Downloadable Software For Use To Enable Users To Integrate, Manage, Classify, Label And Search For Data And Electronic Information, Downloadable Software To Design, Create, Construct, And Manage Data Maps To Facilitate Use Of And Access To Data And Elec...
[Class : 9] Silicon Chips; Computer Chips; Computer Hardware For Delivery Of Cloud Computing Services, Namely, Central Processing Units, And Computer Chips; Computer Hardware Used For Advanced Cloud Computing Functions In The Nature Of General Computing, Networking, Storage, And Computation Offloading.
[Class : 9] Silicon Chips; Computer Chips; Computer Hardware For Delivery Of Cloud Computing Services, Namely, Central Processing Units, And Computer Chips; Computer Hardware Used For Advanced Cloud Computing Functions In The Nature Of General Computing, Networking, Storage, And Computation Offloading.
[Class : 9] Silicon Chips; Computer Chips; Computer Hardware For Delivery Of Cloud Computing Services, Namely, Ai Accelerators, And Computer Chips; Computer Hardware Used For Advanced Cloud Computing Functions In The Nature Of Artificial Intelligence, Networking, Storage, And Computation Offloading.
[Class : 9] Silicon Chips; Computer Chips; Computer Hardware For Delivery Of Cloud Computing Services, Namely, Ai Accelerators, And Computer Chips; Computer Hardware Used For Advanced Cloud Computing Functions In The Nature Of Artificial Intelligence, Networking, Storage, And Computation Offloading.
[Class : 38] Providing Online Chat Rooms For Transmission Of Messages Among Computer Users For Use In Connection With Interactive Games Played Over Computer Networks And Global Communications Networks.
[Class : 35] Advertising; Business Management; Business Administration; Office Functions; Database Management; Compilation And Collection Of Data, Information And Statistics For Business Purposes Relating To Agriculture; Retail Store And Online Retail Store Services For Computer Software And Equipment Relating To Agriculture; Business Management Services In The Agriculture F...
[Class : 41] Video Editing; Video Capturing Services; Video Capturing Services, Namely, Capturing Of Videos From A Video Camera, Screen Recording Or Webcam; Entertainment And Educational Services Featuring Electronic Media, Multimedia Content, Videos, User Generated Content, And Related Information Via The Internet And Other Communications Networks; Entertainment And Educati...
[Class : 9] Computer Software To Assist A User In Operating A Computerized Handheld Device; Computer Software For Initiating And Receiving Telephone Calls, And For Accessing, Storing, Retrieving, Managing, Processing And Using Information; Computer Software For Voice Recognition, Processing Voice Commands And Converting Between Speech And Text; Computer Software For Creating...
[Class : 9] Downloadable Computer Software For Use In Creating,
Accessing, Editing, And Sharing Documents, Presentations
And Webpages; Downloadable Computer Software For Use In
Locating And Arranging Audio, Video, Graphic, Image, Textual
And Multimedia Content, And Configuring Such Content Into A
Document, Presentation Or Webpage.[Class : 42] Providing Online, Non Downl...
[Class : 9] Downloadable Software For Use In Connection With Privacy Management For Identifying, Managing, Redacting, And Safeguarding Personally Identifiable Information To Prevent And Mitigate Privacy Risks And Conflicts, And For Implementing Privacy Policies And Data Subject Rights To Meet Organizational Needs And Ensure Compliance With Privacy Laws And Regulatory Require...
[Class : 9] Software Excluding Software For Enterprise Resource Planning (Erp) Systems.[Class : 42] Software As A Service Excluding Services And Software For Enterprise Resource Planning (Erp) Systems.
[Class : 9] Computer Software And Computer Programs For Database Management, Data Storage And Backup, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Transmission Of Voice, Dat...
[Class : 9] Downloadable Computer Software And Mobile Software Applications For Data Storage And Backup, Database Management, Virtualization, Electronic And Telecommunications Networking, Collaboration, Remote Access, Remote Computer Technical Support, Cloud Computing, Data Sharing, Data Security, Electronic Network Access, Administration And Management Of Computer Applicati...
[Class : 9] Downloadable Computer Software And Mobile Software Applications For Data Storage And Backup, Database Management, Virtualization, Electronic And Telecommunications Networking, Collaboration, Remote Access, Remote Computer Technical Support, Cloud Computing, Data Sharing, Data Security, Electronic Network Access, Administration And Management Of Computer Applicati...
[Class : 9] Downloadable Game Software; Computer Game Software; Video Game Software; Computer Game Software For Use With Personal Computers, Home Video Game Consoles, And Arcade Based Video Game Consoles; Computer Game Software Downloadable From A Global Computer Network; Digital Media, Namely, Pre Recorded Cd Ro Ms, Tapes, Cartridges, Digital Video Discs, Digital Versatile ...
[Class : 9] Downloadable Software For Use In Data Governance, Data Management, Data Protection And Data Compliance, Namely, Downloadable Software For Use To Enable Users To Integrate, Manage, Classify, Label And Search For Data And Electronic Information, Downloadable Software To Design, Create, Construct, And Manage Data Maps To Facilitate Use Of And Access To Data And Elec...
[Class : 9] Downloadable Game Software; Computer Game Software; Video Game Software; Computer Game Software For Use With Personal Computers, Home Video Game Consoles, And Arcade Based Video Game Consoles; Computer Game Software Downloadable From A Global Computer Network; Digital Media, Namely, Pre Recorded Cd Ro Ms, Tapes, Cartridges, Digital Video Discs, Digital Versatile ...
[Class : 9] Computer Software For Sales Management, Customer Service Management, Business Operations Management, Financial And Finance Operations Management, Remote And Field Service Operations Management, Project Service Automation Management, Marketing Campaign Planning And Management, Customer Relationship Management, Enterprise Resource Management, Sales And Marketing In...
[Class : 28] Toys, Games And Playthings, Namely, Toy Action Figures And Accessories Therefor, Mechanical Action Toys, Toy Vehicles And Bendable Toy Figurines; Game Controllers For Computer Games; Electronic Interactive Board Games For Use With External Monitor; Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units...
[Class : 39] Cruise Ship Services; Boat Cruises; Arranging Of Cruises; Transportation Of Passengers By Cruise Ship; Travel Agency Services; Travel Agency Services, Namely, Making Reservations And Bookings For Transportation And Cruises; Providing Transport For Excursions; Travel And Transport Information Services; Provision Of Travel Information; Providing Transportation Inf...
[Class : 9] Blank Digital Storage Media; Recorded Video Game Programs;
Downloadable Video Game Software.[Class : 28] Controllers For Game Consoles; Video Game Interactive Remote
Control Units.[Class : 41] Educational Services, Namely, Providing Educational
Information On Online Educational Video Games; Providing Of
Training In The Fields Of The Video And Computer Game In...
[Class : 9] Downloadable Video And Computer Game Programs;
Downloadable And Recorded Software For Operating Game
Controllers; Electronic Devices, Namely, Computer Hardware
For Accessing Global Computer And Communication Networks;
Computer Hardware And Peripherals.[Class : 14] Jewelry.[Class : 28] Video Game Consoles; Interactive Video Game Devices
Comprised Of Video Gam...
[Class : 9] Typeface Fonts, Type Fonts And Type Designs Of Alphanumerical Characters And/Or Typographical Symbols Recorded On A Machine Readable Media; Downloadable Computer Software For Generating Type Fonts, Typeface Designs And Ornamental Designs.
[Class : 9] Computer Software For The Collection And Analysis Of Business Data And Business Productivity Information; Downloadable Computer Software For Personnel And Project Management, Social Media Management, Peer To Peer Communications, Workplace Management; Computer Software Platform For Organizational Development; Computer Application Software For Mobile Phones, Namely...
[Class : 9] Software; Computer Software; Recorded Game Software; Video Game Software; Computer Programs; Downloadable Game Software; Downloadable Computer Game Software; Downloadable Video Game Software; Downloadable Electronic Game Software; Downloadable Electronic Game Software For Mobile And Cellular Telephones; Downloadable Electronic Game Software For Handheld Electroni...
[Class : 9] Computer Software; Computer Software For The Development Of Computer Software Applications; Intelligent Edge Devices; Edge Computing And Storage Devices; Sase (Secure Access Service Edge); Industrial Sase.[Class : 42] Providing Non Downloadable Software; Software As A
Service (Saa S); Connectivity As A Service
(Caa S), Hardware As A Service (Haa S);
Platform A...
[Class : 9] Computer Software; Computer Software For The Development Of Computer Software Applications; Intelligent Edge Devices; Edge Computing And Storage Devices; Sase (Secure Access Service Edge); Industrial Sase.[Class : 42] Providing Non Downloadable Software; Software As A Service (Saa S); Connectivity As A Service (Caa S), Hardware As A Service (Haa S); Platform As A...
[Class : 9] Downloadable Computer Programs For Developing Other
Computer Programs, Downloadable Compiler Programs,
Downloadable Debugger Programs, And Downloadable Utility
Programs For Creating Graphical Applications; Downloadable
Computer Programs For Assisting Developers In Creating
Program Code For Use In Multiple Application Programs;
Downloadable Computer Programs...
[Class : 9] Downloadable Video And Computer Game Programs; Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Software For Operating Game Controllers; Electronic Devices For Accessing Global Computer And Communication Networks; Computer Hardware And Peripherals.[Class : 11] Accent Lights For Indoor Use; Lighting Fixtures.[Clas...
[Class : 38] Satellite Transmission; Satellite Communication Services; Telecommunication Services For Air To Ground And Ground To Air Communications, Namely, Local And Long Distance Transmission Of Audio, Video And Data Transmission By Means Of The World Wide Web, Satellites And Relaying Ground Stations.[Class : 42] Providing Temporary Use Of Non Downloadable Cloud Based Sof...
[Class : 9] Downloadable Computer Software Development Tools; Downloadable Computer Software For Artificial Intelligence Processing And Deep Learning; Downloadable Computer Software Development Libraries, Namely, Downloadable Electronic Data Files Consisting Of Software Development Tools For Model Development And Training; Downloadable Computer Software For Implementing A Co...
[Class : 9] Downloadable Video And Computer Game Programs; Interactive Video Game Devices Comprised Of Computer Hardware And Software And Accessories, Namely, Software For Operating Game Controllers; Electronic Devices For Accessing Global Computer And Communication Networks; Computer Hardware And Peripherals.[Class : 11] Accent Lights For Indoor Use; Lighting Fixtures.[Clas...
[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Downloadable Electronic Publications In The Nature Of Magazines In The Field Of Computer Software; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, Electronic Or Optical Media, All Bearing Computer Games,...
[Class : 9] Apparatus And Instruments For Recording, Transmitting,
Reproducing Or Processing Sound, Images Or Data, Blank Digital
Storage Media, Computers And Computer Peripheral Devices;
Recorded Video Game Programs; Downloadable Video Game
Software.[Class : 28] Video Game Machines; Video Games Consoles; Video Game
Consoles For Use With An External Display Screen Or Mo...
[Class : 41] Organizing Seminars, Events, Conferences, Training Sessions
For Educational Purposes, Namely, Promoting And Fostering
Blood Plasma Donation; Arranging And Conducting Educational
Conferences, Events, Programs, Seminars, And Training
Sessions For Educational Purposes, Namely, Promoting And
Fostering Blood Plasma Donation.[Class : 44] Providing Information In ...
[Class : 9] Downloadable Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing A Web Site Featuring Entertainment Information In The
Field Of Computer Games, Games, And Home Entertainment;
Providing Information On Line Relating To Computer Games And
Computer Enhancements For Games; Entertainment Services,
Namely, Prov...
[Class : 38] Providing Online Chat Rooms For Transmission Of Messages Among Computer Users For Use In Connection With Interactive Games Played Over Computer Networks And Global Communications Networks.
[Class : 38] Providing Online Chat Rooms For Transmission Of Messages Among Computer Users For Use In Connection With Interactive Games Played Over Computer Networks And Global Communications Networks.
[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Computer Software Publications (Downloadable); Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, El...
[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Computer Software Publications (Downloadable); Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, El...
[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Computer Software Publications (Downloadable); Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, El...
[Class : 9] Computer Software; Mobile Application Software; Collaboration Software Platform.[Class : 35] Business Services; Business Consulting Services; Providing Business Information; Business Advice And Information Services.[Class : 42] Computer And Information Technology Consultancy Services; Platform As A Service (Paas) Services; Software As A Service (Saas) Services.
[Class : 38] Providing Online Access To Computer Networks, Computer Databases, The Internet, On Line Bulletin Boards, Virtual Worlds, Servers, Virtual Worlds Including User Generated Characters, And Libraries Of Text, Graphics And Audio Visual And Multimedia Information And Entertainment; Providing On Line Electronic Bulletin Board Services And Chat Rooms; Providing User Acc...
[Class : 9] Computer Software; Computer And Video Games Software; Interactive Entertainment Software; Computer Software (Downloadable); Electronic Publications; Computer Software Publications (Downloadable); Data Recorded Electronically From The Internet; Data Recorded In Machine Readable Form From The Internet; Discs, Tapes, Cartridges, Cd Roms, Dv Ds And Other Magnetic, El...
[Class : 9] Downloadable Computer And Video Game Software;
Downloadable Computer Programs, Namely, Game Software For
Use On Computers And Video Game Players.[Class : 41] Entertainment Services, Namely, Providing Temporary Use
Of Non Downloadable Game Software, Providing Online Nondownloadable Visual And Audio Recordings In The Field Of
Computer And Video Games, Providing...
[Class : 9] Apparatus And Instruments For Recording, Transmitting, Reproducing Or Processing Sound, Images Or Data; Recorded And Downloadable Media, Computer Software, Blank Digital Or Analogue Recording And Storage Media; Computers And Computer Peripheral Devices; Recorded Video Game Programs; Downloadable Video Game Software.[Class : 28] Games, Toys And Playthings; Video G...
[Class : 9] Software; Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Entertainment; Providing A Website Featuring Information In The Field Of Computer Games, Games, And Home Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing O...
[Class : 9] Computer Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images.[Class : 42] Providing Online, Non Downloadable Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images; Software As A Service (Saas) Featurin...
[Class : 9] Apparatus And Instruments For Recording, Transmitting, Reproducing Or Processing Sound, Images Or Data; Recorded And Downloadable Media, Computer Software, Blank Digital Or Analogue Recording And Storage Media; Computers And Computer Peripheral Devices; Recorded Video Game Programs; Downloadable Video Game Software.[Class : 28] Games, Toys And Playthings; Video G...
[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...
[Class : 9] Computer Software Development Tools; Computer Software,
Namely, Artificial Intelligence Enabled Software For Assisting With
Software Development.[Class : 42] Software As A Service (Saas) Services Featuring Software For
Developing, Reviewing, And Testing Other Computer Programs
And Applications; Software As A Service (Saas) Services
Featuring Software For Ass...
[Class : 35] Providing Business Information And Consulting In The Field Of White Space Telecommunications And Internet Connectivity; Promoting Public Interest And Awareness Of White Space Telecommunications And Internet Connectivity (Terms Considered Too Vague By The International Bureau Rule 13 (2) (B) Of The Common Regulations).[Class : 38] Telecommunications Services, N...
[Class : 9] Computer Software; Computer Software For Video Game Development, Operation, Management, And Hosting.[Class : 42] Platform As A Service (Paa S); Platform As A Service (Paa S) Featuring Computer Software Platforms Used For The Operations, Management And Hosting Of Online Video Games; Software As A Service (Saa S); Software As A Service (Saa S) Featuring Computer So...
[Class : 9] Downloadable Software, Namely Software For Connecting To The Cloud To Allow For Collaboration Among Users Across Other Software Applications; Downloadable Software, Namely Software For Integrating Artificial Intelligence And Intelligent Agents Into Other Software; Downloadable Software, Namely Software For Allowing Real Time Updates To Software Applications Acces...
[Class : 9] Scientific, Nautical, Surveying, Photographic, Cinematographic,
Optical, Weighing, Measuring, Signalling, Checking
(Supervision), Life Saving And Teaching Apparatus And
Instruments; Apparatus And Instruments For Conducting,
Switching, Transforming, Accumulating, Regulating Or
Controlling Electricity; Apparatus For Recording, Transmission Or
Reproduction Of ...
[Class : 9] Computer Game Software, Computer Software; Headsets For Use With Computers; Mousepads; Night Vision Goggles; Computer Game Software Downloadable Via A Global Computer Network And Wireless Devices; Computer Game Software For Use On Mobile And Cellular Phones; Prerecorded Media, Namely, Digital Audio And Video Tapes And Discs, C Ds, Dv Ds, And Blue Ray Discs All Fe...
[Class : 9] Downloadable Computer Programs, Namely, Game Software For
Use On Computers And Video Game Players.[Class : 41] Providing Temporary Use Of Non Downloadable Computer Game
Software; Providing A Web Site Featuring Information In The
Field Of Computer Games, Games, Namely, Electronic Games
And Video Games, And Entertainment Information In The Field
Of Computer Ga...
[Class : 9] Computer Game Software, Computer Software, Headsets For Use With Computers; Mousepads; Night Vision Goggles; Computer Game Software Downloadable Via A Global Computer Network And Wireless Devices; Computer Game Software For Use On Mobile And Cellular Phones; Prerecorded Media, Namely, Digital Audio And Video Tapes And Discs, C Ds, Dv Ds, And Blue Ray Discs All Fe...
[Class : 9] Downloadable Computer Game Software; Downloadable
Computer Software For Use In The Field Of Electronic Gaming;
Computer Game Software Downloadable Via A Global Computer
Network And Wireless Devices; Downloadable Computer Game
Software For Use On Mobile And Cellular Phones; Prerecorded
Digital Audio And Discs, C Ds, All Featuring Music; Downloadable
Music Fi...
[Class : 9] Downloadable Software, Namely Software For Connecting To The Cloud To Allow For Collaboration Among Users Across Other Software Applications; Downloadable Software, Namely Software For Integrating Artificial Intelligence And Intelligent Agents Into Other Software; Downloadable Software, Namely Software For Allowing Real Time Updates To Software Applications Acces...
[Class : 9] Downloadable Computer Game Software; Computer Game
Software Downloadable Via A Global Computer Network And
Wireless Devices; Downloadable Computer Game Software For
Use On Mobile And Cellular Phones; Downloadable Movies
Featuring Electronic Games Provided Via A Video On Demand
Service; Downloadable Music Files; Phonograph Records
Featuring Electronic Game S...
[Class : 41] Providing Information In The Field Of Computer Games, Games And Home Entertainment, Via A Web Site; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; And Entertainment Services, Namely, Providing An On Line Computer Game.[Class : 42] Non Downloadable Computer Game Software; Providing Technology That Enables Users To Cr...
[Class : 9] Downloadable Computer Game Software; Computer Game
Software Downloadable Via A Global Computer Network And
Wireless Devices; Downloadable Computer Game Software
For Use On Mobile And Cellular Phones; Prerecorded Media,
Namely, Digital Audio And Video Tapes And Discs, C Ds, Dv Ds,
And Digital Optical Discs All Featuring Films, Movies And/Or
Television Progra...
[Class : 41] Education Services, Namely, Conducting Seminars, Classes, Workshops, Online Courses, And Conferences In The Fields Of Technology, Computers, Computer Software, Computer Networks, Web Services, Mobile Computing, Artificial Intelligence, Cloud Computing, Software As A Service (Saa S), Platform As A Service (Paa S), Mobile Backend As A Service (M Baa S), Artificial...
[Class : 9] Computers, Tablet Computers, Laptops; Software Developer Kits
(E.G. Windows Sd Ks); Portable Electronic Devices For Receiving
And Reading Text, Images And Sound Through Wireless Internet
Access, Namely, Mobile Computers, Portable Computers,
Mobile Phones; Computer Software For Use In Connection
With The Transmission Of Voice And Data; Computer Software
Used...
[Class : 9] Downloadable Computer Programs, Namely, Game Software For
Use On Computers And Video Game Players.[Class : 41] Providing Information In The Field Of Computer Games, Games, And Home Entertainment, Via A Website; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing On Line Computer ...
[Class : 9] Downloadable Computer Software For Sending And Receiving
Electronic Messages.[Class : 35] On Line Business Networking Services.[Class : 38] Transmission Of Messages; Message Sending, Receiving And
Forwarding; Electronic Transmission Of Mail And Messages;
Instant Messaging Services.[Class : 42] On Line Non Downloadable Software For Sending And Receiving Electro...
[Class : 9] Computer Programs, Namely, Game Software For Use In Computers And Video Game Players.[Class : 41] Providing Via Web Site Information In The Field Of Computer Games, Games And Home Entertainment; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing On Line Computer Games.[Class : 42...
[Class : 9] Downloadable Computer Software Which Enables Instant
Messaging And File Sharing; Downloadable Communications
Software For Enabling Computer Network, Wireless Network
And Internet Users To Exchange Data, Audio Transmissions,
Video Images And Graphics; Downloadable Computer Programs
For Managing Communications And Data Exchange Between
Hand Held Computers And...
[Class : 9] Downloadable Computer Programs For Providing Enhanced
Electronic Mail And Scheduling Capabilities, For Use By Individual
Computer Users, Namely, Downloadable Computer Programs
For Managing, Viewing, And Editing Files, Documents, Electronic
Mail Messages And Private Network And Global Computer
Network Communications; Downloadable Computer Programs
For Meetin...
[Class : 9] Downloadable Computer Software For Use In Project
Management; Downloadable Computer Software For Designing,
Creating, Maintaining And Accessing Customized Internal
Network Sites And Global Communication Network Sites;
Downloadable Computer Authoring Software For Use On Internal
Computer Networks And Global Communication Networks,
Namely, Software For Creati...
[Class : 9] Downloadable Computer Programs, Namely, Game Software For
Use On Computers And Video Game Players.[Class : 41] Providing Information In The Field Of Computer Games,
Games And Home Entertainment Via A Web Site; Providing
Information On Line Relating To Computer Games And Computer
Enhancements For Games; And Entertainment Services, Namely,
Providing An On Line...
[Class : 9] Downloadable Computer Software For Receiving, Displaying,
Storing, Organizing And Sharing With Other Users Documents,
Sounds, Music, Videos, Photographs, Drawings, Images And
Data Stored Electronically.[Class : 38] Telecommunication Services, Namely, Transmission Of Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data By Means Of Telecommun...
[Class : 9] Downloadable Computer Software, Namely, Software For The
Transmission, Recording, Reproduction, Display, Organization,
Management, Manipulation And Review Of Messages, Text,
Images, Files, Audio, Video And Audio Visual Content And
Other Data For The Facilitation Of Communications Between
Two Or Multiple Users Via Computer Networks, Communication
Networks An...
[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing Information In The Field Of Computer Games, Games And Home Entertainment Via A Web Site; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; And Entertainment Services, Namely, Providing An On Line Computer Game.[Cl...
[Class : 9] Downloadable Electronic Publications In The Nature Of
Educational Course Materials In The Fields Of Science,
Technology, Engineering And Math; Software, Namely,
Educational Software For Providing Instruction In The Fields
Of Science, Technology, Engineering And Math; Computer
Hardware And Computer Peripherals; Teaching Robots.[Class : 41] Developing Curricul...
[Class : 9] Software For Use In Medical Analysis, Namely, Detection
Of Pathogens, Performing Gene Sequencing Research,
Visualization, And Analysis, And Locating Insects And Insect
Habitats; Software For Operating Drones And Insect Traps.[Class : 12] Drones.[Class : 21] Insect Traps.[Class : 42] Software As A Service (Saa S) Services Featuring Software
For Use In Medical ...
[Class : 9] Computer Software For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presenting And Sharing Data And Other Information; Computer Application Software For Mobile Phones, Namely, Software For Use In Locating, Gathering, Compiling, Analyzing, Modeling, Graphing, Visualizing, Animating, Transforming, Presen...
[Class : 9] Computer Software For Creating And Editing Digital Images, Sound, Videos And Movies; Computer Software For Compressing And Decompressing Digital Media; Computer Software For Viewing, Searching And Playing Pre Recorded Digital Videos And Movies; Computer Software For Organizing, Storing, Sharing And Viewing Digital Images, Photographs, Videos And Movies; Computer ...
[Class : 9] Downloadable Computer Software For Streaming, Broadcasting, Transmitting And Reproducing Text, Data, Images, Music And Video; Electronic Databases In The Field Of Entertainment Featuring Music And Videos Recorded On Computer Media.[Class : 38] Electronic Transmission Of Software, Messages, Data, Text, Sound, Graphics And Video Via Computer Networks, Wireless Netw...
[Class : 35] On Line Retail Store Services Featuring Downloadable Computer
And Video Games; Operating An On Line Shopping Site In The Field
Of Computer And Video Games; Providing Consumer Product
Information And Advertising And Commercial Information
Regarding Computer And Video Games Available For Purchase
Via An Online Searchable Database; Providing Consumer Product
...
[Class : 9] Computer And Video Games Software; Interactive Entertainment Software For Playing Computer Games And Video Games; Downloadable Publications In Electronic Form Supplied On Line From A Database Or From Facilities Provided On The Internet Or Other Networks Including Websites, Namely, Books, Comics, Magazines, Newsletters, Catalogues And Manuals In The Field Of Compu...
[Class : 9] Computer Programs, Namely, Game Software For Use In Computers And Video Game Players.[Class : 41] Providing Entertainment Information In The Field Of Computer Games, Games And Home Entertainment, Via A Web Site; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing On Line Computer ...
[Class : 9] Recorded And Downloadable Computer Software, Namely,
Recorded And Downloadable Computer Spreadsheet Software;
Recorded And Downloadable Computer Programs For Creating
Charts And Graphs From Electronic Spreadsheets.[Class : 42] Cloud Computing Featuring Software For Use In Electronic Spreadsheets And Accessing Remotely Stored Data For Such Applications; Providi...
[Class : 9] Silicon Microprocessors; Microcontroller Units; Microcontrollers And Chipsets For The Secure Receipt And Transmission Of Data; Microcontrollers And Chipsets Optimized For Use In Access Control, Identification, Authentication, Security And Safety; Communications Receivers; Data Exchange Units; Computer Hardware Modules For Use In Security And Secure Power Manageme...
[Class : 9] Computer Software; Computer Software For Artificial Intelligence (Ai) Processing; Computer Chips For Artificial Intelligence (Ai) Processing; Computers And Servers For Artificial Intelligence (Ai) Processing; Computer Operating System Software; Embedded Operating Software; Computer Software Development Tools, For Use In The Fields Of Artificial Intelligence, Deep...
[Class : 41] Educational Services And Entertainment, Namely, Providing
Incentives To Students To Demonstrate Excellence Through
The Issuance Of Awards And Recognition, All In The Fields
Of Innovation And Technology; Arranging And Conducting
Educational Competitions For Students And Participants In The
Fields Of Innovation And Technology.
[Class : 9] Downloadable Computer Software And Mobile Software Applications For Data Storage And Backup, Database Management, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Tr...
[Class : 9] Computer Software Platform For Organizational Development In The Field Of Human Resources; Computer Software Platform For Organizational Development In The Field Of Employment; Computer Software For Interactive Communication By Companies In The Field Of Organizational Development.[Class : 35] Providing Organizational Development Consulting Services; Consulting Se...
[Class : 9] Computer Software For Sales Management, Customer Service Management, Business Operations Management, Financial And Finance Operations Management, Remote And Field Service Operations Management, Project Service Automation Management, Marketing Campaign Planning And Management, Customer Relationship Management, Enterprise Resource Management, Sales And Marketing In...
[Class : 9] Entertainment Software, Namely, Electronic Game Software;
Interactive Entertainment Software, Namely, Electronic Game
Software; Application Software, Namely, Electronic Game
Software.[Class : 41] Entertainment Services, Namely, Providing Online Nondownloadable Electronic Games; Provision Of Entertainment
Software, Namely, Online Non Downloadable Electronic Ga...
[Class : 9] Computer Software For Information Management, Data And Text
Processing, Networking, Electronic Mail And Other Electronic
Communications In The Nature Of Private Network And Global
Computer Network Communications, For Use In The Field Of
Business Communications, General Email Communications,
And General Use; Computer Software For Use Monitoring And
Managing E Mail...
[Class : 28] Games; Toys; Playthings; Soft Toys; Board Games; Gymnastic And Sporting Articles; Electronic Toys And Electronic Games; Handheld Electronic Games Apparatus; Slot Machines And Gaming Devices; Play Sets And Play Cases; Toy Models; Handheld Games; Playing Cards; Instructional And Teaching Materials In The Form Of Games; Balls; Electronic Amusement Apparatus; Amusem...
[Class : 9] Video Game Software.[Class : 28] Video Game Consoles For Use With An External Display Screen Or Monitor; Video Game Interactive Remote Control Units.
[Class : 9] Computer Software, Namely, Software For The Transmission, Recording, Reproduction, Display, Organization, Management, Manipulation And Review Of Messages, Text, Images, Files, Audio, Video And Audio Visual Content And Other Data For The Facilitation Of Communications Between Two Or Multiple Users Via Computer Networks, Communication Networks And The Global Inform...
[Class : 9] Computer Software For Receiving, Displaying, Storing, Organizing And Sharing With Other Users Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data Stored Electronically.[Class : 38] Telecommunication Services, Namely, Transmission Of Documents, Sounds, Music, Videos, Photographs, Drawings, Images And Data By Means Of Telecommunications Network...
[Class : 9] Computer Software For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Images.[Class : 42] Providing Online, Non Downloadable Software And Software As A Service (Saas) Services For Viewing, Editing And Sharing Visual And Audio Visual Content Including Documents, Spreadsheets, Presentations, And Ima...
[Class : 9] Computer Software For Computers, Mobile Phones, Computer Tablets, And Other Personal Electronic Devices, Namely, For Use In Accessing, Monitoring, Tracking, Searching, Saving, And Sharing Information In The Fields Of Health, Fitness, Food, Beverages, Wine, Spirits, Travel, Entertainment, Weather, News, Sports, Maps, Language Translation, And Finance; Search Engin...
[Class : 9] Computer Programs For Accessing Internet, Computer Networks And Global Communication Networks; Computer Software For Accessing A Search Engine; Computer Software For Providing Access To A Search Engine; Computer Programs For Transmitting And Receiving Graphics, Audio, Video, And Other Data From A Remote Computer Network And For Accessing Global Communications Net...
[Class : 9] Computer Software For Processing, Creating, Editing, Importing, Exporting, And Sending User Interfaces, Web Pages, Software Applications, Digital Media, Graphics, Drawings, Text, And Images; Computer Software For Integrating Digital Media, Graphics, Drawings, Text, And Images With And Into Other Software Programs And Applications.
[Class : 41] Entertainment.[Class : 42] Providing Online Non Downloadable Software; Software As A Service (Saa S).[Class : 45] Online Social Networking Services.
[Class : 35] On Line Marketplace Services, Namely, Operating An On Line
Marketplace Featuring Computer Software.[Class : 42] Software As A Service (Saa S) Services Featuring Software For
Use In Connection With Buying, Selling Sharing, Searching,
Downloading, Customizing, Integrating And Reviewing Computer
Software; Providing A Website Featuring Technology That Enables
U...
[Class : 9] Computer Software That Provides Analytics And Engagement Services For Chatbots And Bots; Computer Software For Providing For Interaction Of A User With A Conversational User Interface; Computer Software For Retrieving Information From A User And Delivering To The User Context Sensitive Information And User Specific Information; Computer Software For Providing Inf...
[Class : 9] Computer Software For Computers, Mobile Phones, Computer Tablets, And Other Personal Electronic Devices, Namely, For Use In Accessing, Monitoring, Tracking, Searching, Saving, And Sharing Information In The Fields Of Health, Fitness, Food, Beverages, Wine, Spirits, Travel, Entertainment, Weather, News, Sports, Maps, Language Translation, And Finance; Search Engin...
[Class : 42] Computer Services, Namely, On Line Scanning, Detecting, Quarantining And Eliminating Of Viruses, Worms, Trojans, Spyware, Adware, Malware And Unauthorized Data And Programs On Computers And Electronic Devices; Software As A Service (Saas) Services Featuring Software For Use In Monitoring, Tracking, Analysis, And Display Of Relationships Between Data; Software As...
[Class : 35] Promoting Public Awareness And Interests Concerned With
Health, Community And Environmental Data And Analytics;
Providing Business Information In The Field Of Environmental
Data And Analytics; Scientific Research In The Field Of
Environmental Data And Analytics.[Class : 42] Information Technology Consultation, Development And
Implementation Of Technology So...
[Class : 41] Education Services, Namely, Conducting Seminars, Classes,
Workshops, Online Courses, And Educational Conferences
In The Fields Of Technology, Cloud Computing, Web Services,
Software As A Service (Saa S), Platform As A Service (Paa S),
Mobile Backend As A Service (M Baa S), Artificial Intelligence,
Software Development, Game Development, Internet Of Things,
...
[Class : 35] Promoting
Trade Shows In The Fields Of Computers,
Technology, Computer Programming,
Computer Software, Computer Games,
Artificial Intelligence, Machine Learning,
Cloud Based Technology, Internet
Technology, Big Data Analytics, Business
Management, Business Development,
Entrepreneurship And Venture Capital
Financing; Arranging And Conducting
Business Co...
[Class : 9] Microcontrollers; Computer Chipsets; Microcontrollers And Chipsets For The Secure Transmission Of Data; Communications Receivers; Data Exchange Units; Computer Hardware Modules For Use With The Internet Of Things (Io T); Wired And Wireless Internet Connected Computing Devices, Including Smart Watches, Electric Sensors, Electric Actuators, And Other Electronically...
[Class : 9] Computer Software; Computer Software For Artificial Intelligence (Ai) Processing; Computer Chips For Artificial Intelligence (Ai) Processing; Computers And Servers For Artificial Intelligence (Ai) Processing; Computer Operating System Software; Embedded Operating Software; Computer Software Development Tools, For Use In The Fields Of Artificial Intelligence, Deep...
[Class : 9] Computer Programs, Namely, Game Software For Use In Computers And Video Game Players.[Class : 41] Providing Entertainment Information In The Field Of Computer
Games, Games And Home Entertainment Via A Website;
Providing Information On Line Relating To Computer Games And
Computer Enhancements For Games.[Class : 42] Providing Technology That Enables Users To Upl...
[Class : 9] Computer Software To Assist A User In Operating A Computerized Handheld Device; Computer Software For Initiating And Receiving Telephone Calls, And For Accessing, Storing, Retrieving, Managing, Processing And Using Information; Computer Software For Voice Recognition, Processing Voice Commands And Converting Between Speech And Text; Computer Software For Creating...
[Class : 9] Downloadable Computer Software For Use In Note Taking,
Namely, Computer Software For Recording, Organizing, Editing
And Transmitting Audio And Visual Information And Images In
Electronic Form; Downloadable Computer Software For Viewing
And Editing Meeting Agendas And To Do Lists; Downloadable
Computer Software For Reminding Users Of Dates And Events;
Downlo...
[Class : 9] Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer Software For Publishing, Sharing And Accessing Computer Software Applications And Mobile Software Applications.[Class : 42] Software As A Service (Saa S) Featuring Computer Softwar...
[Class : 38] Communication Services, Namely The Transmission Of Three Dimensional (3 D) Drawings, Images And Digital Content Via The Internet; Electronic Bulletin Board Services; Electronic Message Services.[Class : 42] Online Non Downloadable Software For Three Dimensional (3 D) Modeling Of Spaces And Objects, Converting Two Dimensional (2 D) Content Into Three Dimensional ...
[Class : 35] Providing Information In The Fields Of Business And Commerce
Over Global Computer Networks And Global Communications
Networks; Business Services, Namely, Business Consultation
And Marketing Services, Business Advice And Information
Services; Providing Consumer Product Information Via Global
Computer Networks; Promoting The Goods And Services Of
Others Via ...
[Class : 9] Downloadable Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing An On Line Computer Game.
[Class : 9] Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer Software For Publishing, Sharing And Accessing Computer Software Applications And Mobile Software Applications[Class : 42] Software As A Service (Saa S) Featuring Computer Software...
[Class : 9] Downloadable Computer Game Software; Downloadable
Computer Software For Use In The Field Of Electronic Gaming,
Mousepads; Computer Game Software Downloadable Via A
Global Computer Network And Wireless Devices; Prerecorded
Digital Audio And Video Tapes And Discs, C Ds, And Dv Ds, All
Featuring Music; Downloadable Music Files; Records, Namely,
Sound Recording...
[Class : 9] Downloadable Computer Software For Information Management,
Data And Text Processing, Networking, Electronic Mail And Other
Electronic Communications In The Nature Of Private Network And
Global Computer Network Communications, For Use In The Field
Of Business Communications, General Email Communications,
And General Use; Downloadable Computer Software For Use...
[Class : 9] Computer Software; Downloadable And Installable Programs For Playing Video Games; Computer Programs For Playing Video Games And Social Networking; Computer Programs For Cellular Phones For Playing Video Games And Social Networking; Game Programs For Cellular Phones For Playing Video Games And Social Networking; Downloadable Image Files Featuring Images Of Charact...
[Class : 9] Video Game Software.[Class : 38] Video Game Streaming.[Class : 41] Entertainment Services, Namely, Providing Online Video Games.[Class : 42] Providing Online Non Downloadable Software And Software As A Service (Saas) Services For Transmitting And For Receiving Video Games.
[Class : 9] Computer Software For Sales Management, Customer
Service Management, Business Operations Management,
Financial And Finance Operations Management, Remote
And Field Service Operations Management, Project Service
Automation Management, Marketing Campaign Planning And
Management, Customer Relationship Management, Enterprise
Resource Management, Sales And Market...
[Class : 9] Computer Software For Voice Over Internet Protocol (Voip); Computer Software For Enabling Messaging And Instant Messaging Via The Internet; Computer Software For Use In Simple Message Service (Sms) And Multimedia Message Service (Mms); Computer Software For Voice Calling, Voice Mailing, Call Forwarding, Video Calling, Video Conferencing, Simple Message Service (S...
[Class : 42] Software As A Service (Saa S) Services Featuring Software For Database Design And Development; Software As A Service (Saa S) Services Featuring Software For Use In Database Management.
[Class : 35] Business Consultation Services In The Fields Of Information
Technology, Software, Cloud Computing, And Enterprise
Architecture; Database Management Services; Business Risk
Assessment And Management Services.[Class : 37] Technical Support Services, Namely, Troubleshooting In The
Nature Of The Repair Of Computer Hardware.[Class : 41] Educational And Training S...
[Class : 9] Entertainment Software, Namely, Electronic Game Software;
Interactive Entertainment Software, Namely, Electronic Game
Software; Application Software, Namely, Electronic Game
Software.[Class : 41] Entertainment Services, Namely, Providing Online Nondownloadable Electronic Games; Provision Of Entertainment
Software, Namely, Online Non Downloadable Electronic Ga...
[Class : 9] Computer Software, Namely, Software For Manipulating Digital
Audio And For Improving Sound; Computer Software Namely,
Software For Use In Processing, Recording, Reproduction,
Streaming, Transmission, And Reception Of Electronic Or
Digital Signals; Computer Software Namely, Software For
Operating, Measuring, Signaling And Checking Hearing Aids And
Audiologic...
[Class : 41] Educational Services And Entertainment, Namely, Sponsoring Competitions And Providing Incentives To Students To Demonstrate Excellence Through Organization And Conducting Of Award Ceremonies, All In The Fields Of Computers, Computer Programming, Computer Coding, Web Design, Graphic Design, Animation, Video Game Design And Development And Application Software Dev...
[Class : 41] Entertainment Services, Namely, Providing Interactive
Entertainment Via Virtual Reality, Mixed Reality, And Augmented
Reality Content, Namely, Audio, Video, Text, Binary, Still Images,
Graphics, Multimedia Files And Computer Games; Organizing
Exhibitions In The Field Of Interactive Entertainment, Virtual
Reality, Mixed Reality, Augmented Reality, And Consum...
[Class : 9] Computers; Computer Hardware; Transceivers For Television
And Global Communication Network Transmissions That
Transmit Them To A Television Or Other Display Device, And
Computer Operating Programs For Use Therewith; Telephones;
Entertainment System Comprising A Computer, Multiple
Image Display Screen And Multiple Input Devices; Hand Held
Computers; Audiovis...
[Class : 38] Communication Services, Namely The Transmission Of Three Dimensional (3 D) Drawings, Images And Digital Content Via The Internet; Electronic Bulletin Board Services; Electronic Message Services.[Class : 42] Provision Of Online Non Downloadable Software For Three Dimensional (3 D) Modeling Of Spaces And Objects, Converting Two Dimensional (2 D) Content Into Three...
[Class : 9] Computer Software Development Tools; Computer Software, Namely, Software Development Tools For The Creation Of Computer Software Applications And Mobile Software Applications; Computer Software For Publishing, Sharing And Accessing Computer Software Applications And Mobile Software Applications.[Class : 42] Software As A Service (Saa S) Featuring Computer Softwar...
[Class : 42] Platform As A Service (Paas) Featuring Computer Software Platforms For Buyers And Sellers Of Online Advertising To Build, Manage, And Optimize Their Entire Online Advertising Businesses.
[Class : 35] Providing Commercial Information In The Fields Of Business,
Commerce, And Consumer Products; Retail And Online Retail
Store Services Featuring Computer Hardware And Software,
Video Games And Accessories, Computers And Computer
Peripherals, Mobile And Telecommunication Devices And
Accessories, A/V Equipment And Accessories, Personal
Digital Assistants, Webc...
[Class : 9] Software To Provide Access To 3 D Virtual Reality Environments, Including Avatars And User Interfaces For 3 D Virtual Reality; Software That Allows Participants To View And Interact With Web Content In A 3 D Virtual Reality Environment And To Interact With Others In A Virtual Reality Environment For Business, Leisure, Entertainment, Or Training Purposes; Software...
[Class : 35] Business Consultation Services; Business Development, Marketing And Management Consultancy Services; Business Management Consulting With Relation To Strategy, Financing, Marketing, Production, And Personnel For Companies Involved In The Development Of Technologies For Rural And Underdeveloped Communities; Promoting Public Interest And Awareness Of Technological ...
[Class : 9] Computer Software For Data Processing; Technological Devices
For Data Processing In The Nature Of Calculating Machines,
Data Processing Equipment And Computers; Technological
Devices In The Nature Of Multifunction Electronic Devices
And Apparatus For Capturing, Transmitting, Reproducing,
And Displaying Three Dimensional Objects, Images And
Video; Technologi...
[Class : 35] Promoting Public Interest And Awareness Of White Space
Telecommunications And Internet Connectivity; Charitable
Services, Namely, Organizing, Developing, And Conducting
Marketing And Business Programs And Projects Aimed At
Increasing Technological Development In Rural Communities;
Providing Information In The Fields Of Business Analysis And
Strategic Plann...
[Class : 9] Computer Software And Computer Programs For Database Management, Data Storage And Backup, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Transmission Of Voice, Dat...
[Class : 6] Identification Tags Of Metal; Key Tags Of Common Metal; Metal Rings; Metal Cases; Metal Badges.[Class : 9] Interactive Entertainment Software; Computer Software;
Computer Application Software; Computer Games Software;
Computer Gaming Software; Video Games Programs; Action
Computer Games [Software]; Action Console Games Software;
Action Games Software; Applica...
[Class : 9] Downloadable And Recorded Computer Word Processing
Software; Downloadable And Recorded Computer Programs
For Creating, Editing, Sharing, Storing, And Printing Documents
Comprised Of Text And Graphics And Downloadable And
Recorded Computer Utility Programs For Use Therewith.[Class : 42] Cloud Computing Featuring Word Processing Software; Providing Temporary Us...
[Class : 42] Cloud Computing Featuring Software For Use In Presentation Graphics And Accessing Remotely Stored Data For Such Applications; Providing Temporary Use Of On Line Non Downloadable Software And Applications For Presentation Graphics; Providing Technical Information In The Field Of Computer Software And Cloud Computing.[Class : 9] Recorded And Downloadable Computer ...
[Class : 9] Computer Game Software; Headsets For Use With Computers;
Mousepads; Computer Game Software Downloadable Via A
Global Computer Network And Wireless Devices; Computer Game
Software For Use On Mobile And Cellular Phones; Prerecorded
Media, Namely, Digital Audio And Video Tapes And Discs, C Ds,
Dv Ds, And Optical Discs All Featuring Movies In The Field Of
Actio...
[Class : 9] Educational Computer Software Downloaded From The Internet; Computer Apparatus For Educational Use; Educational Materials In The Form Of Computer Programmes For Teaching Languages; Computer Programs Relating To The Training Of Personnel; Training Guides In Electronic Format; Training Guides In The Form Of A Computer Program; Educational Computer Software Includin...
[Class : 9] Computer Programs, Namely, Game Software For Use On Computers And Video Game Players.[Class : 41] Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely, Providing An On Line Computer Game.[Class : 42] Computer Software Design; Designing Of Entertainment Software; Developing Of Entertainment So...
[Class : 9] Downloadable Computer Software For Security Information And
Event Management (Siem) Employing Artificial Intelligence And
Machine Learning To Enable Automated Responses In Real Time
To Security Vulnerabilities, Threats And Events; Downloadable
Computer Software For Collection, Storage, Analysis And
Presentation Of Data For Forensic Analysis Of Security Event...
[Class : 9] Downloadable Computer Software For Automating Business
Processes And Analysis Including Creating And Managing
Workflows Across Multiple Applications To Synchronise Files, Get
Notifications, Collect Data; Downloadable Computer Software For
Building Ai Models To Add Intelligence To Business Workflows;
Downloadable Computer Software For Viewing, Exploring,
Ena...
[Class : 41] Providing Entertainment Information In The Field Of Computer Games, Games And Home Entertainment Via A Website; Providing Information On Line Relating To Computer Games And Computer Enhancements For Games; Entertainment Services, Namely,: Providing On Line Computer Games; Online Entertainment In The Nature Of Computer Game Tournaments; Conducting Contests Online...
[Class : 9] Downloadable Computer Software For Parental Control Of
Computer And Internet Usage; Downloadable Computer Software
For Managing, Filtering, And Monitoring Access To Mobile
Devices, Console And Portable Gaming Devices, Applications,
Games Software And Internet Usage; Downloadable Computer
Software For Remotely Managing Device And Application
Settings; Downlo...
[Class : 9] Recorded Video Game Programs; Downloadable Video Game Software.[Class : 28] Controllers For Game Consoles; Game Controllers In The Nature Of Keyboards For Computer Games; Video Game Interactive Remote Control Units; Video Game Consoles; Video Game Consoles For Use With An External Display Screen Or Monitor.[Class : 38] Streaming Of Data; Streaming Of Video Materi...
[Class : 9] Computer Software For Use In Creating, Accessing, Editing, And Sharing Documents, Presentations And Webpages; Computer Software For Use In Locating And Arranging Audio, Video, Graphic, Image, Textual And Multimedia Content, And Configuring Such Content Into A Document, Presentation Or Webpage.[Class : 42] Providing Online, Non Downloadable Software And Software A...
[Class : 9] Computer Software For Data Storage And Backup, Database Management, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Transmission Of Voice, Data, Images, Audio, Vide...
[Class : 41] Providing Non Downloadable
Instructional Materials And Guidelines In
The Field Of Computer Software Application
And User Interface Via A Website; Education
Services, Namely, Providing Online Tutorials
And Instruction In The Field Of Computer
Software, Mobile Applications, And User
Interface; Development Of Instructional And
Educational Materials And Guid...
[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications[Class : 41] Entertai...
[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...
[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...
[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...
[Class : 9] Software; Artificial Intelligence, Machine Learning, And Deep Learning Software; Mobile Applications; Downloadable Electronic Publications; Downloadable Software For Accessing, Viewing, And Interacting With News And Information Content; Mobile Applications For Aggregating And Organizing News And Information; Downloadable Electronic Publications In The Nature Of A...
[Class : 9] Software; Artificial Intelligence, Machine Learning, And Deep Learning Software; Mobile Applications; Downloadable Electronic Publications; Downloadable Software For Accessing, Viewing, And Interacting With News And Information Content; Mobile Applications For Aggregating And Organizing News And Information; Downloadable Electronic Publications In The Nature Of A...
[Class : 9] Software; Artificial Intelligence, Machine Learning, And Deep Learning Software; Mobile Applications; Downloadable Electronic Publications; Downloadable Software For Accessing, Viewing, And Interacting With News And Information Content; Mobile Applications For Aggregating And Organizing News And Information; Downloadable Electronic Publications In The Nature Of A...
[Class : 9] Recorded Computer Game Software; Downloadable Computer Game Software Via A Global Computer Network And Wireless Devices; Downloadable Computer Game Software For Personal Computers And Home Video Game Consoles; Downloadable Computer Game Software For Use On Mobile And Cellular Phones And Handheld Computers; Downloadable Electronic Publications.[Class : 41] Enterta...
[Class : 9] Computer Software; Computer Software And Computer Programs For Database Management, Data Storage And Backup, Virtualization, Networking, Collaboration, Remote Access, Remote Support, Cloud Computing, Data Sharing, Data Security, Access, Administration And Management Of Computer Applications And Computer Hardware, Computer Application Distribution, And For Transmi...
[Class : 9] Downloadable Software Using Artificial Intelligence (Ai) Processing, Machine Learning, And Deep Learning For Providing A Virtual Assistant Using Generative Artificial Intelligence (Ai) For Locating, Analyzing, Summarizing, Editing, And Providing Data And Information; Recorded Computer Software Using Artificial Intelligence (Ai) Processing, Machine Learning, And D...
[Class : 9] Downloadable Computer Software For Artificial Intelligence Processing; Downloadable Computer Software For Collecting, Analyzing And Organizing Data In The Field Of Deep Learning; Downloadable Intelligent Computer Software For Natural Language Processing; Downloadable Computer Programs Using Artificial Intelligence (Ai) For Machine Learning; Downloadable Computer ...
[Class : 9] Downloadable Computer Software For Artificial Intelligence Processing; Downloadable Computer Software For Collecting, Analyzing And Organizing Data In The Field Of Deep Learning; Downloadable Intelligent Computer Software For Natural Language Processing; Downloadable Computer Programs Using Artificial Intelligence (Ai) For Machine Learning; Downloadable Computer ...
[Class : 9] Downloadable Computer Software For Use In Artificial Intelligence Applications, Namely, Generalist Multi Agent Systems; Downloadable Computer Software For Use In Artificial Intelligence Applications, Namely Developing, Configuring, Deploying And Managing Multi Agent Workflows Across Various Domains; Downloadable Computer Software For Orchestrating And Managing Au...