Microsoft Technology Licensing, LLC Patent applications |
Patent application number | Title | Published |
20160142348 | UNIVERSAL MOBILE DEVICE MESSAGING - A unified messaging system allows the receipt and sending of different messages across devices is established by creating relationships that leverage the capabilities of different devices. A message server establishes a relationship with a mobile device. Through the relationship, the message server can use the mobile device to send different types of messages that the server computer cannot transmit. A relationship between a client and a server extends this capability to the client. Through these relationships, a client can retrieve mobile device messages as well as generate them. The generated mobile device messages are transmitted to the message server. The message server determines that the received messages are mobile device messages that the server cannot deliver and sends the mobile device messages to the user's mobile device. The mobile device receives the mobile device messages from the message server and transmits the mobile device message to recipient mobile devices. | 05-19-2016 |
20160142347 | INITIATING MULTIPLE CONNECTIONS FROM MULTIPLE COMMUNICATION DEVICES - Methods for establishing simultaneous connections on a plurality of communication devices associated with a user implemented on an instant messaging program by issuing ring tones, audible notifications, or visual indications to the plurality of communication devices and constructing a state diagram for sending the ring tones, the audible notifications, or the visual indications to the plurality of communication devices. | 05-19-2016 |
20160140511 | FOR-YOUR-INFORMATION EVENTS - A for-your-information event can be received in a computer system. The for-your-information event can include an event time field that indicates a scheduled time for the for-your-information event. The computer system may not automatically block the scheduled time of the for-your-information event on a calendar in response to receiving the for-your-information event. User input indicating that the for-your-information event is to be converted to a regular event can be received. In response to the user input, the computer system can convert the for-your-information event to a regular event. Converting the for-your information event can include automatically including the scheduled time of the for-your-information event as a scheduled time for the converted regular event. Also in response to the user input, the computer system can automatically block the scheduled time of the for-your-information event on the calendar. | 05-19-2016 |
20160140406 | FALSE FACE REPRESENTATION IDENTIFICATION - Systems and methods for identifying a false representation of a human face are provided. In one example, a method for identifying a false representation of a human face includes receiving a plurality of different data streams captured by a respective plurality of sensors of differing sensor types sensing a candidate face. In a cascading plurality of stages, one or more of the different data streams are analyzed, wherein each of the stages comprises a different analysis. In one of the cascading plurality of stages, the method determines that one or more of the different data streams corresponds to a false representation of the human face. Based on determining that one or more of the different data streams corresponds to a false representation of a human face, an indication of the false representation is outputted. | 05-19-2016 |
20160140227 | CUSTOMIZED MEDIA - The discussion relates to visitor-driven, venue-specific media. One implementation can obtain a venue media profile of a venue and obtain visitor profiles of visitors at the venue. This implementation can generate a playlist of visitor-driven, venue specific media based on both the venue media profile and the visitor profiles. | 05-19-2016 |
20160135005 | SCALABILITY AND RELIABILITY OF HARDWARE GEO-FENCING WITH FAILOVER SUPPORT - A computing device includes at least one processor and a memory, the memory storing computer-executable instructions for causing the device to be configured to load a subset of geo-fences from secondary storage to primary storage for tracking by the computing device, the subset of geo-fences selected from a set of available geo-fences stored in the secondary storage, based on a selection criteria. The computing device further creates a boundary geo-fence with a radius corresponding to a distance between a current location of the computing device and an edge of a geo-fence in the subset of geo-fences that is furthest from the current location of the computing device. Upon detecting a geo-fence event associated with a new location of the computing device in relation to the boundary geo-fence, a new subset of geo-fences is re-loaded, and a new boundary geo-fence is created based on the new location of the computing device. | 05-12-2016 |
20160134890 | SPATIOTEMPORAL PREDICTION FOR BIDIRECTIONALLY PREDICTIVE (B) PICTURES AND MOTION VECTOR PREDICTION FOR MULTI-PICTURE REFERENCE MOTION COMPENSATION - Several improvements for use with Bidirectionally Predictive (B) pictures within a video sequence are provided. In certain improvements Direct Mode encoding and/or Motion Vector Prediction are enhanced using spatial prediction techniques. In other improvements Motion Vector prediction includes temporal distance and subblock information, for example, for more accurate prediction. Such improvements and other presented herein significantly improve the performance of any applicable video coding system/logic. | 05-12-2016 |
20160134706 | CONTROLLING DEVICES USING CLOUD SERVICES AND DEVICE-AGNOSTIC PIPE MECHANISMS - An environment is described in which a cloud-implemented service system controls a plurality of target devices via a plurality of respective device-agnostic pipe mechanisms. The target devices themselves may represent “dumb” devices, e.g., lacking local control logic, or providing reduced reliance on local control logic. Users may interact with the service system via applications running on any type of user devices. | 05-12-2016 |
20160134704 | MANAGED P2P NETWORK WITH CONTENT-DELIVERY NETWORK - A content-acquisition request is sent to a centralized management service computer via a computer network. The content-acquisition request may query the centralized management service computer for a recommended content source to provide a first digital content item. If a response to the content-acquisition request is received via the computer network and identifies a recommended peer computer of a peer-to-peer network as the recommended content source, a request to download the first digital content item is sent to the recommended peer computer via the computer network. If a response to the content-acquisition request is not received, a fallback request to download the first digital content item is automatically sent to a content-delivery network computer via the computer network. | 05-12-2016 |
20160134617 | SENDING SESSION TOKENS THROUGH PASSIVE CLIENTS - A session token can be requested to be sent to a first computing service from a second computing service, and a first computing service can receive the requested session token from the second computing service. The first computing service can send a message that includes the session token through a passive client to the second computing service. The second computing service can receive the message that includes the session token from the passive client, and the second computing service can verify that the message is valid. This verification of the validity of the message can include verifying that the session token received back from the passive client matches the session token the second computing service sent to the first computing service. | 05-12-2016 |
20160132992 | USER INTERFACE SCALING FOR DEVICES BASED ON DISPLAY SIZE - Non-limiting examples of the present disclosure describe adaptively scaling a user interface based on detection of a display size associated with a connected processing device. A display size associated with a connected processing device is detected. A display class is determined based on the detected display size. A user interface for an application is launched based on the determined display class. Other examples are also described. | 05-12-2016 |
20160132989 | Real Time Visual Feedback During Move, Resize and/or Rotate Actions in an Electronic Document - Real time feedback during move, resize or rotate actions in an electronic document is provided. During live drag actions, the layout shown during the action may be the layout produced when the object is dropped. Detection of slow performance of an application and aborting a redraw action as needed may be provided. A visual indication may be provided for helping users to see that an action is in progress, and thereby removing a perception that the application is failing to respond properly. Determining if a figure will not land in a current cursor/touch point position in a move action and a visual indication to help the user see where and why the figure may jump to a new location may also be provided. In addition, determining an attachment point for an object on a page comprising a table may also be provided. | 05-12-2016 |
20160132301 | PROGRAMMATIC USER INTERFACE GENERATION BASED ON DISPLAY SIZE - Non-limiting examples of the present disclosure describe programmatic generation of a user interface for display on a processing device. A display class is determined from a plurality of display classes based on a detected display size of a processing device on which the user interface is to display. Prior to instantiating a user interface window, a stored user interface definition is identified and interpreted. The stored user interface definition comprises at least one programmed command object. A displayed user interface is instantiated on the processing device, where the displayed user interface comprises at least one user interface element. The user interface element is programmatically generated by translating the programmed command object of the user interface definition into the user interface element based on operations set in accordance with the determined display class. Other examples are also described. | 05-12-2016 |
20160132287 | Dynamic Reconfiguration of Audio Devices - In one example, a shared buffer acting as an audio communication channel for an audio interaction device may be reconfigured to allow audio communication channel sharing between audio data streams. An audio interaction device may execute a conversion between an initial audio data stream and an audio signal audibly detectable by a user. A shared buffer may act as an audio communication channel between an operating system and the audio interaction device. The digital audio system may execute an initial audio application with the operating system to process the initial audio data stream. The digital audio system may load the initial audio data stream into the shared buffer. The digital audio system may alter the audio communication channel into a restructured audio communication channel for a subsequent audio data stream while maintaining the initial audio data stream. The digital audio system may load the initial audio data stream into the restructured audio communication channel. | 05-12-2016 |
20160132234 | USER INTERFACE FOR APPLICATION COMMAND CONTROL - Non-limiting examples of the present disclosure describe an application command control user interface menu to facilitate user interaction between a user and a mobile application. An application command control menu is displayed on a display screen of a processing device. An input may be received into an application canvas of a launched application. The application canvas may be positioned above the application command control menu on the display screen. In response to a received input into the application canvas, a soft input keyboard application may be displayed. The soft input keyboard application may display below the application command control menu on the display screen. A selection may be received in the application command control menu. In response to the received selection, display of the application command control menu may be expanded to replace display on the soft input keyboard application on the display screen. Other examples are also described. | 05-12-2016 |
20160132203 | APPLICATION COMMAND CONTROL FOR SMALL SCREEN DISPLAY - Examples of the present disclosure describe application command control for small screen display. When detecting a display width associated with a processing device is equal to or less than a threshold value, the processing device launches an application command control programmed for display on small screens. The application command control interfaces with an application and comprises a plurality of top-level palettes and a plurality of drill-in palettes programmed for the application. A top-level palette for the application is vertically scrollable and comprises a collection of rows comprising one or more selectable command elements. A row of the one or more command elements of the top-level palette comprises a drill-in feature that when selected presents a drill-in palette. A drill-in palette is vertically scrollable and comprises one or more rows of selectable command elements. | 05-12-2016 |
20160132195 | APPLICATION COMMAND CONTROL FOR SMALLER SCREEN DISPLAY - Non-limiting examples of the present disclosure describe an application command control user interface menu to facilitate user interaction between a user and a mobile application. On a processing device, a mobile application is launched where the mobile application comprises an application command control user interface menu displayable within a defined display space of the mobile application. The application control user interface menu is displayed within the defined display space. A tab comprises one or more user interface elements for application command control. Input is received for selection of a tab of the application control user interface menu. In response to the received input, display of the application command control user interface menu is modified to display one or more tabs within the defined display space. Other examples are also described. | 05-12-2016 |
20160132076 | COVERED MULTI-PIVOT HINGE - The description relates to devices, such as computing devices that have hinged portions. One example can include a first portion and a second portion. This example can also include a multi-pivot hinge unit rotatably securing the first and second portions. This example can further include a covered sequentially rotating multi-pivot hinge assembly rotatably securing the first portion and the second portion in a manner that extends a footprint of the computing device as the first portion is rotated away from the second portion. | 05-12-2016 |
20160132075 | COVERED RADIUS HINGE - The description relates to devices, such as computing devices that have hinged portions. One example can include a first portion and a second portion. This example can also include a multi-pivot hinge unit rotatably securing the first and second portions. This example can further include a set of rigid hinge cover portions that are configured to be able to rotate relative to one another while collectively covering the multi-pivot hinge unit. | 05-12-2016 |
20160131495 | START-OF-ROUTE MAP NAVIGATION WITH SUPPRESSION OF OFF-ROUTE FEEDBACK - A map navigation tool provides a start-of-route buffer area in which off-route feedback (e.g., audio or visual warnings or alerts) can be suppressed in some circumstances. For example, a mobile computing device implements a map navigation tool that can output off-route feedback when the user strays from a route, but also can suppress off-route feedback when the user is within a start-of-route buffer area. Off-route feedback can continue to be suppressed until some other event, such as the user leaving the start-of-route buffer area, occurs. Off-route feedback can be suppressed even if the user is not within a start-of-route buffer area, such as when the map navigation tool generates a route when the user is at an initial location that is far away from any part of the route and then joins the route later (e.g., at the start location or downstream from the start location). | 05-12-2016 |
20160125432 | IDENTIFYING INFLUENTIAL USERS OF A SOCIAL NETWORKING SERVICE - A system includes a memory storing a dataset representing a community of users of a social networking service, the social networking service providing a platform enabling a user within the community to communicate with at least one of a plurality of other users within the community. The system includes a processor coupled to the memory, the processor configured to determine a ranking of the service users in the dataset based on an initial influence score for at least one of the users. The processor is also configured to determine a contribution to a first user within the community by at least one second user of the plurality of other users within the community, and calculate an influence score for the first user. The ranking is revised based at least in part on the calculated influence score, and information is rendered to a target user based on the revised ranking. | 05-05-2016 |
20160124988 | RECURRING CALENDAR ITEM MASTER AND INSTANCE SYNCHRONIZATION - A synchronization window for synchronizing data for a calendar in a client calendar data store on a calendar data client computer system with data for the calendar in a server calendar data store on a calendar data server computer system can be calculated using a current time. A request for synchronization data for calendar items for the calendar with calendar times that are within the synchronization window can be sent to the calendar data server. One or more responses to the request can be received from the calendar data server. The response(s) can include received records for calendar items that are at least partially within the synchronization window. The received records can include a master record of a recurring calendar item and an instance record of an occurrence of the recurring calendar item. The received records for the calendar items can be incorporated in the client calendar data store. | 05-05-2016 |
20160124726 | UNIFIED DATA TYPE SYSTEM AND METHOD - A type system includes a dual representation for basic data types. One representation is the basic data type representation common to such basic built-in data types, known as an unboxed value type or simply as a value type. Each of the basic data types also has a boxed representation that can be stored in the object hierarchy of the type system. This dual representation can also be extended to user-defined types, so that user-defined types may exist both as an unboxed value type and as an object within the object hierarchy of the type system. This dual representation allows the compiler and/or runtime environment to select the most effective and efficient representation for the data type depending on the particular need at the moment. | 05-05-2016 |
20160120006 | Organic el display panel for reducing resistance of electrode lines - Method for fabricating an organic EL display panel having an EL region at every cross of first and second electrodes, including the steps of forming a plurality of first electrodes at regular intervals on a transparent substrate, forming an insulating later in regions other than the EL regions, forming second supplementary electrodes on the insulating layer, forming an electric insulating barrier between adjacent EL regions perpendicular to the first electrodes, forming an organic EL layer in each of the EL regions with a shadow mask, depositing an electrode material on an entire surface inclusive of the organic EL layer, to form a plurality of second electrodes, and forming a protection film on an entire surface inclusive of the second electrodes. | 04-28-2016 |
20160119309 | METHOD AND APPARATUS FOR PROTECTING REGIONS OF AN ELECTRONIC DOCUMENT - A method and apparatus for protecting regions of an electronic document are provided. According to the method, the entire electronic document is protected. The selection of a region within the electronic document is received along with identity of one or more users authorized to freely edit the selected region. The identified users are authorized to freely edit only the selected region of the electronic document. A request is then received to edit a region of the electronic document from a current user. In response to the request, a determination is made as to whether the current user is authorized to edit the region. If the user is not authorized to edit the region, the request is denied. | 04-28-2016 |
20160118046 | Location-Based Conversational Understanding - Location-based conversational understanding may be provided. Upon receiving a query from a user, an environmental context associated with the query may be generated. The query may be interpreted according to the environmental context. The interpreted query may be executed and at least one result associated with the query may be provided to the user. | 04-28-2016 |
20160117796 | Content Adaptive Decoder Quality Management - In one example, a quality management controller of a video processing system may optimize a video recovery action through the selective dropping of video frames. The video processing system may store a compressed video data set in memory. The video processing system may receive a recovery quality indication describing a recovery priority of a user. The video processing system may apply a quality management controller in a video pipeline to execute a video recovery action to retrieve an output data set from the compressed video data set using a video decoder. The quality management controller may select a recovery initiation frame from the compressed video data set to be an initial frame to decompress based upon the recovery quality indication. | 04-28-2016 |
20160117333 | Time-Aware Ranking Adapted to a Search Engine Application - Techniques provide time-aware ranking, such as ranking of information, files or URL (uniform resource locator) links. For example, time-aware modeling assists in determining user intent of a query to a search engine. In response to the query, results are ranked in a time-aware manner to better match the user intent. The ranking may model query, URL and query-URL pair behavior over time to create time-aware query, URL and query-URL pair models, respectively. Such models may predict behavior of a query-URL pair, such as frequency and timing of clicks to the URL of the pair when the query of the pair is posed to the search engine. Results of a query may be ranked by predicted query-URL behavior. Once ranked, the results may be sent to the user in response to the query. | 04-28-2016 |
20160117321 | COMMUNITY AUTHORING CONTENT GENERATION AND NAVIGATION - One or more techniques and/or systems are provided for creating socially authored, or community authored, summaries of documents and/or for navigating a forum comprising such summaries. In one embodiment, at least some of the summaries are generated automatically when a document is written and/or discovered (e.g., by a web crawler), for example. In another embodiment, the documents are created by users of the forum. A plurality of summaries of a document may be created (e.g., by different users), and users can provide feedback, such as comments or ratings, that may assist other users in identifying which summary or summaries better describe the document. Moreover, the users can navigate the forum and retrieve summaries by browsing categories (and subcategories) to identify a topic of interest and/or by performing a search based upon user inputted search term(s). | 04-28-2016 |
20160116988 | HAND-WORN DEVICE FOR SURFACE GESTURE INPUT - Embodiments that relate to energy efficient gesture input on a surface are disclosed. One disclosed embodiment provides a hand-worn device that may include a microphone configured to capture an audio input and generate an audio signal, an accelerometer configured to capture a motion input and generate an accelerometer signal, and a controller comprising a processor and memory. The controller may be configured to detect a wake-up motion input based on the accelerometer signal. The controller may wake from a low-power sleep mode in which the accelerometer is turned on and the microphone is turned off and enter a user interaction interpretation mode in which the microphone is turned on. Then, the controller may contemporaneously receive the audio signal and the accelerometer signal and decode strokes. Finally, the controller may detect a period of inactivity based on the audio signal and return to the low-power sleep mode. | 04-28-2016 |
20160112476 | INTEGRATED REAL TIME COLLABORATION EXPERIENCES WITH ONLINE WORKSPACE - Online meeting experience is integrated with online and/or offline collaborative workspace(s). Documents and other content generated through team collaboration and managed by a content management system are automatically made available during the meeting, updated, and stored in collaborative workspace linked to a particular meeting. Newly generated content during the meeting is also added to the workspace. As a result, online meetings become part of the collaborative workspace rendering reusable and searchable data through meeting content and updates to associated documents. | 04-21-2016 |
20160112468 | Real-Time Media Optimization Over Remoted Sessions - Real-time media optimization may be provided. First, a remote session may be established with a remote computing device. Then, during the remote session, non-real-time media data may be exchanged with the remote computing device over a server path. Moreover, real-time media data may be exchanged with the remote computing device over a media path during the remote session. | 04-21-2016 |
20160112466 | DISTRIBUTED CONNECTIVITY POLICY ENFORCEMENT WITH ICE - Instead of utilizing a centralized server or hardware (routers/gateways) to enforce connectivity policy restrictions, the policy connectivity restrictions for media session traffic are enforced by an endpoint that is involved in the media communication. Based on the policy requirements, the client enforces the policy restrictions by restricting the candidates that may be selected for the establishment of the media path. For example, the enforcement may result in the client selecting a path from available candidates that avoids congested Wide Area Network (WAN) links, avoiding a low bandwidth link, or possibly even failing the communication completely. The clients may also provide periodic updates to the policy server to allow tracking of the utilization of managed WAN links. | 04-21-2016 |
20160112375 | METHOD AND SYSTEM FOR PROTECTING CLOUD-BASED APPLICATIONS EXECUTED IN A CLOUD COMPUTING PLATFORM - A method and system for protecting cloud-based applications executed in a cloud computing platform are presented. The method includes intercepting traffic flows from a plurality of client devices to the cloud computing platform, wherein each of the plurality of client devices is associated with a user attempting to access a cloud-based application; extracting at least one parameter from the intercepted traffic related to at least each client device and a respective user attempting to access the cloud-based application; determining based on, the at least one parameter and at least a set of parameters combining cloud-based application risk factors for a provider of the cloud computing platform, a risk indicator for the user attempting to access the cloud-based application; and performing an action to mitigate a potential risk to the cloud computing platform based on the determined risk indicator. | 04-21-2016 |
20160112296 | DIRECT NETWORK HAVING PLURAL DISTRIBUTED CONNECTIONS TO EACH RESOURCE - A direct network is described in which each resource is connected to a switching fabric via a set of two or more routing nodes. The routing nodes are distributed so as to satisfy at least one inter-node separation criterion. In one case, the separation criterion specifies that, for each resource, a number of routing nodes that share a same coordinate value with another routing node in the set (in a same coordinate dimension) is to be minimized. In some network topologies, such as a torus network, this means a number of unique loops of the direct network to which each resource is connected is to be maximized. The routing provisions described herein offer various performance benefits, such as improved latency-related performance. | 04-21-2016 |
20160110438 | DATA CUBE HIGH AVAILABILITY - The subject disclosure is directed towards making cube data highly available and efficient to access by separating the read cube server from the processing cube server, on different physical machines. The read cube server may be mirrored, and the write cube server may be mirrored. When the primary read cube server is not operational (e.g., has failed) or is having its read cube synchronized, the read queries are handled by the mirror read cube server. When a processing cube server (or its write cube) is not operational, its mirror processing cube server takes over and performs cube processing operations via its mirror write cube. | 04-21-2016 |
20160110406 | VALIDATION OF DATA ACROSS MULTIPLE DATA STORES - Examples of the present disclosure describe validation of data on a client having a plurality of data stores. A data consistency component of the client queries a plurality of data stores of the client to identify a portion of data from each of the data stores. The data consistency component compares portions of data obtained from the plurality of data stores using stored knowledge data, maintained by the data consistency component. Based on the comparison of the portions of data, the data consistency component identifies if inconsistency exists across the plurality of data stores. Inconsistency identified for any of the plurality of data stores is reported. | 04-21-2016 |
20160110337 | Filtering User Interface for a Data Summary Table - A graphical user interface for creating a data summary table includes a data summary table including a plurality of fields, and a filtering pane programmed to apply filters to items in the fields of the data summary table, the filtering pane including a field selector control, wherein the field selector control is programmed to allow for selection of a field of the fields in the data summary table to define filtering for the field. | 04-21-2016 |
20160110190 | Web Client Command Infrastructure Integration into a Rich Client Application - A command interface for a software application is implemented on a client computer. A first definition of the command interface is received from a server computer. The first definition includes rules for encoding the command interface on a web browser. A conversion of the first definition to a second definition is performed. The second definition includes language for encoding the command interface on a user interface of the software application. The second definition is used to render the command interface on the user interface of the software application. | 04-21-2016 |
20160110024 | UNINTENTIONAL TOUCH REJECTION - A method for rejecting an unintentional palm touch is disclosed. In at least some embodiments, a touch is detected by a touch-sensitive surface associated with a display. Characteristics of the touch may be used to generate a set of parameters related to the touch. In an embodiment, firmware is used to determine a reliability value for the touch. The reliability value and the location of the touch is provided to a software module. The software module uses the reliability value and an activity context to determine a confidence level of the touch. In an embodiment, the confidence level may include an evaluation of changes in the reliability value over time. If the confidence level for the touch is too low, it may be rejected. | 04-21-2016 |
20160105497 | CONTEXTUALLY INTERACTING WITH APPLICATIONS - The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI. | 04-14-2016 |
20160104318 | ANNOTATED GEOMETRY - Systems and methods for associating geometry with contextual information are provided. Contextual information includes metadata about the geometry used to represent data in a visualization to improve the functioning of a device providing the visualization. Improved functioning of the device providing the visualization includes providing new features, and more efficient use of device resources for executing legacy features. Annotations may be made via escapes present in the definition of the geometry to be rendered, which are operable to bind portions of the geometry to the represented data. According to aspects, binding data to geometry improves how the visualization is rendered and improves how portions of the geometry are called out for formatting or interactivity. According to aspects, escapes may be ignored, such that their presence does not affect how the geometry is rendered. | 04-14-2016 |
20160104311 | ANIMATION FRAMEWORK - An animation framework for animating arbitrary changes in a visualization via morphing of geometries is provided. Geometry from a visualization is captured from before and after a change to the visualization, which is used to generate a series of frames to provide a smooth morphing animation of the change to the visualization. Transitional geometry representing a merged state between the initial geometry and the final geometry of the visualization is generated to build frames between the initial frame and the final frame. The morphing animation may be governed by a timing curve and may be built according to a display rate to ensure a smooth animation. | 04-14-2016 |
20160104308 | PERFORMANCE OPTIMIZATION FOR DATA VISUALIZATION - Performance optimization for reduced and bounded memory cost for data visualization is provided. Performance optimization comprises: data culling, geometry culling, and cloning of a visualization to a background thread for layout. The performance optimization leverages a data visualization architecture for building of a data visualization via a one-directional chain of separate stages, wherein data at each stage may be culled or privatized to reduce the amount of data, or simplify the nature of the data, to be processed in subsequent stages, thus improving overall system performance and user experience. | 04-14-2016 |
20160104307 | DATA VISUALIZATION EXTENSIBILITY ARCHITECTURE - An extensibility framework for enabling the creation of new visualizations and the extension of existing visualizations is provided to improve the functionality of a computer. According to aspects, the architecture enables building data visualizations via a one-directional chain of separate stages that have simple input and output interfaces. The described extensibility architecture enables quick and simple extensibility of visualization types via series layouts that are independent of the rest of the architecture. The extensibility architecture allows for the compositing of features in such a way that allows clients to add additional functionality and the build-out of visualization types via a multiplicative behavior of chaining capabilities together. Accordingly, series layouts can be plugged into the data visualization platform in a generic way. The architecture is operable to work in multiple environments, and is not biased toward a single client. | 04-14-2016 |
20160104306 | DATA VISUALIZATION ARCHITECTURE - A data visualization platform architecture that enables building of a data visualization via a one-directional chain of separate stages is provided, wherein each stage has a simple input interface and output interface. The staging of the architecture enables the data visualization to be provisioned while using fewer system resources and for additional behaviors to be applied to the visualization. Such behaviors include: transforming data from an arbitrary format, modular updates to data visualizations, client-independent operation, reduced-cost updating and extension of the platform, reduced-cost animations, etc. Aspects of the data visualization platform streamline and optimize the performance of a computing device that provides a data visualization. | 04-14-2016 |
20160103832 | AD-HOC QUERIES INTEGRATING USAGE ANALYTICS WITH SEARCH RESULTS - Search results returned by ad hoc queries integrate search results with usage analytics calculated from collected usage information for a system, such as a content management system. In response to receiving a query, the query is submitted to the system to obtain search results. Information from the usage analytics is integrated with the obtained search results. A search index of the system may include all/portion of the usage analytics such that the obtained results from the system may already be integrated with the usage analytics. The system is configurable such that users of the system may configure the usage events that are used to collect the usage information. The users may also configure parameters relating to the usage events and when/how the collected information is stored. The usage analytics may also be used to filter, collapse and boost different items in the search results. | 04-14-2016 |
20160103828 | MODULAR UPDATING OF VISUALIZATIONS - The modular updating of visualizations is provided. Elements of a visualization (e.g., graphical representations of data series, axes, titles, etc.) are only updated within the visualization when the hierarchical data defining that element is changed, thus reducing the processing load on the system providing the visualization. According to an aspect, the changes in the data are accurately translated from an arbitrary hierarchy format into a normalized hierarchy format so that a data visualization platform modularly update the hierarchical data that defines the visualization. According to an aspect, modular updating of hierarchy data enables updating a visualization in pieces (i.e., modularly), such that portions of the visualization that are not affected by the change to the data are not updated and do not need to be recalculated for rendering. | 04-14-2016 |
20160103812 | TYPING ASSISTANCE FOR EDITING - Apparatus and methods are disclosed for providing feedback and guidance to touch screen device users to improve the text entry user experience and performance. According to one embodiment, a method comprises receiving a text entry, receiving input on a touch screen in the form of a first single touch input located over a word of previously entered text, and presenting the user with one or more suggestion candidates indicated possible replacement words related to the selected word. The user can then select one of the suggestion candidates using a second single touch input to replace the selected word with a word associated with the selected suggestion candidate. | 04-14-2016 |
20160103796 | Rich Formatting for a Data Label Associated with a Data Point - Rich formatting may be provided for rich data labels. A rich data label may be created for at least one data point associated with a visualization. The data label may be formatted and displayed on the visualization. The rich data label may bind to a particular data point rather than adhering to conventional index-based anchor logic where a data label is bound to the index of a data point. Accordingly, in response to determining that the location of the data point has changed in the visualization, the location of the rich data label is automatically adjusted to remain attached to its original data point. | 04-14-2016 |
20160103600 | AUTO-GROUPING OF APPLICATION WINDOWS - Described herein are techniques for automatically forming groups of application windows. The techniques may be performed with a computing device executing a windowing system, the windowing system having a user interface element that can be interacted with by a user to manage applications executing on the computing device. Each application may correspond to a separate process and application window. It may be determined that an operation has occurred that will evict the application windows of target applications from the display, and in response an application group may be automatically formed. The application group may have indicia of the evicted target applications. The application group may be provided to the user interface element, and when the user interface element is interacted with by the user the user interface element displays user-selectable graphic application indicators for both the application group and applications other than the target applications. | 04-14-2016 |
20160100359 | POWER SAVING WI-FI TETHERING - The techniques discussed herein reduce the power consumption of a Wi-Fi tethering device by switching the Wi-Fi functionality of the Wi-Fi tethering device from a normal operational mode to a sleep mode during idle intervals. The techniques implement a sleep protocol where a Wi-Fi tethering device and the Wi-Fi client device coordinate and establish a sleep schedule. Moreover, the techniques describe a sleep interval adaptation algorithm to establish sleep duration intervals based on data packet exchange patterns associated with different applications executing on the Wi-Fi client device and/or different operations being performed by the Wi-Fi client device. | 04-07-2016 |
20160100196 | SYNTAX STRUCTURES INDICATING COMPLETION OF CODED REGIONS - Syntax structures that indicate the completion of coded regions of pictures are described. For example, a syntax structure in an elementary bitstream indicates the completion of a coded region of a picture. The syntax structure can be a type of network abstraction layer unit, a type of supplemental enhancement information message or another syntax structure. For example, a media processing tool such as an encoder can detect completion of a coded region of a picture, then output, in a predefined order in an elementary bitstream, syntax structure(s) that contain the coded region as well as a different syntax structure that indicates the completion of the coded region. Another media processing tool such as a decoder can receive, in a predefined order in an elementary bitstream, syntax structure(s) that contain a coded region of a picture as well as a different syntax structure that indicates the completion of the coded region. | 04-07-2016 |
20160099995 | AGGREGATING CONTENT FROM DIFFERENT CONTENT SOURCES AT A CLOUD SERVICE - A cloud service stores and aggregates content that is obtained from different content sources using different protocols. For example, the content may include electronic messages, calendar information, contacts, social network content, feed data, search results, and the like. The cloud service aggregates content for each user based on the user's configuration settings. The cloud service may perform processing on the aggregated content before it is delivered and displayed to the user on the client device. For example, one or more views may be generated and stored by the cloud service before the view is requested from the client. Changes made to the aggregated content on the client may be synchronized with the content source. Searches may be made across all or a portion of the different content sources that are aggregated for a user. | 04-07-2016 |
20160099812 | NATURAL VISUALIZATION AND ROUTING OF DIGITAL SIGNATURES - Embodiments are provided for securely visualizing and routing digital signatures in an electronic document generated by an application program executing on a computer system. The application program may generate an electronic document for receiving a signature graphic, and calculate a hash value from the electronic document and the signature graphic, and create a cryptographic signature from the hash value using a cryptographic encryption method. The electronic document is digitally signed by embedding the cryptographic signature therein. The application program may further collect and route digital signatures by automatically collecting signatures from individual signers, one-by-one, and identify the appropriate signature line for each signer to sign. The application program may further generate a user interface for creating and collecting digital signatures. | 04-07-2016 |
20160098593 | SHAPE RECOGNITION USING PARTIAL SHAPES - Shape recognition is performed based on determining whether one or more ink strokes is not part of a shape or a partial shape. Ink strokes are divided into segments and the segments analyzed employing a relative angular distance histogram. The histogram analysis yields stable, incremental, and discriminating featurization results. Neural networks may also be employed along with the histogram analysis to determine complete shapes from partial shape entries and autocomplete suggestions provided to users for conversion of the shape into a known object. | 04-07-2016 |
20160098170 | DISCOVERABILITY AND NAVIGATION OF HYPERLINKS - A user may discover and navigate among hyperlinks through the use of a keyboard. For example, a user may press a tab key to discover and navigate to a first hyperlink that is part of a hypertext document. The first hyperlink is, in response, given focus and a focus shape is drawn around the text or graphics for the hot region of the hyperlink. If the user again presses the tab key, the next hyperlink is given focus and a focus shape (i.e., an outline that surrounds the next hyperlink) is drawn around the next hyperlink. A user may also tab to a placeholder for an image in order to make a decision whether the image should be downloaded or not. | 04-07-2016 |
20160094531 | CHALLENGE-BASED AUTHENTICATION FOR RESOURCE ACCESS - Examples of the present disclosure describe systems and methods for authentication by an authentication component when a client attempts to access a secured resource(s). As an example, an access request is received from a client at an authentication component. The authentication component generates an authentication challenge including criteria to assist the client in selecting an appropriate authentication credential, a request for proof of possession of the authentication credential, and challenge-specific data for the client to return in a challenge response. A challenge response is received from the client. The authentication component evaluates the challenge response and determines whether to authenticate the client for access to a resource based on the evaluated challenge response. Other examples are also described. | 03-31-2016 |
20160092333 | Telemetry for Data - Embodiments are directed to a unified and extensible telemetry method together with a data telemetry model aimed at the data activities of a system. Information collected using the telemetry data model is analyzed using telemetry analytics to derive insights on data activities, through the analysis of single events and subsequent linear relationships between these events, as well as the more generally networked multi-dimensional relationships among the data activities. Such analysis can provide insights for system owners to understand past data activities, optimize current data activities, and predict future data activity demands and requirements. | 03-31-2016 |
20160092174 | EXECUTION GUARDS IN DYNAMIC PROGRAMMING - A method for executing a machine code based on a dynamic language is disclosed. An execution guard is created as a value stored in a data structure. The value is representative of an expected condition or a set of conditions for a reusable portion of the machine code. The value representative of the expected condition(s) is compared to an actual value encountered later during execution of a portion of the machine code. The reusable machine code is executed if the actual value corresponds with the value representative of the expected condition(s). The execution guard is invalidated if any of the expected conditions changes. | 03-31-2016 |
20160088060 | GESTURE NAVIGATION FOR SECONDARY USER INTERFACE - One or more techniques and/or systems are provided for gesture navigation for a secondary user interface. For example, a primary device (e.g., a smart phone) may establish a communication connection with a secondary device having a secondary display (e.g., a television). The primary device may project a rendering of a secondary user interface, of a secondary application executing on the primary device (e.g., a photo app), to the secondary display of the secondary device. The secondary user interface may comprise a user interface element (e.g., a photo carousel). The primary device may receive a continuous motion gesture input (e.g., a looping gesture on a touch display of the smart phone). The primary device may visually traverse, through the secondary user interface, one or more content items of the user interface element based upon the continuous motion gesture input (e.g., scroll through photos of the photo carousel). | 03-24-2016 |
20160088004 | TIERED OBJECT-RELATED TRUST DECISIONS - Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object. | 03-24-2016 |
20160086581 | CONTENT PROJECTION - One or more techniques and/or systems are provided for content projection. For example, a communication connection may be established between a primary device (e.g., a smart phone) of a user and a secondary device (e.g., a television). The primary device may identify an interest of the user to view content on the secondary device (e.g., photos for a recently attended concert). The primary device may retrieve the content (e.g., local photos on the smart phone and/or photos remotely retrieved from a social network). The primary device may project a rendering of the content onto a secondary display of the secondary device (e.g., the smart phone may send the rendering over the communication connection to the television for display). | 03-24-2016 |
20160085786 | TRANSFORMING DATA INTO CONSUMABLE CONTENT - Concepts and technologies are described herein for transforming data into consumable content. In accordance with the concepts and technologies disclosed herein, a computing device can execute a transformation engine for transforming data into the consumable content. The computing device can be configured to analyze the data to identify relationships within data elements or other portions of the data. The computing device also can determine a visualization model to apply to the data and to choose a world based upon the determined visualization model. The computing device can obtain rules associated with the selected or chosen world, and can apply the rules to the data to generate the output. In some embodiments, the computing device can be configured to obtain and apply feedback to the output. | 03-24-2016 |
20160085784 | DATABASE DATA TYPE CREATION AND REUSE - Embodiments are provided for creating and reusing custom data types in a database. A selection of a field or group of fields may be received from a database table in the database by a database software application executing on a computer system. Each selected field may include a set of field properties. The application may further receive a user input to initiate saving the selected field or group of fields as a custom data type. In response to receiving the input, the application may be configured to generate a dialog for receiving custom data type information for the selected field or group of fields and save the selected field or group of fields as a custom data type. The custom data type may then be reused by the application in the database. | 03-24-2016 |
20160085654 | LENDING TARGET DEVICE RESOURCES TO HOST DEVICE COMPUTING ENVIRONMENT - Various models may enable a first device to share a device resource with a second device in various contexts, such as sharing computing sessions via terminal services; sharing displays via display mirroring; and sharing input components across devices. However, such techniques often utilize ad hoc sharing models that depend on configuration and/or administrative access of each device; limit the capabilities of such sharing; and/or exhibit security concerns. Instead, a target device may advertise an availability of a target device resource. A host device may request the target device to lend the target device resource to the computing environment of the host device. The target device may reserve the target device resource for the host device, which may then integrate the target device resource into the host computing environment. The model may enable the user to utilize resources even from target devices that the user is not otherwise permitted to use. | 03-24-2016 |
20160085395 | DYNAMIC EXTENSION VIEW WITH MULTIPLE LEVELS OF EXPANSION - Application extension management may be provided. A plurality of related documents may be scanned to determine whether an activation trigger associated with an application extension has been triggered. In response to determining that the activation trigger associated with the application extension has been triggered, the application extension may be triggered and a user interface element associated with the application extension may be displayed according to a display rule. | 03-24-2016 |
20160085388 | Desktop Environment Differentiation in Virtual Desktops - Desktop environment differentiation in virtual desktop techniques are described. In one or more implementations, a user is logged into a corresponding single user account of an operating system of a computing device. Functionality accessible via the single user account is exposed to implement a plurality of virtual desktops associated with the single user account. Each of the plurality of virtual desktops including a user interface that is configured to have an associated collection of windows corresponding to applications and desktop environments that are differentiated, one from another. | 03-24-2016 |
20160081014 | WHITE SPACE UTILIZATION - The concepts relate to radio white space utilization. One example can obtain information about a location of a device. The example can access a white space database to obtain radio white space frequencies relative to the location. This example can also perform active scanning of at least some of the radio white space frequencies at the location and not perform active scanning on allocated frequencies. | 03-17-2016 |
20160080756 | MEMORY MANAGEMENT FOR VIDEO DECODING - Techniques and tools described herein help manage memory efficiently during video decoding, especially when multiple video clips are concurrently decoded. For example, with clip-adaptive memory usage, a decoder determines first memory usage settings expected to be sufficient for decoding of a video clip. The decoder also determines second memory usage settings known to be sufficient for decoding of the clip. During decoding, memory usage is initially set according to the first settings. Memory usage is adaptively increased during decoding, subject to theoretical limits in the second settings. With adaptive early release of side information, the decoder can release side information memory for a picture earlier than the decoder releases image plane memory for the picture. The decoder can also adapt memory usage for decoded transform coefficients depending on whether the coefficients are for intra-coded blocks or inter-coded blocks, and also exploit the relative sparseness of non-zero coefficient values. | 03-17-2016 |
20160080736 | OPTIMIZATION OF A MULTI-VIEW DISPLAY - Described herein is a multi-view display (based on spatial and/or temporal multiplexing) having an optimization mechanism that dynamically adjust views based upon detected state changes with respect to one or more views. The optimization mechanism determines viewing parameters (e.g., brightness and/or colors) for a view based upon a current position of the view, and/or on the multi-view display's capabilities. The state change may correspond to the view (a viewer's eye) moving towards another viewing zone, in which event new viewing parameters are determined, which may be in anticipation of entering the zone. Another state change corresponds to more views being needed than the display is capable of outputting, whereby one or more existing views are degraded, e.g., from 3D to 2D and/or from a personal video to a non-personal view. Conversely, a state change corresponding to excess capacity becoming available can result in enhancing a view to 3D and/or personal. | 03-17-2016 |
20160080487 | PEER-TO-PEER PERFORMANCE - Embodiments disclosed herein can be used to improve the distribution of digital content in a peer-to-peer network. In certain embodiments, computing devices are mapped into different groups based on location information, and inter-group information is collected and used to identify other computing devices to which it would be efficient and effective for a computing device to send download requests for digital content. In certain embodiments, computing devices are grouped into clusters of computing devices, and different computing devices within the same cluster are instructed or recommended to send download requests for different digital content units to computing devices outside of the cluster so that the plurality of computing devices within the same cluster will collectively obtain all of the different digital content units. The computing devices within the same cluster can then share the digital content units with one another. | 03-17-2016 |
20160080406 | DETECTING ANOMALOUS ACTIVITY FROM ACCOUNTS OF AN ONLINE SERVICE - Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity. | 03-17-2016 |
20160080233 | Methods and Computer Program Products for Transaction Analysis of Network Traffic in a Network Device - Provided are methods and computer program products for analyzing and tracing the contents of network traffic in a network device and to help identify network performance issues. Methods for analyzing traffic include identifying thread identifiers associated with transactions, determining related events, and associating similar transactions and events into an aggregated list of transactions. Methods of tracing transactions include identifying thread identifiers associated with transactions and related events and serializing events into a serialized list of events to facilitate tracing single transactions. | 03-17-2016 |
20160078412 | CALENDAR REPAIR ASSISTANT - Calendar repair may be provided. Calendar events, such as appointments and meetings, may be created and copied to a plurality of attendee calendars. A first copy of the event may be compared to a second copy of the event, and an event property of the second event may be updated to match a corresponding event property of the first event. | 03-17-2016 |
20160078405 | CLOUD-BASED BROKER SERVICE FOR DIGITAL ASSISTANTS - A cloud-based broker service may be provided for computing devices in a distributed computing environment. The broker service may aggregate user accounts and user account credentials utilized for accessing online services by the computing devices. The broker service may monitor a context of the computing devices associated with the user accounts. The broker service may then utilize the context, data associated with the user accounts and data associated with the user account credentials to automate tasks and/or provide alerts associated with the data. | 03-17-2016 |
20160078308 | PLACE-BASED IMAGE ORGANIZATION - Systems and methods for image organization are provided. An computing device in accordance with embodiments of the present disclosure includes a processor configured to receive an image set comprising a plurality of images, compare a portion of each image in the image set with a verified cue library including a plurality of visual cues that correspond to different geographic place tags, and display a recommendation panel including a recommended place tag corresponding to a visual cue that matches the portion. | 03-17-2016 |
20160078210 | USER-AUTHENTICATION GESTURES - This document relates to user-authentication gestures. One example can capture multiple biometric features when a user-authentication gesture is performed as a device authentication attempt. The example can compare values of the multiple biometric features to previous values stored for the user. The example can further unlock the computing device in an instance where the values of the multiple biometric features satisfy a similarity threshold relative to the previous values. | 03-17-2016 |
20160078075 | SCALABLE SELECTION MANAGEMENT - Architecture for handling large data selections with small and substantially constant memory footprints. The architecture facilitates the creation of sets of data objects (e.g., rows) of a data source based on selection of the data objects. The set structures can be defined according to a range (span) of data objects selected and a pattern of the objects selected. These set structures are then saved in memory, rather than the data objects, to provide optimized memory usage. In a database implementation, the solution stores the set representation (the structure) in nearly a constant amount of memory, regardless of the number of rows in the grid, and regardless of the number of rows selected. Memory usage can be proportional to the number of discontinuous spans of rows selected by the user. Structures in memory can be consolidated, replaced, or eliminated dynamically as the user changes row selections and pattern criteria. | 03-17-2016 |
20160077949 | ONLINE APPLICATION TESTING ACROSS BROWSER ENVIRONMENTS - A stub can be loaded into a first browser environment of a browser application on a client machine, with the stub being loaded from a domain. The stub can execute to load an online application test into the first browser environment. Additionally, the test can execute in the first browser environment to conduct the test on an online application. For example, the test may be conducted from a second browser environment of the browser on the client machine. Performing the test can include loading one or more digital pages from the application into the second browser environment. | 03-17-2016 |
20160077828 | LOGICAL GROUPING OF PROFILE DATA - Profile data can be ascribed to groups as a function of an organizational scheme that defines groups and relationships between groups. The groups can be abstractions over profile data that are meaningful for computer program analysis. Subsequently, grouped data can be disseminated, queried, and visualized in numerous ways to further aid program analysis. | 03-17-2016 |
20160077785 | EXECUTABLE VIRTUAL OBJECTS ASSOCIATED WITH REAL OBJECTS - Embodiments for interacting with an executable virtual object associated with a real object are disclosed. In one example, a method for interacting with an executable virtual object associated with a real object includes receiving sensor input from one or more sensors attached to the portable see-through display device, and obtaining information regarding a location of the user based on the sensor input. The method also includes, if the location includes a real object comprising an associated executable virtual object, then determining an intent of the user to interact with the executable virtual object, and if the intent to interact is determined, then interacting with the executable object. | 03-17-2016 |
20160077760 | DYNAMIC MEMORY ALLOCATION AND RELOCATION TO CREATE LOW POWER REGIONS - Memory objects may be allocated and re-allocated within a computer system to consolidate infrequently used memory objects to memory regions that may be operated at lower power. During initial allocation of memory objects, the objects may be placed into high power regions. During subsequent periodic analysis, memory objects in high power regions that are infrequently used may be relocated to lower power regions while memory objects in low power regions that are frequently used may be moved to the high power regions. Various heuristics or logic may be used to handle unmovable objects, shared objects, and other types of objects. | 03-17-2016 |
20160077685 | Operating System Virtual Desktop Techniques - Operating system virtual desktop techniques are described. In one or more implementations, a plurality of virtual desktops are implemented by a single operating system of a computing device. Each of the virtual desktops includes a user interface that is configured to have an associated collection of windows that correspond to applications. Access to the plurality of virtual desktops is managed by the operating system that is navigable by a user to interact with associated collection of representations of application and windows corresponding to the applications by switching between the plurality of virtual desktops. | 03-17-2016 |
20160071306 | REDUNDANT PIXEL MITIGATION - Among other things, one or more techniques and/or systems are provided for mitigating redundant pixel texture contribution for texturing a geometry. That is, the geometry may represent a multidimensional surface of a scene, such as a city. The geometry may be textured using one or more texture images (e.g., an image comprising color values and/or depth values) depicting the scene from various view directions (e.g., a top-down view, an oblique view, etc.). Because more than one texture image may contribute to texturing a pixel of the geometry (e.g., due to overlapping views of the scene), redundant pixel texture contribution may arise. Accordingly, a redundant textured pixel within a texture image may be knocked out (e.g., in-painted) from the texture image to generate a modified texture image that may be relatively efficient to store and/or stream to a client due to enhanced compression of the modified texture image. | 03-10-2016 |
20160071297 | DATA POINT CALCULATIONS ON A CHART - Data point calculations on a chart are provided. A user control may be displayed adjacent to a chart by a computing device. A selection of data points on the chart may then be received the user control. A calculation may then be performed by the computing device on the data points selected by the user control. The results of the calculation may then be displayed by the computing device on the chart. | 03-10-2016 |
20160070808 | Identifying a Discussion Topic Based on User Interest Information - Functionality is described for identifying a discussion topic based on user interest information. The user interest information may originate from one or more sources, such as the user's search-related behavior. The functionality then provides an opportunity for the user to engage in a communication exchange associated with the identified discussion topic. | 03-10-2016 |
20160070764 | DISTANT CONTENT DISCOVERY - Generating and providing a content feed to a user that surfaces information items that are determined to be interesting or relevant to the user including content that is determined to be “distant” to the user is provided. Explicit user actions are used to discover peers who are not colleagues of the user (e.g., peers with whom the user does not share a close organizational relationship, peers with whom the user does not regularly communicate, etc.), but who the user indicates an interest in via his/her actions. These peers are categorized as elevated peers of the user, and information items associated with and trending around the elevated peers are surfaced to the user in a content feed. | 03-10-2016 |
20160070685 | Lossless Web-Based Editor For Complex Documents - Lossless web-based editing for XML documents is provided. A method for editing a document over the Internet includes receiving a request on a server over the Internet to edit a document. The server extracts content from the document to form a modified version of the document in XML format and transmits the modified version of the document to the client over the Internet. The client edits the modified version of the document using a web browser editor and transmits changes to the modified version of the document to the server. The server merges the original document and the changes made by the client to form an edited version of the document that updates the document with the client changes and that leaves the remainder of the document intact. | 03-10-2016 |
20160070580 | DIGITAL PERSONAL ASSISTANT REMOTE INVOCATION - One or more techniques and/or systems are provided for providing personal assistant information. For example, a primary device (e.g., a smart phone) may establish a communication channel with a secondary device (e.g., a television that lacks digital personal assistant functionality). The primary device may receive a context associated with a user (e.g., a user statement “show weather on my television”). The primary device, which may be enabled with the digital personal assistant functionality or access to such functionality, may invoke the digital personal assistant functionality to evaluate the context to generate a personal assistant result (e.g., local weather information). The personal assistant result may be provided from the primary device to the secondary device for presentation to the user. In this way, the secondary device appears to provide digital personal assistant functionality even though the secondary device does not comprise or have access to such functionality. | 03-10-2016 |
20160070534 | TECHNIQUES TO REMOTELY MANAGE A MULTIMEDIA CONFERENCE EVENT - Techniques to remotely manage a multimedia conference event are described. An apparatus may comprise a mobile remote control having a communications component operative to establish a wireless connection between a mobile remote control and a multimedia conference server hosting a multimedia conference event. The mobile remote control may include a mobile remote control component communicatively coupled to the communications component, the mobile remote control component operative to manage the multimedia conference event from the mobile remote control by communicating control information and media information with the multimedia conference server for the multimedia conference event over the wireless connection. Other embodiments are described and claimed. | 03-10-2016 |
20160070463 | FLEXIBLE TOUCH-BASED SCROLLING - A computer-implemented method includes receiving user input comprising a gesture on a touchscreen, the gesture having a gesture velocity. The gesture velocity is compared with an inertia movement threshold. Based on the comparing, the gesture is determined to be an inertia gesture. When the gesture velocity is greater than or equal to the inertia movement threshold, simulated inertia is applied to visual information displayed on the touchscreen. | 03-10-2016 |
20160069696 | MULTIMODE TRANSPORTATION TRANSITIONS - A rich set of inter-transportation-mode transitions can be supported. For example, when generating a route from a starting location to a destination, transitions to or from walking can be included that are immediately discernable by the traveler without reference to compass directions. Further functionality, such as support for multiple doors of a transit vehicle can be supported. An overall improved user experience and fewer errors for travelers who combine different transportation modes into their trips can result. | 03-10-2016 |
20160065440 | Methods and Computer Program Products for Collecting Storage Resource Performance Data Using File System Hooks - Provided are methods and computer program products for collecting storage resource performance data using file system hooks. Methods may include determining a location for a function dispatch table, and modifying the function dispatch table to redirect a request for an operation. In response to a received request for the operation, an intent to perform the operation is recorded to estimate an operational queue length, and data associated with the operation is recorded in a hash table. In response to recording data associated with the operation, a function corresponding to the operation to perform the operation is invoked. Elapsed time and storage size is recorded. | 03-03-2016 |
20160062817 | Predicting, Diagnosing, And Recovering From Application Failures Based On Resource Access Patterns - Technologies are described herein for differentiating normal operation of an application program from error conditions to predict, diagnose, and recover from application failures. Access to resources by the application program is monitored, and resource access events are logged. Resource access patterns are established from the logged resource access events utilizing computer pattern recognition techniques. If subsequent access to resources by the application program deviates from the established patterns, then a user and/or administrator of the application program is notified of a potential error condition based on the detected deviation. In addition, sequences of resource access events that deviate from the established resources access patterns are correlated with an error condition based on a temporal proximity to the time of occurrence of the error to provide diagnostic information regarding the error. | 03-03-2016 |
20160062492 | OBJECT ORIENTATION DETECTION WITH A DIGITIZER - A digitizer system includes a stylus comprising a plurality of transmitters for transmitting signals, wherein each of the plurality of transmitters are distanced from one another by a defined distance, a digitizer sensor operable for sensing signals transmitted by the plurality of transmitters, and circuitry associated with the digitizer sensor for tracking a projected location on the digitizer sensor of each of the plurality of transmitters based on the signals sensed, and for tracking a geometric relationship between the projected locations. | 03-03-2016 |
20160062467 | TOUCH SCREEN CONTROL - This document relates to touch screen controls. For instance, the touch screen controls can allow a user to control a computing device by engaging a touch screen associated with the computing device. One implementation can receive at least one tactile contact from a region of a touch screen. This implementation can present a first command functionality on the touch screen proximate the region for a predefined time. It can await user engagement of the first command functionality. Lacking user engagement within the predefined time, the implementation can remove the first command functionality and offer a second command functionality. | 03-03-2016 |
20160057188 | GENERATING AND UPDATING EVENT-BASED PLAYBACK EXPERIENCES - Exemplary methods, apparatus, and systems are disclosed for capturing, organizing, sharing, and/or displaying media. For example, using embodiments of the disclosed technology, a unified playback and browsing experience for a collection of media can be created automatically. For instance, heuristics and metadata can be used to assemble and add narratives to the media data. Furthermore, this representation of media can recompose itself dynamically as more media is added to the collection. While a collection may use a single user's content, sometimes media that is desirable to include in the collection is captured by friends and/or others at the same event. In certain embodiments, media content related to the event can be automatically collected and shared among selected groups. Further, in some embodiments, new media can be automatically incorporated into a media collection associated with the event, and the playback experience dynamically updated. | 02-25-2016 |
20160057155 | USER INTERFACE FOR SELECTION OF MULTIPLE ACCOUNTS AND CONNECTION POINTS - Embodiments of the present disclosure provide a user interface that enables a user to more easily identify servers that may be used to set access permissions for content items. The method and system described herein includes receiving user credentials that are associated with a user. In response to receiving the user credentials, one or more servers associated with the user credentials are displayed. The one or more servers are configured to manage information rights for a content item created by the user. Upon receiving a selection of one of the one or more servers, a list of one or more templates supported by the selected server is displayed to the user. The one or more templates identify information rights that may be applied to the content item. | 02-25-2016 |
20160057033 | CLIENT APPLICATION INTEGRATION FOR WORKFLOWS - A method for providing client application integration for workflow management includes receiving a verification file, accessing a file through a client application, determining, based on the verification file, whether the accessed file includes a reference to a workflow component of a workflow stored on a server, retrieving the workflow component from the server, and displaying the workflow component referenced by the accessed file via an in-line user interface of the client application, further including displaying at least one selectable workflow management option for managing the workflow component using the client application. | 02-25-2016 |
20160055328 | USABLE SECURITY OF ONLINE PASSWORD MANAGMENT WITH SENSOR-BASED AUTHENTICATION - A multi-party security protocol that incorporates biometric-based authentication and withstands attacks against any single party (e.g., mobile phone, cloud, or the user). The protocol involves the function split between mobile and cloud and the mechanisms to chain-hold the secrets. A key generation mechanisms binds secrets to a specific device or URL (uniform resource locator) by adding salt to a master credential. An inline CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) handling mechanism uses the same sensor modality as the authentication process, which not only improves the usability, but also facilitates the authentication process. This architecture further enhances existing overall system security (e.g., handling untrusted or compromised cloud service, phone being lost, impersonation, etc.) and also improves the usability by automatically handling the CAPTCHA. | 02-25-2016 |
20160055227 | DATABASE SCALE-OUT - A method for scaling out database information may include creating second database instantiation. The method may include configuring one or more partitions of a first database for transfer to the second database and configuring the second database for receiving the one or more first database partitions. The method may also include transferring the one or more first database partitions to the second database. | 02-25-2016 |
20160055128 | INTERACTING WITH DATA FROM A DOCUMENT VIA DOCUMENT AN APPLICATION PAGES - A document application is used to interact with a document as if the document was an application. Data from the document is automatically/manually selected to be associated with the document application. The document application displays document application pages (DAPs) that are used to interact with the document. One or more DAPs are automatically created using the selected data along with any rules associated with the data. For example, column names from selected data in the document may be used to create data entry/display fields within one or more DAPs and the rules may be used to specify how to interact with the data in the document application. The automatically created default DAPs may be customized by a user. For example, one DAP may be configured to be the starting page for the document application and another DAP may be configured to display a chart. | 02-25-2016 |
20160054898 | Application of Multiple Content Items and Functionality to an Electronic Content Item - Application of content and associated functionality from multiple content sources to an electronic content item is provided. Content from a first document may be displayed over a second document via a user interface component. If desired, such content may be inserted into the second document, and application functionality associated with the inserted content may be retained after it is inserted into the second document. One or more navigation means may be provided for conveniently navigating inside a content item (e.g., a document) for adding new content or for reviewing or editing existing content. In addition, a number of content views and content mappings may be provided. | 02-25-2016 |
20160054811 | OBJECT ORIENTATION DETECTION WITH A DIGITIZER - A digitizer system includes a stylus comprising a plurality of transmitters for transmitting signals, wherein each of the plurality of transmitters are distanced from one another by a defined distance, a digitizer sensor operable for sensing signals transmitted by the plurality of transmitters, and circuitry associated with the digitizer sensor for tracking a projected location on the digitizer sensor of each of the plurality of transmitters based on the signals sensed, and for tracking a geometric relationship between the projected locations. | 02-25-2016 |
20160050355 | STORYBOARDS FOR CAPTURING IMAGES - Disclosed herein are representative embodiments of tools and techniques for using storyboards in controlling a camera for capturing images, photographs, or video. According to one exemplary technique, at least two storyboards are stored. In addition, at least one storyboard identifier from a camera application is received. Also, using the storyboard identifier, a storyboard of the stored at least two storyboards is retrieved. The retrieved storyboard includes a sequence of control frames for controlling a camera. Additionally, a sequence of image frames is captured at least by controlling a camera using the retrieved storyboard. | 02-18-2016 |
20160050218 | Anonymous Server Based User Settings Protection - Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device. | 02-18-2016 |
20160048319 | Gesture-based Access to a Mix View - Techniques for gesture-based access to a mixed view associated with an application representation are described. In one or more implementations, a user interface is exposed by an operating system of a computing device. The user interface includes a concurrent display of a plurality of representations of applications that are selectable by a user to launch respective applications. Gesture-based techniques can be used to interact with an application representation to cause one or more visible targets to appear adjacent the representation. The individual targets are individually associated with some type of application functionality, e.g., a quick action or a deep link into content associated with the application. An individual target can then be selected, e.g., touch-selected, by a user to initiate the associated functionality. | 02-18-2016 |
20160048294 | Direct Access Application Representations - Direct access application representation techniques are described. In one or more implementations, a user interface is exposed by an operating system of a computing device. The user interface includes a concurrent display of a plurality of representations of applications that are selectable by a user to launch respective applications, at least one of the plurality of representations includes a concurrent display of a plurality of user-selectable targets for a respective application, and each of the plurality of user-selectable targets is selectable by a user to obtain direct access to a respective one of a plurality of application functionality of the respective application. Responsive to an input indicative of user selection of one of the plurality of user-selectable targets of the at least one representation of the respective application, the direct access is provided to the respective one of the plurality of application functionality of the respective application. | 02-18-2016 |
20160044096 | Scaling Up and Scaling Out of a Server Architecture for Large Scale Real-Time Applications - Scaling up and scaling out of a server architecture for large scale real-time applications is provided. A group of users may be provisioned by assigning them to a server pool and allotting them to a group. Grouped users help to reduce inter-server communication when they are serviced by the same server in the pool. High availability may be provided by choosing a primary server and one or more secondary servers from the pool to ensure that grouped users are serviced by the same server. Operations taken on the primary server are synchronously replicated to secondary servers so that when a primary server fails, a secondary server may be chosen as the primary for the group. Servers for multiple user groups may be load balanced to account for changes in either the number of users or the number of servers in a pool. Multiple pools may be paired for disaster recovery. | 02-11-2016 |
20160044003 | SECURE COMPUTATION USING A SERVER MODULE - A server module evaluates a circuit based on concealed inputs provided by respective participant modules, to provide a concealed output. By virtue of this approach, no party to the transaction (including the sever module) discovers any other party's non-concealed inputs. In a first implementation, the server module evaluates a garbled Boolean circuit. This implementation also uses a three-way oblivious transfer technique to provide a concealed input from one of the participant modules to the serer module. In a second implementation, the server module evaluates an arithmetic circuit based on ciphertexts that have been produced using a fully homomorphic encryption technique. This implementation modifies multiplication operations that are performed in the evaluation of the arithmetic circuit by a modifier factor; this removes bounds placed on the number of the multiplication operations that can be performed. | 02-11-2016 |
20160043976 | SHARED ATTACHMENTS - When an outgoing communication sent to one or more recipients contains a supported attachment type, a shared workspace that contains a shared version of the original attachment is provisioned. A modified version of the original outgoing communication is delivered to internal recipients including both a link to the shared document and the original attachment. | 02-11-2016 |
20160042019 | Columnar Storage of a Database Index - Methods, systems, and computer-readable media of columnar storage of a database index are disclosed. A particular columnar index includes a column store that stores rows of the columnar index in a column-wise fashion and a delta store that stores rows of the columnar index in a row-wise fashion. The column store also includes an absence flag array. The absence flag array includes entries that indicate whether certain rows have been logically deleted from the column store. | 02-11-2016 |
20160041968 | STYLE EXTENSIBILITY APPLIED TO A GROUP OF SHAPES BY EDITING TEXT FILES - Style extensibility is provided to shapes in a diagram by editing text files. A structured data model is used to render the diagram representing items provided by the user in a text-based format such as a bulleted list. A style engine determines style properties for style labels assigned to key shapes of the diagram. Style properties include features associated with the shapes and their content that preserve an overall look-and-feel of the diagram. Color scheme(s) are also provided through the style labels. A layout engine uses layout definitions based on user input and default parameters along with style label assignments to render a presentation model. Style properties may be modified and new styles added after the diagram is rendered. | 02-11-2016 |
20160041964 | System and Method for Providing Calculation Web Services for Online Documents - Embodiments of the present disclosure provide a method and system for providing additional functionality, including web functionality, to one or more online documents. Specifically, embodiments described herein include receiving a selection of a range of data to be used in a web extension and binding the selection of the range of data to the web extension. Once the data is bound, the binding is stored in a remote computing device. In response to the detection of the interaction with the bound range of data, the bound range of data is sent to the remote computing device where the bound range of data is updated based on the interaction. The updated data is then sent to the web extension to enable the web extension to be updated with the newly received data. | 02-11-2016 |
20160041953 | INHERITANCE OF RULES ACROSS HIERARCHICAL LEVELS - Rules, such as condition-action rules, are configured at different levels of a hierarchy. For example, a top level site administrator may configure rules, lower level administrators may configure rules and end users may configure rules. Rules created at a higher hierarchical level are automatically inherited by lower hierarchical levels in the same branch of the hierarchy. The source of the inherited rule is indicated with its display such that the hierarchical level of creation can readily be determined. The inherited rule(s) may be toggled on/off at the lower hierarchical levels but edits to inherited rule(s) are restricted. Instead, a copy of any inherited rule may be made to create a local copy of the rule that is editable. Rules may be ordered and when a lower hierarchical level inherits the rules, the ordering is preserved. While the ordering of any rules remains constant when inherited at the lower levels, the lower level may toggle on/off the execution of each rule within the ordering. | 02-11-2016 |
20160041830 | EXTRACTION OF OPERATING SYSTEM-SPECIFIC CHARACTERISTICS VIA A COMMUNICATION INTERFACE - Systems and methods for specifying extended descriptor information in a device accessed using a communication interface are disclosed. One method includes transmitting a request to a device from a host computing system, and receiving an extended capability descriptor identifying to the host computing system at least one extended descriptor set stored on the device. The extended capability descriptor identifies a minimum operating system version able to support a corresponding extended descriptor set. | 02-11-2016 |
20160041708 | TECHNIQUES FOR ORGANIZING INFORMATION ON A COMPUTING DEVICE USING MOVABLE OBJECTS - Techniques to organize information on a computing device using movable objects are described. A computer system may include a display operative to present a graphical user interface with a pointer to select one or more movable objects and position the movable objects at various target positions on the graphical user interface, an input device operative to receive selected movable objects and user movement to position the selected movable objects at a target position on the graphical user interface, and an object position component operative to anchor the selected movable objects at the target position using an anchor element to form a group of anchored objects, and arrange the group of anchored objects in a visual pattern relative to the anchor element. Other embodiments are described and claimed. | 02-11-2016 |
20160041685 | NOISE REDUCTION IN DIGITIZER SYSTEM - A method for noise reduction in a digitizer includes determining a location of a stylus with a known frequency of emission over a first sampling period, sampling output from a plurality of detecting elements over a second sampling period, identifying detecting elements with sampled output in the second sampling period above a defined threshold in a selected frequency, the selected frequency being close to but different than the known frequency of the stylus, selecting as a candidate carrier of mere noise a detecting element from the detecting elements identified that is spaced away from the determined location of the stylus, and reducing values of output sampled over the second sampling period from at least one other detecting element, in accordance with the output sampled over the second sampling period from the detecting element selected as the candidate carrier of mere noise. | 02-11-2016 |
20160040974 | APPARATUS FOR OBJECT INFORMATION DETECTION AND METHODS OF USING SAME - A system for determining information regarding at least one object, comprising: a sensor sensitive to capacitive coupling; at least one object adapted to create a capacitive coupling with the sensor when at least one signal is input to the sensor; a detector adapted to measure at least one output signal of said sensor associated with the at least one object, wherein the output signal associated with the at least one object is an object information code. | 02-11-2016 |
20160037481 | Rich Notifications - Various embodiments provide notifications with respect to various communications that are visually embellished to indicate a perceived importance of the communication based upon one or more criteria. In addition, in at least some embodiments, multiple different types of notifications can be combined and presented as a single icon with an associated count to indicate the number of different notifications that have been received. Further, other embodiments enable a user to quickly and efficiently deep link directly into an application associated with a particular notification. | 02-04-2016 |
20160036924 | Providing Higher Workload Resiliency in Clustered Systems Based on Health Heuristics - Embodiments provide workload processing for clustered systems. In an illustrative, non-limiting embodiment, a computer-implemented method may include identifying a server as an active node of a cluster; assigning a workload to the server in response to the identification; determining, after the assignment, that the server is no longer an active node of the cluster; calculating, in response to the determination, a probability that the server is capable of continuing to execute the workload; and deciding, based upon the probability, whether to allow the workload to remain assigned to the server. | 02-04-2016 |
20160036663 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR GENERATING A MODEL OF NETWORK APPLICATION HEALTH - Provided are methods and computer program products for generating a model of network application health. Methods may include receiving activity data that corresponds to activities of multiple applications that are operable to execute on at least one networked device, and combining the received activity data to remove redundant portions thereof and/or to reconcile inconsistencies therein. Based on the received activity data, ones of the multiple applications are identified, and relationships between the identified applications are determined. A model is generated including the identified applications and the relationships therebetween, and a representation of the model is displayed. Related computer program products are also provided. | 02-04-2016 |
20160034701 | MONETIZING PRODUCT FEATURES AS PART OF ENFORCING LICENSE TERMS - Control access features include the use of a number of validation rules and capabilities of a target as part of proving license control and revenue generating functionalities, but the embodiments are not so limited. An exemplary role-based computing architecture includes the use of feature to command mappings and one or more validation rules to determine if a target of a command has a proper set of capabilities as part of allowing the command to execute. A computing method of one embodiment operates to provide a validation mechanism that performs a validation evaluation as part of a scope check to ensure that a target command is within the command issuer's scope along with a validation rule check for a particular service feature. | 02-04-2016 |
20160034695 | Displaying Different Levels of Personal Information on a Screen - Various embodiments provide notifications with respect to various communications that are received by a computing device. Privacy concerns associated with the notifications can be addressed by ascertaining the user of a particular device and, based on the user, surfacing notifications that have been filtered accordingly. In this manner, various different levels of personal information can be presented, through notifications, based on the current device user. | 02-04-2016 |
20160034438 | ALIGNING CONTENT IN AN ELECTRONIC DOCUMENT - Aligning the contents of document objects on an electronic document page. Organizing a page of document objects so textual content is aligned to natural eye scanning patterns promotes readership and usability. When a user creates a new island of text, the new text can be snapped into alignment with an existing island of text. Invisible guidelines that emanate from textual features in a document object can page. In response to placing a content insertion point (“IP”) on an electronic page with an existing document object, the IP can be automatically aligned to the content of the existing document object. A page with several arbitrarily positioned document objects can be automatically rearranged so that the contents of the document objects are each aligned to one another. | 02-04-2016 |
20160034424 | Adaptive Notifications on a Screen - Various embodiments provide notifications with respect to various communications that are received by a computing device. The notifications can be prioritized based on a user's context and, in addition, visually prioritized to present important notifications in a more visually prominent location than other perhaps lesser important notifications. Further, notification update frequency can be modified based on a user's or device's context. | 02-04-2016 |
20160034337 | Failure Mode Identification and Reporting - When a software component is starting, such as but not limited to a task or a subtask, the component pushes its identification (ID) onto a stack. The component executes its other instructions. If the component completes its instructions so that it can terminate normally, it pops the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, it will not be able to pop the stack so its ID will remain in the stack. Another software process can read the IDs in the stack to identify which components have failed and can automatically take a specified action, such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component. | 02-04-2016 |
20160034302 | VIRTUAL MACHINE MIGRATION TOOL - Tools and techniques for migrating applications to compute clouds are described herein. A tool may be used to migrate any arbitrary application to a specific implementation of a compute cloud. The tool may use a library of migration rules, apply the rules to a selected application, and in the process generate migration output. The migration output may be advisory information, revised code, patches, or the like. There may be different sets of rules for different cloud compute platforms, allowing the application to be migrated to different clouds. The rules may describe a wide range of application features and corresponding corrective actions for migrating the application. Rules may specify semantic behavior of the application, code or calls, storage, database instances, interactions with databases, operating systems hosting the application, and others. | 02-04-2016 |
20160034261 | Augmenting Programming Languages with a Type System - Described is a technology by which metadata augments a programming language such as JavaScript. Software components such as application programming interfaces are associated with metadata. When a software component is selected for use, such as when putting together a computer program in a graphical programming environment, its corresponding metadata is accessed. The metadata may be used to validate the usage of the software component, such as to validate a constraint associated with a value, provide a default value, validate a value's type, and/or determine whether a value is required. Validation may also determine whether data output by one software component is of a type that is appropriate for input by another software component. In addition to validation via type metadata, the metadata may provide descriptive information about the selected software component, such as to assist the programmer and/or provide further information to the programming environment. | 02-04-2016 |
20160034154 | Application Launcher Sizing - Application launcher sizing techniques are described. In one or more implementations, a likely usage context is determined, by a computing device, of a user in interacting with the computing device. An application launcher is dynamically sized within a display area of the user interface by the computing device based on the determined likely usage context of the user. The application launcher is configured for output responsive to an input received from a user and includes a plurality of representations of applications that are selectable to navigate to a user interface corresponding with a respective said application. | 02-04-2016 |
20160034136 | MULTI-TOUCH OBJECT INERTIA SIMULATION - The inertia system provides a common platform and application-programming interface (API) for applications to extend the input received from various multi-touch hardware devices to simulate real-world behavior of application objects. To move naturally, application objects should exhibit physical characteristics such as elasticity and deceleration. When a user lifts all contacts from an object, the inertia system provides additional manipulation events to the application so that the application can handle the events as if the user was still moving the object with touch. The inertia system generates the events based on a simulation of the behavior of the objects. If the user moves an object into another object, the inertia system simulates the boundary characteristics of the objects. Thus, the inertia system provides more realistic movement for application objects manipulated using multi-touch hardware and the API provides a consistent feel to manipulations across applications. | 02-04-2016 |
20160028847 | ESTABLISHING CACHES THAT PROVIDE DYNAMIC, AUTHORITATIVE DNS RESPONSES - Embodiments are directed to establishing caches that provide authoritative domain name system (DNS) answers to DNS requests. In one scenario, a computer system establishes a cache that stores authoritative DNS answers to DNS queries. The cache corresponds to a specified DNS zone that includes authoritative DNS answers for a subset of DNS queries. The cache is configured to store the authoritative DNS answers for at least a specified period of time during which the authoritative DNS answers are updatable. The cache then receives an update indicating that at least one cached DNS answer is out-of-date and the computer system purges the out-of-date DNS answer from the cache, ensuring that the cache continually provides authoritative DNS answers for DNS queries assigned to the specified DNS zone. | 01-28-2016 |
20160028784 | TECHNIQUES TO RESTORE COMMUNICATIONS SESSIONS FOR APPLICATIONS HAVING CONVERSATION AND MEETING ENVIRONMENTS - Techniques for restoring communications sessions for applications having conversation environment and a meeting embodiment are described. A system may include a meeting component of a communications application for selecting a meeting from multiple meetings, a conversation component of the communications application for managing multiple conversation threads, and a recovery component of the communications application for recovering an active meeting from the multiple meetings or an active conversation thread from the multiple conversation threads. Other embodiments are described and claimed. | 01-28-2016 |
20160028773 | STATISTICAL SECURITY FOR ANONYMOUS MESH-UP ORIENTED ONLINE SERVICES - Web pages and applications commonly consume functionality provided by services to provide users with a rich experience. For example, a backend mapping service may provide access to these services. However, the users and application consuming the services may be anonymous and unverified. Accordingly, a two ticket validation technique is provided to validate service execution requests from anonymous applications. In particular, a user is provided with a client ticket comprising a reputation. The reputation may be adjusted over time based upon how the user consumes services. An application may request access to a service by providing the client ticket and an application ticket for validation. The reputation of the user may be used to determine an access level at which the application may access the service. Users with a high reputation may receive high quality access to the service, while users with a low reputation may receive lower quality access. | 01-28-2016 |
20160027329 | WEARABLE FOOD NUTRITION FEEDBACK SYSTEM - A see-through, head mounted display and sensing devices cooperating to provide feedback on food items detected in the device field of view. Feedback can include warnings based on personal wearer needs, general nutrition information, food consumption tracking and social interactions. The system includes one or more processing devices in communication with display and the sensors which identify food items proximate to the apparatus, determine feedback information relevant to a wearer of the apparatus; and render feedback information in the display. | 01-28-2016 |
20160026782 | Personal Identification Combining Proximity Sensing with Biometrics - Described is a technology by which the identity of a person (e.g., a customer in a commercial transaction) is determinable without active identification effort, via biometric data is obtained without action by the person. Machine processing of the biometric data over a set of possible persons, determined from secondary proximity sensing, is used to determine or assist in determining the identity of the person. | 01-28-2016 |
20160026695 | SUGGESTING ALTERNATE DATA MAPPINGS FOR CHARTS - Data mapping alternatives for creating a visual representation of a set of data are presented. A set of data is identified for analysis. The identified set of data and properties associated with the identified set of data are analyzed. Based on the analysis, data mapping alternatives for the identified set of data are determined The determined data mapping alternatives for the identified set of data are ranked. The determined data mapping alternatives are presented in an order according to the ranking of the determined data mapping alternatives. | 01-28-2016 |
20160026679 | NAVIGATING PERFORMANCE DATA FROM DIFFERENT SUBSYSTEMS - Performance data can be collected from different runtime environment subsystems of a computer system while the computer system is running a program in the runtime environment. A visualization model can be displayed, and a visual query of the integrated data can be received at the visualization model. Queried data can be compiled and displayed in response to the visual query. The queried data can be drilled into in response to user input. In response to a navigation request, navigation can lead to a programming element related to a portion of the queried data. | 01-28-2016 |
20160026610 | ACCESSING MEDIA CONTEXT INFORMATION USING CONTEXTUAL LINKS - The systems and methods described herein are directed toward launching a third party application in a media center module using a contextual link. The media center module is configured to enable the third party application to register with the module and to associate a contextual link corresponding to the third party application with a context provided by the media center module. In response to a request for information related to the context, the media center module is configured to direct to a location associated with the contextual link. The media center module is further configured to provide to the location data that identifies the context. In response to the provided data, the location is populated with the requested information. Thus, the use of conditional link enables a third party application to register to be a context handler for a media center module. | 01-28-2016 |
20160026519 | Application Compatibility Leveraging Successful Resolution of Issues - Application compatibility techniques are described. In one or more implementations, one or more computing devices of a service provider receive data from a plurality of client devices via a network, the data describing one or more attempts that were at least partially successful in resolving one or more incompatibilities in execution of one or more applications on respective computing devices. The data is mined based on one or more criteria to identify at least one of the applications and validated to confirm the at least partial success in the resolution of at least one of the incompatibilities for the identified application. Data is stored that describes validated successful resolution of the incompatibilities and an update is disseminated based at least on the stored data to resolve the incompatibilities. | 01-28-2016 |
20160026488 | INSTRUCTION SET EMULATION FOR GUEST OPERATING SYSTEMS - The described implementations relate to virtual computing techniques. One implementation provides a technique that can include receiving a request to execute an application. The application can include first application instructions from a guest instruction set architecture. The technique can also include loading an emulator and a guest operating system into an execution context with the application. The emulator can translate the first application instructions into second application instructions from a host instruction set architecture. The technique can also include running the application by executing the second application instructions. | 01-28-2016 |
20160026478 | Converting Desktop Applications to Web Applications - Technologies are described herein for converting a desktop application to a web application. An interface file is generated based on a user interface of the desktop application. A logic file is generated based on application executables of the desktop application. A data model is generated based on application data and states of the desktop application. The web application is generated based on the interface file, the logic file, and the data model. | 01-28-2016 |
20160026475 | Virtualized Boot Block with Discovery Volume - A file system independent virtualized boot block with discovery volume and cover files renders a volume visible when accessed by an accessing system which differs from a source system. For example, a downlevel operating system recognizes that data is present on a volume created in an uplevel operating system, even where the uplevel data itself may not be accessible. | 01-28-2016 |
20160021246 | SECURED COMMUNICATION VIA LOCATION AWARENESS - A method and system for collecting and verifying the location information of a calling party and a device of the calling party is provided. More specifically, a method and system is provided for determining whether the identity of the calling party can be confirmed, via evaluating location information, with an acceptable degree of certainty. The location information may be provided by the calling party or obtained from various sources over a digital communication channel. Some of the provided location information which can be accidentally or intentionally altered is identified and evaluated to determine its accuracy as part of the verification process of the caller's identity. | 01-21-2016 |
20160021095 | Protection from Unfamiliar Login Locations - In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface | 01-21-2016 |
20160020961 | DETERMINING SERVER UTILIZATION - Ways are disclosed for determining a utilization of a server or group of servers. In one embodiment, a method includes determining a disk utilization factor (DUF) that indicates a utilization of one or more mass-storage disks of some server; determining a processor utilization factor (PUF) that indicates a utilization of one or more processors running on the first server; and based on the DUF and PUF deriving a server-utilization factor (SUF) that indicates a level of utilization of the first server, which includes incorporating one or more of (1) power-usage data or (2) financial-cost data that are associated with each of the disks and processors. | 01-21-2016 |
20160019098 | Server farm management - A cloud manager controls the deployment and management of machines for an online service. A build system creates deployment-ready virtual hard disks (VHDs) that are installed on machines that are spread across one or more networks in farms that each may include different configurations. The build system is configured to build VHDs of differing configurations that depend on a role of the virtual machine (VM) for which the VHD will be used. The build system uses the VHDs to create virtual machines (VMs) in both test and production environments for the online service. The cloud manager system automatically provisions machines with the created virtual hard disks (VHDs). Identical VHDs can be installed directly on the machines that have already been tested. | 01-21-2016 |
20160019004 | VIRTUAL DISK STORAGE TECHNIQUES - This document describes techniques for storing virtual disk payload data. In an exemplary configuration, each virtual disk extent can be associated with state information that indicates whether the virtual disk extent is described by a virtual disk file. Under certain conditions the space used to describe a virtual disk extent can be reclaimed and state information can be used to determine how read and/or write operations directed to the virtual disk extent are handled. In addition to the foregoing, other techniques are described in the claims, figures, and detailed description of this document. | 01-21-2016 |
20160006832 | UPLOADING ATTACHMENT TO SHARED LOCATION AND REPLACING WITH A LINK - The size of attachments to an electronic message are examined before the message is sent to determine if the attachments exceed a size threshold. When the size of the attachments exceed the threshold, one or more of the attachments are uploaded to a shared location that is accessible to the recipients of the message. A link replaces each attachment that was uploaded to the shared location. Permissions are automatically set at the shared location such that each of the recipients of the message are able to access the uploaded attachment. | 01-07-2016 |
20160004719 | USING DISTRIBUTED SOURCE CONTROL IN A CENTRALIZED SOURCE CONTROL ENVIRONMENT - A method is presented for using a distributed source control system with a centralized source control system. A first set of files is obtained from a source control repository and stored on a first electronic computing device. The first set of files comprises all or part of a code base in the centralized source control system. A request is received for at least part of the code base from a second electronic computing device in a distributed source control system. As a result of the request, at least a part of the first set of files is sent to the second electronic computing device. A change set for the first set of files is received from the second electronic computing device. The change set is processed to be in a format compatible with the source control repository. The change set is submitted to the source control repository. | 01-07-2016 |
20160004707 | TRANSLATING NATURAL LANGUAGE UTTERANCES TO KEYWORD SEARCH QUERIES - Natural language query translation may be provided. A statistical model may be trained to detect domains according to a plurality of query click log data. Upon receiving a natural language query, the statistical model may be used to translate the natural language query into an action. The action may then be performed and at least one result associated with performing the action may be provided. | 01-07-2016 |
20150382179 | INTELLIGENT COMMUNICATION LINE SELECTION SUPPORTING RICH CONTEXT OF INPUT FACTORS - Various user interfaces and other technologies for interacting with devices that support multiple communication lines can be implemented. For example, intelligent handling of communication line selection can help users deal with multiple communication line scenarios. A user interface for overriding communication line selection can be supported. Users can interact with their devices more efficiently and with less frustration. A wide variety of use default communication line scenarios are supported. Communication lines can be selected based on any of a rich set of input factors. | 12-31-2015 |
20150382167 | EVENT-BASED MEDIA GROUPING, PLAYBACK, AND SHARING - Exemplary methods, apparatus, and systems are disclosed for capturing, organizing, sharing, and/or displaying media. For example, using embodiments of the disclosed technology, a unified playback and browsing experience for a collection of media can be created automatically. For instance, heuristics and metadata can be used to assemble and add narratives to the media data. Furthermore, this representation of media can recompose itself dynamically as more media is added to the collection. While a collection may use a single user's content, sometimes media that is desirable to include in the collection is captured by friends and/or others at the same event. In certain embodiments, media content related to the event can be automatically collected and shared among selected groups. Further, in some embodiments, new media can be automatically incorporated into a media collection associated with the event, and the playback experience dynamically updated. | 12-31-2015 |
20150382141 | LOCATION AWARE MOBILE-DEVICE SOFTWARE DEVELOPMENT - A development environment makes it easier to develop and use location aware software applications. Combining the currently separate and complex tasks of location information gathering, analysis, and display and making them integrated such that non-experts can build location services into their applications increases a developer's capability to write rich location-aware software applications. A higher level programming model allows a programmer to use location information as a logical entity rather than just raw location data, such as latitude and longitude. A location data store and map data store may be accessed by different location aware applications on the device. Instead of each location application relying on its own data store, applications may share their location related information. | 12-31-2015 |
20150381747 | GLOBAL PROVISIONING OF MILLIONS OF USERS WITH DEPLOYMENT UNITS - Described herein is technology for, among other things, global provisioning of a service. The technology involves a provisioning server obtaining location information for a client. The provisioning server determines an appropriate deployment unit, based on the location information, to which the client will be assigned. The provisioning server transmits assignment information for the appropriate deployment unit to the client. The client then communicatively couples to the assigned deployment unit and begins receiving the service from the deployment unit. | 12-31-2015 |
20150381537 | OUTBOUND IP ADDRESS REPUTATION CONTROL AND REPAIR - Embodiments provide IP address partitioning features that can be used to source outbound email communications, but the embodiments are not so limited. In an embodiment, a computer-based method operates to remove blocked or potentially misused IP addresses from a partition and/or move good or reputable IP addresses from other partitions to account for volumetric shortfalls. A method of one embodiment operates to repair removed IP address reputations as part of recycling and reusing IP addresses. A system of an embodiment is configured in part to remove misused IP addresses from one or more partitions, source reputable IP addresses from other partitions, and/or repair and reuse IP addresses as needed. Other embodiments are included. | 12-31-2015 |
20150379145 | RESULT TYPES FOR CONDITIONAL DATA DISPLAY - A set of user interfaces is provided to an administrator of a website. The user interfaces enable the administrator to configure search functionality of the website to present different types of search results differently. For instance, the administrator can use the user interfaces to configure the search functionality to present different properties for search results belonging to different result types. | 12-31-2015 |
20150379108 | Data Mining in a Business Intelligence Document - A business intelligence document provides functionality for testing a hypothesis on aggregated data in a business intelligence document (e.g., a spreadsheet-like document), wherein one or more of the input data values and transformation properties are designated as constrained (e.g., invariant or constrained within a range, set, enumeration, or domain). The hypothesis, which is articulated as a data mining assertion, is input through the user interface of the business intelligence document (e.g., via an expression interface or properties of a row, column, or cell) and solved over the aggregated data. The solution is then presented through the user interface of the spreadsheet-like document, such as in a table, graph, histogram, etc. | 12-31-2015 |
20150379084 | GRID QUERIES - Aspects of the subject matter described herein relate to grid queries. In aspects, a client sends search criteria that represent two or more dimensions to a service. The service obtains results that satisfy the search criteria and performs intersection operations to populate a data grid. The data grid is then returned to the client for output on an output device of the client. The client may provide a user interface that allows quick updating of the search criteria to obtain a new data grid. | 12-31-2015 |
20150378567 | Data Feed Having Customizable Analytic and Visual Behavior - A data marketplace infrastructure allows a data source company or a third party to associate to a data feed with a customizable preview application having analytic and visual features (e.g., business logic and a user interface). A potential customer can use discovery services of the data marketplace infrastructure to identify one or more data feeds offering sample data in a domain of interest of the potential customer. The data feed can transmit the customizable preview application to allow the potential customer to interact with the data from the data feed before purchasing the data. The potential customer may also customize the preview application so as to change the default application behavior in a manner that improves the potential customer's understanding and appreciation of the data feed. | 12-31-2015 |
20150373005 | BROWSER PLUG-IN FOR SECURE CREDENTIAL SUBMISSION - Described is a technology by which a plug-in (e.g., an ActiveX® control) instantiated by a web browser calls functions of a credential service to use a set of credential data (e.g., a card file) for logging into a website. If the credential service determines that a previously used card file for the website exists, a representation of that card file is displayed in the browser, and the data of that card file is used to obtain a token for logging in the user. If not found, an icon is presented instead, by which the user can select a user interface that allows selection of another card file that meets that meet the website's requirements. | 12-24-2015 |
20150371358 | TOUCH MODE AND INPUT TYPE RECOGNITION - A touch input mode may be entered and exited automatically and/or manually. When the touch input mode is entered, user interface (UI) elements are optimized for touch input. When the touch input mode is exited, the user interface (UI) elements are optimized for hardware based input. A user may enter the touch input mode by manually selecting a user interface element and/or by entering touch input. Settings may be configured that specify conditions upon which the touch input mode is entered/exited. For example, the touch input mode may be configured to be automatically entered upon undocking a computing device, receiving touch input when in the hardware based input mode, and the like. Similarly, the touch input mode may be configured to be automatically exited upon docking a computing device, receiving hardware based input when in the touch input mode, and the like. | 12-24-2015 |
20150370791 | PROVIDING A SEARCH SERVICE INCLUDING UPDATING ASPECTS OF A DOCUMENT USING A CONFIGURABLE SCHEMA - Embodiments provide indexing and searching features including the use of a configurable schema as part of providing partial update support of one or more aspects of an electronic document or documents, but are not so limited. In an embodiment, a system is configured to provide search services including partial update functionality based in part on use of a configurable schema to manage partial document updates and/or query processing operations. A method of one embodiment operates to use a configurable schema to define a number of merge sets that group various document attributes based in part on data source, update, and/or usage parameters to provide an efficient partial update mechanism. Other embodiments are included. | 12-24-2015 |
20150370771 | ACCESSING AN OUT-SPACE USER INTERFACE FOR A DOCUMENT EDITOR PROGRAM - An out-space actuator is selected to access an out-space user interface for a document editor program. An out-space actuator is associated with an in-space user interface having a displayed document. When the out-space actuator is selected, an out-space user interface is displayed that includes an expanded feature selection surface. | 12-24-2015 |
20150370550 | VIRTUAL SOFTWARE APPLICATION DEPLOYMENT CONFIGURATIONS - Configuration items for a software application can be automatically and/or manually discovered, and the application can be packaged to form a virtual application package. A deployment configuration can include settings for the configuration items. The deployment configuration can be set after packaging the software application. For example, a selected configuration item in the deployment configuration may be changed in response to user input. The virtual application package can be deployed to instantiate the application one or more times, and the deployment configuration can be applied in the instantiated application. | 12-24-2015 |
20150370354 | INTERACTING TIPS FOR A DIGITIZER STYLUS - A stylus for use with a digitizer sensor includes a housing confined by a first and second end, a primary tip positioned at the first end of the housing and associated with a first transmitting element, the first transmitting element having a first diameter, a secondary tip positioned at the second end of the housing and associated with a second transmitting element, the second transmitting element having a second diameter that is larger than the first diameter, a transmitting unit for transmitting a first signal with a first amplitude via the first transmitting element and for transmitting a second signal with a second amplitude via the second transmitting element, wherein the first amplitude is at least twice the second amplitude and a powering unit for powering transmission of the first and second signal. | 12-24-2015 |
20150365482 | SMB2 SCALEOUT - Systems and methods are disclosed for clients and servers operating in a scaled cluster environment. Efficiencies are introduced to the process of connecting a client to a clustered environment by providing the client with the ability to attempt a connection with multiple servers in parallel. Servers operating the in the clustered environment are also capable of providing persistent storage of file handles and other state information. Ownership of the state information and persistent handles may be transferred between servers, thereby providing clients with the opportunity to move from one server to another while maintaining access to resources in the clustered environment. | 12-17-2015 |
20150365419 | SECURING PARTNER-ENABLED WEB SERVICE - The claimed subject matter provides a method for securing a partner service. The method can include receiving a request, wherein the request comprises a unique value, to access the partner service, wherein the request is received from a browser client for a partner application and determining that a user is authorized to access the partner application, the partner application generating a token that associates the user with the partner application. The method can also include generating a signature for the token, the signature to enable the partner service to independently regenerate the signature, the token comprising an identifier for the partner application enabling the partner service to detect which partner application generates the token and sending the token with the signature to the browser client. | 12-17-2015 |
20150363079 | DATA-DRIVEN SCHEMA FOR DESCRIBING AND EXECUTING MANAGEMENT TASKS IN A GRAPHICAL USER INTERFACE - This disclosure describes a user interface (UI) conceptual model and a data model for quickly and easily developing and managing a GUI. The present methods and systems described herein provide for defining one or more UI elements in the UI conceptual model. The one or more UI elements may further reference one or more model objects in the data model. The one or more model objects may include one or more tasks, which may each be mapped to one or more commands for performing each task, or one or more data items, which may each be mapped to rules or conditions for transforming data. According to embodiments, graphics or functionality of a GUI may be easily and efficiently modified by adding, deleting, or modifying UI elements in the UI conceptual model or by adding, deleting, or modifying referenced model objects in the data model, thereby reducing management and development costs. | 12-17-2015 |
20150355890 | AUTOMATIC CONFIGURATION OF PROJECT SYSTEM FROM PROJECT CAPABILITIES - A project system is automatically configured from project capabilities determined from an instance of a build system by a project capabilities analyzer. A flexible configuration based build system defines the consuming project system. Results of an evaluated project file are used to define the overall capabilities of the build system. The capabilities are used to dynamically load and assemble the project system code. Changes in the project capabilities due to a reevaluation of a result of a build can then redefine and reassemble the project system code. Hence project system configuration is data-driven rather than user-defined and utilizes a flexible, configuration based build system to define the consuming project system. | 12-10-2015 |
20150347864 | EXTRACTION OF USER BEHAVIOR FROM DEPTH IMAGES - Embodiments described herein use depth images to extract user behavior, wherein each depth image specifies that a plurality of pixels correspond to a user. In certain embodiments, information indicative of an angle and/or curvature of a user's body is extracted from a depth image. This can be accomplished by fitting a curve to a portion of a plurality of pixels (of the depth image) that correspond to the user, and determining the information indicative of the angle and/or curvature of the user's body based on the fitted curve. An application is then updated based on the information indicative of the angle and/or curvature of the user's body. In certain embodiments, one or more average extremity positions of a user, which can also be referred to as average positions of extremity blobs, are extracted from a depth image. An application is then updated based on the average positions of extremity blobs. | 12-03-2015 |
20150347723 | SOFTWARE APPLICATION LICENSE ROAMING - A master license entry that links a software application to a user identification can be made. Application licenses to use the software application can be roamed to multiple computing machines. Feature licenses for added features of the software application can be roamed to those computing machines as well. Multiple overlapping license rights for the software application may be linked to the master license entry. A count of how many license rights for the software application are linked to the master license entry can be maintained. Requests for licenses may be refused if the count of license rights has reached zero. | 12-03-2015 |
20150347373 | REPRESENTATION OF PEOPLE IN A SPREADSHEET - A spreadsheet includes a native spreadsheet object that represents a person. The person object may be used within a spreadsheet just as any other spreadsheet objects are utilized. For example, the person object may be integrated with spreadsheet formulas and other spreadsheet objects such as charts, tables, pivot tables, sheets, and the like. Spreadsheet formulas may perform operations specific to a person object (e.g. send message, get contact information, get status, get other person specific information, sort, and the like). Common actions may be associated with the person object, such as initiating communication with the person represented by the person object (e.g. phone call, email, text message, collaboration invite, and the like). Social networking information may also be associated with a person object. For example, social networking posts may be included within a spreadsheet, a user may post to a social network from the spreadsheet, and the like. | 12-03-2015 |
20150347372 | INTERACTION BETWEEN WEB GADGETS AND SPREADSHEETS - Gadgets integrate with spreadsheets and the spreadsheet calculation engine. A gadget is bound to a range of cells (one or more) within a sheet. When one or more of the cells of the bound range is accessed (e.g. selected, hovered over, edited, deleted, added), the gadget is notified. The gadget may use this information for updating a display rendered by the gadget and/or performing some other action. The gadget uses an Application Programming Interface (API) to create the binding, communicate with the spreadsheet, and perform actions in the spreadsheet. The gadget is a Named Item object within the spreadsheet such that the gadget may be viewed/displayed differently from other objects. Out of date requests from the gadget are attempted to be detected and prevented from being processed such that the gadget is not acting on the latest data. | 12-03-2015 |
20150347244 | REPLAYING JOBS AT A SECONDARY LOCATION OF A SERVICE - Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted. | 12-03-2015 |
20150346890 | DIGITIZER, STYLUS AND METHOD OF SYNCHRONIZATION THEREWITH - A method for operating a digitizer with an autonomous asynchronous stylus includes sampling outputs from a digitizer, detecting from the outputs at least one pulsed signal transmitted from an autonomous asynchronous stylus at a defined rate, determining a location of the stylus interaction with respect to the digitizer, and tracking stylus interaction with the digitizer over subsequent pulsed signals transmitted from the stylus. | 12-03-2015 |
20150346847 | DIGITIZER, STYLUS AND METHOD OF SYNCHRONIZATION THEREWITH - A method for operating a digitizer with an autonomous asynchronous stylus includes sampling outputs from a digitizer, detecting from the outputs at least one pulsed signal transmitted from an autonomous asynchronous stylus at a defined rate, determining a location of the stylus interaction with respect to the digitizer, and tracking stylus interaction with the digitizer over subsequent pulsed signals transmitted from the stylus. | 12-03-2015 |
20150341593 | IMAGING THROUGH A DISPLAY SCREEN - The described implementations relate to enhancement images, such as in videoconferencing scenarios. One system includes a poriferous display screen having generally opposing front and back surfaces. This system also includes a camera positioned proximate to the back surface to capture an image through the poriferous display screen. | 11-26-2015 |
20150339843 | VIEW DIRECTION DETERMINATION - Among other things, one or more techniques and/or systems are provided for defining a view direction for a texture image used to texture a geometry. That is, a geometry may represent a multi-dimensional surface of a scene, such as a city. The geometry may be textured using one or more texture images depicting the scene from various view directions. Because more than one texture image may contribute to texturing portions of the geometry, a view direction for a texture image may be selectively defined based upon a coverage metric associated with an amount of non-textured geometry pixels that are textured by the texture image along the view direction. In an example, a texture image may be defined according to a customized configuration, such as a spherical configuration, a cylindrical configuration, etc. In this way, redundant texturing of the geometry may be mitigated based upon the selectively identified view direction(s). | 11-26-2015 |
20150339397 | MOBILE SEARCH BASED ON PREDICTED LOCATION - A method includes receiving one or more search terms at a mobile computing device while the mobile computing device is located at a particular location. A search query that includes the one or more search terms and a location history of the mobile computing device is transmitted to a server. The method also includes receiving one or more search results in response to the search query, where the one or more search results include content identified based on a predicted destination of the mobile computing device. An interface identifying the one or more search results is displayed at the mobile computing device. | 11-26-2015 |
20150339281 | ACCESSING AN OUT-SPACE USER INTERFACE FOR A DOCUMENT EDITOR PROGRAM - An out-space actuator is selected to access an out-space user interface for a document editor program. An out-space actuator is associated with an in-space user interface having a displayed document. When the out-space actuator is selected, an out-space user interface is displayed that includes an expanded feature selection surface. | 11-26-2015 |
20150334416 | VARIABLE CODING RESOLUTION IN VIDEO CODEC - A video codec provides for encoding and decoding pictures of a video sequence at various coded resolutions, such that pictures can be encoded at lower coded resolutions based on bit rate or other constraints while maintaining a consistent display resolution. The video codec employs a coding syntax where a maximum coded resolution is signaled at the sequence level of the syntax hierarchy, whereas a lower coded resolution is signaled at the entry point level for a segment of one or more intra-coded frames and frames predictively encoded based thereon. This allows the use of a separate out-of-loop resampler after the decoder to up-sample the pictures to the display resolution. | 11-19-2015 |
20150334348 | PRIVACY CAMERA - A privacy camera, such as a light field camera that includes an array of cameras or an RGBZ camera(s)) is used to capture images and display images according to a selected privacy mode. The privacy mode may include a blur background mode and a background replacement mode and can be automatically selected based on the meeting type, participants, location, and device type. A region of interest and/or an object(s) of interest (e.g. one or more persons in a foreground) is determined and the privacy camera is configured to clearly show the region/object of interest and obscure or replace the background according to the selected privacy mode. The displayed image includes the region/object(s) of interest clearly shown (e.g. in focus) and any objects in a background of the combined image shown having a limited depth of field (e.g. blurry/not in focus) and/or the background replaced with another image and/or fill. | 11-19-2015 |
20150331873 | SHARING A VIRTUAL HARD DISK ACROSS MULTIPLE VIRTUAL MACHINES - Embodiments provide a method and system for sharing storage among a plurality of virtual machines. Specifically, one or more embodiments are directed to sharing a virtual hard disk with various virtual machines in a virtual machine cluster. In embodiments, a command is sent from a virtual machine to a local parser. The parser prepares the command for transport over a file system protocol. The command is sent to a remote file server using the file system protocol. When the command is received by the file server, the file server unpacks the command, determines features about the command and converts the command to a format that executes the command on the virtual shared storage. | 11-19-2015 |
20150325237 | USER QUERY HISTORY EXPANSION FOR IMPROVING LANGUAGE MODEL ADAPTATION - Query history expansion may be provided. Upon receiving a spoken query from a user, an adapted language model may be applied to convert the spoken query to text. The adapted language model may comprise a plurality of queries interpolated from the user's previous queries and queries associated with other users. The spoken query may be executed and the results of the spoken query may be provided to the user. | 11-12-2015 |
20150324299 | TEMPORAL STANDBY LIST - In one embodiment, a memory management system temporarily maintains a memory page at an artificially high priority level. The memory management system may assign an initial priority level to a memory page in a page priority list. The memory management system may change the memory page to a target priority level in the page priority list after a protection period has expired. | 11-12-2015 |
20150324193 | Remotable Project - Aspects of the subject matter described herein relate to remote project access. In aspects, project data for a project that is hosted on a server is provided to a client for use in a development environment of the client. A development environment may be instantiated and configured to allow a user to interact with the project as if the project existed solely on the client. Components on the client and server take care of transferring data and messages to and from the server to ensure that the user experience is seamless. | 11-12-2015 |
20150324183 | GENERATING AND CACHING SOFTWARE CODE - Aspects of the subject matter described herein relate to generating and caching software code. In aspects, a target device may receive software to install. The software may include source code that has not been compiled. The target device may install the software and indicate the source code of the package is to be compiled into intermediate or executable code that is persistently stored. If the target device receives a request to execute the software prior to it being compiled, the target device may compile and execute the software without delay. If the target device receives a request to execute the software after it is compiled, the target device may obtain and execute the compiled code. The behavior above may also be applied to scripting code obtained from a server remote to the target device. | 11-12-2015 |
20150319692 | ENERGY-EFFICIENT TRANSMISSION OF CONTENT OVER A WIRELESS CONNECTION - Energy efficient transmission of content can be provided using a variety of techniques. In an example technique, portions of content can be transmitted from a first computing device to a second computing device for display. A wireless radio of the first computing device can be placed into a low power mode between transmissions of the portions of content. In another example technique, one or more portions of content can be decoded, displayed, encoded, and transmitted by a first computing device for mirroring on a second computing device. One or more other portions of the content can be transmitted in encoded format to the second device without being decoded and displayed by the first device. In another example technique, a wireless radio of a first device can be placed into a low power mode in between transmission of commands to a second computing device to control content. | 11-05-2015 |
20150319432 | VIDEO DETECTION IN REMOTE DESKTOP PROTOCOLS - Embodiments of the present disclosure provide for dividing a display area having rendered data thereon into a plurality of tiles and determining an update frequency for each tile. A determination is then made as to whether the update frequency of each tile exceeds a threshold. For each tile whose update frequency exceeds the threshold, that tile is marked as a candidate tile. Each of the adjacent candidate tiles are then associated to form a heat map. The heat map is then analyzed to determine whether to encode the rendered data associated with the heat map. | 11-05-2015 |
20150317289 | METHOD AND APPARATUS FOR UTILIZING AN EXTENSIBLE MARKUP LANGUAGE SCHEMA FOR MANAGING SPECIFIC TYPES OF CONTENT IN AN ELECTRONIC DOCUMENT - An extensible markup language (“XML”) schema is provided for defining a content region which displays specific types of content in an electronic document created in a word processing application program. The schema includes structural elements for defining the content region in the electronic document. The structural elements include a properties element for defining properties associated with the content to be displayed in the content region and a content element for receiving the content to be displayed according to the defined properties. The properties element and the content element define the content region in the electronic document. | 11-05-2015 |
20150317187 | PLACING OBJECTS ON HOSTS USING HARD AND SOFT CONSTRAINTS - Objects are placed on hosts using hard constraints and soft constraints. The objects to be placed on the host may be many different types of objects. For example, the objects to place may include tenants in a database, virtual machines on a physical machine, databases on a virtual machine, tenants in directory forests, tenants in farms, and the like. When determining a host for an object, a pool of hosts is filtered through a series of hard constraints. The remaining pool of hosts is further filtered through soft constraints to help in selection of a host. A host is then chosen from the remaining hosts. | 11-05-2015 |
20150310259 | USING FACIAL DATA FOR DEVICE AUTHENTICATION OR SUBJECT IDENTIFICATION - Exemplary methods, apparatus, and systems are disclosed for authenticating a user to computing device. In one exemplary embodiment, an indication of a request by a user to unlock a mobile device in a locked state is received. One or more images of the face of the user are captured. Facial components of the user from the one or more captured images are extracted. A determination is made as to whether the user is an authorized user or a non-authorized user based at least in part on a comparison of the facial components of the user extracted from the one or more captured images to facial components of the authorized user from one or more authentication images of the authorized stored on the mobile device. If the user is determined to be the authorized user, the mobile device unlocked; otherwise, the mobile device is maintained in its locked state. | 10-29-2015 |
20150310256 | DEPTH IMAGE PROCESSING - Embodiments described herein can be used to detect holes in a subset of pixels of a depth image that has been specified as corresponding to a user, and to fill such detected holes. Additionally, embodiments described herein can be used to produce a low resolution version of a subset of pixels that has been specified as corresponding to a user, so that when an image including a representation of the user is displayed, the image respects the shape of the user, yet is not a mirror image of the user. Further, embodiments described herein can be used to identify pixels, of a subset of pixels specified as corresponding to the user, that likely correspond to a floor supporting the user. This enables the removal of the pixels, identified as likely corresponding to the floor, from the subset of pixels specified as corresponding to the user. | 10-29-2015 |
20150310212 | Detecting Script-Based Malware using Emulation and Heuristics - The subject disclosure is directed towards running script through a malware detection system including an emulator environment to detect any malware within the script. Statistics are collected as part of processing the script, with parameterized heuristic analysis used to determine whether to run the emulation. The processing through the malware detection system may be iterative, to de-obfuscate layers of obfuscated malware. The emulator may be updated via signatures. | 10-29-2015 |
20150309679 | COMMAND USER INTERFACE FOR DISPLAYING MULTIPLE SECTIONS OF SOFTWARE FUNCTIONALITY CONTROLS - To increase command-access efficiency and to optimize a user's available user interface work space, an improved user interface is provided for displaying logical groupings of selectable software functionality controls that are associated with one or more selected top-level functionalities. Upon selection of a top-level functionality tab, selectable functionalities associated with the top-level functionality tab are divided into logical groupings and are presented in a customizable functionality control section below the tab. Upon selection of a different top-level functionality tab, selectable functionalities associated with the subsequently selected top-level functionality tab may either replace the first functionality control section or may be displayed in a separate functionality control section adjacent to the first functionality control section if real estate is available in the user interface. | 10-29-2015 |
20150304448 | PROFILE AND CONSENT ACCRUAL - Consent management between a client and a network server. In response to a request for consent, a central server determines if requested user information is included in a user profile associated with a user and if the user has granted consent to share the requested user information. A user interface is provided to the user via a browser of the client to collect the requested user information that is not included in the user profile and the consent to share the requested user information from the user. After receiving the user information provided by the user via the user interface, the service provided by the network server is allowed access to the received user information, and the central server updates the user profile. Other aspects of the invention are directed to computer-readable media for use with profile and consent accrual. | 10-22-2015 |
20150304374 | APPLICATION OF COMMENTS IN MULTIPLE APPLICATION FUNCTIONALITY CONTENT - Application of comments to a variety of application functionality content is provided. Comments may be entered and displayed in a comments user interface component directly in line in the text or other objects of a document or other content item. Displayed comments may be collapsed to a simplified comments tab that may remain displayed in the associated document or content item. Selection of the comments tab may allow for expansion of the comments user interface component to full size. The comments tab may likewise be collapsed to an icon or other image displayed next to the associated content, and the icon or other image may be configured to provide an indication of the length of an associated comments conversation thread. One or more social feedback mechanisms may be employed to show feedback on a given component or portion of a document or content item. | 10-22-2015 |
20150302023 | SYNCHRONIZING MULTIPLE CLASSES WITH DISPARATE SCHEMAS IN THE SAME COLLECTION - The embodiments described herein generally relate to a method and system for synchronizing multiple classes with disparate schemas in a single collection through the use of the same synchronization request and/or synchronization key. A collection of different types of items may be synchronized while using the unique schema for each class. Further, different synchronization options, e.g., filtering, truncation, and body settings, may be applied to each class. In a synchronization request, an option block within a synchronization command notifies the server to synchronize the class specified in the option block. The option block may also specify the options, or settings, if any, to apply to the class. Multiple option blocks may be included in the synchronization command to specify the synchronization of multiple classes. Where multiple classes are specified, the server responds with the synchronized items of all such classes while maintaining each class's unique schema. | 10-22-2015 |