Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Microsoft Corporation, Redmond US

Microsoft Corporation, Redmond, WA US

Patent application numberDescriptionPublished
20130018860PARALLEL NESTED TRANSACTIONS IN TRANSACTIONAL MEMORY - Various technologies and techniques are disclosed for supporting parallel nested transactions in a transactional memory system. Multiple closed nested transactions are created for a single parent transaction, and the closed nested transactions are executed concurrently as parallel nested transactions. Various techniques are used to ensure effects of the parallel nested transactions are hidden from other transactions outside the parent transaction until the parent transaction commits. For example, retry is allowed to work correctly with parallel nested transactions. When a transaction that is a parallel nested transaction or a child transaction of the parallel nested transaction executes a retry, a read set of the transaction is registered for the retry. When a decision is made to propagate the retry past a parallel nested transaction parent of the transaction, keeping the read set registered and making the read set part of a parent read set.01-17-2013
20130024564MONITORING AGENT PROGRAMS IN A DISTRIBUTED COMPUTING PLATFORM - Methods, systems, and computer-readable media for monitoring information passed from instances of role(s) of a service application installed on a distributed computing platform and for indexing and analyzing the information within a data store are provided. Monitoring involves a monitoring agent that is integrated within an operating system of computing devices that make up the distributed computing platform. In operation, the monitoring agent retrieves information from the role instances and converts the information into parameters that are assembled to documents. Generally, the parameters are assembled to a uniform-structured format in accordance with a schema imposed by the distributed computing platform. Accordingly, each of the documents across the platform have a common format that promotes processing and analysis without a need for reconfiguration. Accordingly, the health of the service application, although dispersed throughout the distributed computing environment, may be observed and evaluated in a consistent manner.01-24-2013
20130024791MAINTAINING GRAPHICAL PRESENTATIONS BASED ON USER CUSTOMIZATIONS - A method and system for rendering graphics based on user customizations in a computer graphics application are disclosed. The customizations relate to various properties of one or more graphical elements in the graphic. Such properties include positioning, size, formatting and other visual attributes associated with the graphical elements. These properties may be defined as either semantic properties or presentation properties. Semantic properties are persistent across all graphic definitions. Presentation properties are specific to the graphic definition to which each particular graphic belongs. Thus, a customization to a semantic property of a displayed graphic is preserved in memory for application not only to the currently displayed graphic, but also to all other graphic definitions that may be displayed in the future. In contrast, a customization to a presentation property is only preserved for the currently displayed graphic, and thus not preserved for all other graphic definitions.01-24-2013
20130024905EXTENSIBLE ENCODING FOR INTERACTIVE EXPERIENCE ELEMENTS - Detailed herein is a technology which, among other things, allows for storage and playback of interactive user elements in a television stream. In one approach to this technology, a content data stream, including a television program and a user experience element, is received. This content data stream is transformed, and the transformed data stream is examined, to identify which packets are associated with the user experience element. Those packets are then passed to a handler appropriate for the user experience element.01-24-2013
20130027296COMPOUND GESTURE-SPEECH COMMANDS - A multimedia entertainment system combines both gestures and voice commands to provide an enhanced control scheme. A user's body position or motion may be recognized as a gesture, and may be used to provide context to recognize user generated sounds, such as speech input. Likewise, speech input may be recognized as a voice command, and may be used to provide context to recognize a body position or motion as a gesture. Weights may be assigned to the inputs to facilitate processing. When a gesture is recognized, a limited set of voice commands associated with the recognized gesture are loaded for use. Further, additional sets of voice commands may be structured in a hierarchical manner such that speaking a voice command from one set of voice commands leads to the system loading a next set of voice commands.01-31-2013
20130027506TECHNIQUES FOR DETECTING A DISPLAY DEVICE - Techniques to detect a display device are described. An apparatus may include a video camera operative to receive video information for an image, and a microphone operative to receive audio information for an image. The apparatus may further include a monitor detection module communicatively coupled to the video camera and the microphone, where the monitor detection module is operative to detect a temporal watermark signal displayed by the monitor within the image, and determine a location for the monitor within the image based on the detection. The apparatus may also include an active speaker detector module communicatively coupled to the monitor detection module, where the active speaker detector module is operative to exclude false positives caused by the monitor. Other embodiments are described and claimed.01-31-2013
20130031272PROVIDING SYNC NOTIFICATIONS TO CLIENT DEVICES - Providing synchronization notifications to a client device. In response to a server receiving notification that an event of interest has been received, a state of the client device is determined. The state indicates whether or not the client device has any outstanding sync notifications. In an embodiment, the state is determined based on a first parameter and a second parameter. When the state of the client device indicates that the client device has no outstanding sync notifications prior to the receipt the received notification, the first parameter is set equal to the second parameter, and the second parameter is updated after each successful device synchronization of the client device. A filter is applied prior to sending out the sync notification to the client device.01-31-2013
20130031404SYSTEM AND METHOD FOR IMPLEMENTING PNRP LOCALITY - A method is provided for a host node in a computer network to determine its coordinates in a d-dimensional network space, comprising discovering an address of a peer node in the network, measuring network latency between the host node and the peer node, determining whether network latency has been measured for at least d+1 peer nodes, where, if network latency has not been measured for at least d+1 peer nodes, estimating the network coordinates of the host node, and where, if network latency has been measured for at least d+1 peer nodes, calculating the network coordinates of the host node using d+1 measured latencies.01-31-2013
20130031504Interface for a Computer Platform - A programming interface for a computer platform can include various functionality. In certain embodiments, the programming interface includes one or more of a first group of services related to re-usable user interface controls, a second group of services related to user interface dialogs and user interface wizards, a third group of services related to extending the user interface functionality, and a fourth group of services related to extending functionality of a desktop of the user interface.01-31-2013
20130031530CREATION AND MANAGEMENT OF ELECTRONIC FILES FOR A LOCALIZATION PROJECT - Electronic files for a localization project may be created and/or managed. The electronic files may be based on a data structure that defines the format and content of the electronic files and may include a first data structure portion that may contain data representing a plurality of references to localization project files. The data structure may includes a second data structure portion that may be associated with the first data structure portion that may contain data that may represent a plurality of references to standard files.01-31-2013
20130035075OFFLINE VOICEMAIL - A method for accessing offline voicemail messages within a mobile messaging application may be provided. First, a voice mail message may be received and the voicemail message may be transcribed to text. Next, the voicemail message and the text transcription may be stored. The recipient may then be presented with a list of voicemail messages and the voicemail message may be retrieved in response to the recipient. The recipient may read or listen to the voicemail message or both. The recipient may also annotate the voicemail message.02-07-2013
20130036308END-TO-END AUTHENTICATION OF SESSION INITIATION PROTOCOL MESSAGES USING CERTIFICATES - End-to-end authentication capability based on public-key certificates is combined with the Session Initiation Protocol (SIP) to allow a SIP node that receives a SIP request message to authenticate the sender of request. The SIP request message is sent with a digital signature generated with a private key of the sender and may include a certificate of the sender. The SIP request message my also be encrypted with a public key of the recipient. After receiving the SIP request, the receiving SIP node obtains a certificate of the sender and authenticates the sender based on the digital signature. The digital signature may be included in an Authorization header of the SIP request, or in a multipart message body constructed according to the S/MIME standard.02-07-2013
20130036453SYSTEM, METHOD AND USER INTERFACE FOR NETWORK STATUS REPORTING - A method and user interface for informing a user of the status of a network connection are provided. Conventionally, the “connected” icon in the system tray only informs the user that the computer is linked to a network medium, such as an Ethernet or wireless access point. This icon does not indicate whether a routable IP address has been obtained. In this invention, an icon is used to inform the user that the network connection is disabled, connecting, connected (routable IP address obtained), or in a warning state. The warning state indicates that a non-routable IP address (e.g. auto net address) has been obtained, which will likely be unsatisfactory to the user. However, when connected to an 802.11 ad-hoc network, or when IP status checking is disabled, a non-routable IP address is deemed acceptable, and thus the “connected” icon is displayed.02-07-2013
20130039414EFFICIENT MACROBLOCK HEADER CODING FOR VIDEO COMPRESSION - The coded block parameters used to code blocks of image samples into structures called macroblocks are compressed more efficiently by exploiting the correlation between chrominance and luminance blocks in each macroblock. In particular, the coded block pattern for chrominance and luminance are combined into a single parameter for the macroblock and jointly coded with a single variable length code. To further enhance coding efficiency, the spatial coherence of coded block patterns can be exploited by using spatial prediction to compute predicted values for coded block pattern parameters.02-14-2013
20130041627Compressive Data Gathering for Large-Scale Wireless Sensor Networks - Techniques for data gathering in large-scale wireless sensor networks are described. A data collection device receives aggregate data from at least one sensor node of a group of N sensor nodes. The aggregate data includes M weighted sums. Each of the M weighted sums includes a respective sum of N products each of which being a product of a respective coefficient and a sensor reading from a respective one of the N sensor nodes. M and N are positive integers and M is less than N. Computation is performed on the aggregate data to recover sensor readings from the N sensor nodes.02-14-2013
20130041867SYNCHRONIZATION ADAPTER FOR SYNCHRONIZING DATA TO APPLICATIONS THAT DO NOT DIRECTLY SUPPORT SYNCHRONIZATION - A synchronization adapter is coupled to the application that does not support synchronization and generates the necessary synchronization metadata for all data in the application that is to be synchronized. The synchronization adapter then combines the metadata to the actual data to be synchronized to form a synchronization feed. The synchronization feed is stored in an internal cache (or data store) which is internal to the application, or an external cache (or data store), which is external to the application, or it can be stored in both caches. The synchronization adapter also intermittently determines whether the application data has changed, thus warranting a change in its metadata, or whether a synchronization operation is warranted to synchronization operation is warranted to synchronize the data with data in another application. In either case, the synchronization adapter makes the changes to the data, or performs a synchronization operation.02-14-2013
20130042175PHRASE GENERATION USING PART(S) OF A SUGGESTED PHRASE - Real-time query expansion (RTQE) is a process of supplementing an original query with addition terms or expansion choices that are ranked according to some figure of merit and presented while users are still formulating their queries. As disclosed herein, phrases may be presented and one or more terms of a focused-on phrase may be pinned (as desirable to the user). Subsequent lists may be presented as a function of pinned terms and/or user input. In one embodiment, a placeholder may be substituted for one or more pinned terms if less than some predetermined threshold of phrases is able to be presented based upon the pinned terms and/or user input, and another list of phrases may be presented as a function of a query using fewer than all the pinned terms. The placeholder may allow out-of-index phrases to be formed, for example, based upon two or more phrases and/or terms input by the user.02-14-2013
20130042203MANAGING AN IMMERSIVE INTERFACE IN A MULTI-APPLICATION IMMERSIVE ENVIRONMENT - This document describes techniques and apparatuses for managing an immersive interface in a multi-application immersive environment. In some embodiments, these techniques and apparatuses enable a user to alter sizes and/or a layout of multiple immersive interfaces with as little as one selection.02-14-2013
20130042206Presenting an Application Change through a Tile - This document describes techniques and apparatuses for presenting an application change through a tile. These techniques enable a user to see content associated with content changes to an application or other information about the application, such as a new article, new email, or a software update having become available since a user last visited the application. By so doing, the techniques enable a user to forgo visiting the application or permit the user to quickly and easily decide whether or not to visit the application.02-14-2013
20130042207ACCESSING A MENU UTILIZING A DRAG-OPERATION - Computer-readable media, computerized methods, and computer systems for intuitively invoking a presentation action (e.g., rendering a menu) by applying a drag-operation at a top-level control button rendered at a touchscreen display are provided. Initially, aspects of a user-initiated input applied at the top-level control button are detected. These aspects may include an actuation location and a distance of a drag-movement therefrom. If a distance of the drag-movement at the touchscreen display is greater than a threshold distance in a particular radial direction from the actuation location, the user-initiated input is considered a drag-operation. Typically, a set of trigger boundaries are constructed based on system metrics to assist in disambiguating the drag-operation from a tap-type operation. If a drag-operation is identified, the presentation action is invoked; otherwise, a principle action associated with the top-level control button (e.g., manipulating content of an application) may be invoked.02-14-2013
20130042255Memory Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine.02-14-2013
20130042309USER AUTHENTICATION MANAGEMENT - End users of a multi-factor authentication service can utilize an account management service, and third-party website can register to utilize the multi-factor authentication service. Registering a third-party website can comprise the multi-factor authentication service receiving a valid digital identity certificate for the third-party website, and receiving an agreement to terms of use of the multi-factor authentication service for the third-party website. Once received, the multi-factor authentication service can enable the third-party website to utilize the service (e.g., switch the service on, or send an authorization key to the third-party website). Further, registering a user to the multi-factor authentication service can comprise determining availability of service, and providing a location-specific access code. Additionally, registering the user can comprise registering the user's mobile device, for example, to provide multi-factor authentication. Also, an Internet-based user account management user interface can be provided that allows a user to view transactions on their account, and an ability to shut off a designated mobile device's ability to authenticate.02-14-2013
20130044070Unintentional Touch Rejection - A method for rejecting an unintentional palm touch is disclosed. In at least some embodiments, a touch is detected by a touch-sensitive surface associated with a display. Characteristics of the touch may be used to generate a set of parameters related to the touch. In an embodiment, firmware is used to determine a reliability value for the touch. The reliability value and the location of the touch is provided to a software module. The software module uses the reliability value and an activity context to determine a confidence level of the touch. In an embodiment, the confidence level may include an evaluation of changes in the reliability value over time. If the confidence level for the touch is too low, it may be rejected.02-21-2013
20130044136Customization of an Immersive Environment - A computing device includes an immersive environment module for facilitating simultaneous display of a plurality of applications on a display device without relying on system chrome. At least a first of the applications is displayed in a primary region of the display. The computing device also includes a UI management component for enabling a user selection of an application for simultaneous display on the display device with at least one other application. Processing logic is configured to determine a size in at least one direction of content of a user-selected application as it is displayed on a non-primary region of the display device simultaneous with display of content of the first application on the primary region of the display device. The determination is based at least in part on one or more pre-defined size requirements specified by the selected application.02-21-2013
20130044141Cross-slide Gesture to Select and Rearrange - Cross slide gestures for touch displays are described. In at least some embodiments, cross slide gestures can be used on content that pans or scrolls in one direction, to enable additional actions, such as content selection, drag and drop operations, and the like. In one or more embodiments, a cross slide gesture can be performed by dragging an item or object in a direction that is different from a scrolling direction. The different-direction drag can be mapped to additional actions or functionality. In one or more embodiments, one or more thresholds can be utilized, such as a distance threshold, in combination with the different-direction drag, to map to additional actions or functionality.02-21-2013
20130046877ROUTING OF POOLED MESSAGES VIA AN INTERMEDIARY - Message intermediation for multiple service instances, while allowing the service instance to control whether messages are processed under a transaction. The message intermediator chooses to dispatch messages among different backend service instances based on any routing rules. The message intermediator performs a peek-lock of message from a forward-end queue, and assigns the message to a service instance. The message is provided into a backward-end queue specific to the assigned service instance. The service instance may then process the message, perhaps under a transaction created at the service instance. Upon completion of processing, the message is deleted in the back-end queue, which causes the forward-end queue to delete the message under the same transaction created by the service instance. Whether or not this deletion at the forward-end is committed or rolled back depends on whether the transaction created at the service instance is committed or rolled back.02-21-2013
20130047064Interface Definition Language Extensions - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine.02-21-2013
20130047105MULTI-APPLICATION ENVIRONMENT - This document describes techniques and apparatuses enabling a multi-application environment. In some embodiments, these techniques and apparatuses enable multi-application environments having combinations of immersive interfaces, windows-based interfaces, and a desktop treated as an immersive interface.02-21-2013
20130047117APPLICATION-LAUNCHING INTERFACE FOR MULTIPLE MODES - This document describes techniques and apparatuses enabling an application-launching interface for multiple modes. This interface enables a user to quickly and easily select to launch applications associated with different modes. A user may avoid wading through multiple interfaces, making multiple selections, and/or a cognitive load associated with deciding on a mode with which to interact.02-21-2013
20130047126SWITCHING BACK TO A PREVIOUSLY-INTERACTED-WITH APPLICATION - This document describes techniques and apparatuses for switching back to a previously-interacted-with application. In some embodiments, these techniques and apparatuses enable selection of a user interface not currently exposed on a display through a simple gesture that is both easy-to-use and remember.02-21-2013
20130047252Picture Gesture Authentication - In one embodiment, a picture signature password system may use a picture signature password to determine access to a computing device or service. A display screen 02-21-2013
20130047258Security Model for a Layout Engine and Scripting Engine - Various embodiments provide an interface between a Web browser's layout engine and a scripting engine. The interface enables objects from the layout engine to be recognized by a memory manager in the scripting engine and interact in a streamlined, efficient manner. In accordance with one or more embodiments, the interface allows browser layout engine objects to be created as objects that are native to the scripting engine. Alternately or additionally, in some embodiments, the native objects are further configured to proxy functionality between the layout engine and the scripting engine.02-21-2013
20130054590IDENTIFYING CONCEPTUALLY RELATED TERMS IN SEARCH QUERY RESULTS - Conceptually related term identification technique embodiments are presented that involve identifying in the results of a search query, terms that are conceptually related to the search query terms. In one general embodiment, this is accomplished by first inputting the terms employed in a search query and the results of the search. Word tokens found in the search query terms are then identified, as are potential phrases that can be made from the identified word tokens. Conceptually related words and phrases are then identified in the search query results. These words and phrases correspond to the previously identified word tokens and potential phrases. The search query results are presented to a user on a display device in such a manner as to visually distinguish the conceptually related words and phrases from other words and phrases in the search query results.02-28-2013
20130054921Power Aware Memory Allocation - A computer system may place memory objects in specific memory physical regions based on energy consumption and performance or other policies. The system may have multiple memory regions at least some of which may be powered down or placed in a low power state during system operation. The memory object may be characterized in terms of access frequency, movability, and desired performance and placed in an appropriate memory region. In some cases, the memory object may be placed in a temporary memory region and later moved to a final memory region for long term placement. The policies may allow some processes to operate while consuming less energy, while other processes may be configured to maximize performance02-28-2013
20130055396SECURING ANTI-VIRUS SOFTWARE WITH VIRTUALIZATION - The subject disclosure relates to systems and methods that secure anti-virus software through virtualization. Anti-virus systems can be maintained separate from user applications and operating system through virtualization. The user applications and operating system run in a guest virtual machine while anti-virus systems are isolated in a secure virtual machine. The virtual machines are partially interdependent such that the anti-virus systems can monitor user applications and operating systems while the anti-virus systems remain free from possible malicious attack originating from a user environment. Further, the anti-virus system is secured against zero-day attacks so that detection and recovery may occur post zero-day.02-28-2013
20130056615OPTICAL FAULT MONITORING - Various embodiments related to monitoring for optical faults in an optical system are disclosed. For example, one disclosed embodiment provides, in an optical system comprising a light source, a light outlet, and an optical element disposed between the light source and the light outlet, a method of monitoring for optical system faults. The method includes detecting, via a light sensor directed toward an interface surface of the optical element closest to the light source, an intensity of light traveling from the interface surface of the optical element to the light sensor, and comparing an intensity of light detected to one or more threshold intensity values. The method further includes identifying an optical system fault condition based on comparing the intensity of light detected to one or more threshold values, and modifying operation of the optical system.03-07-2013
20130057543SYSTEMS AND METHODS FOR GENERATING STEREOSCOPIC IMAGES - Systems and methods are disclosed for generating stereoscopic images for a user based on one or more images captured by one or more scene-facing cameras or detectors and the position of the user's eyes or other parts relative to a component of the system as determined from one or more images captured by one or more user-facing detectors. The image captured by the scene-facing detector is modified based on the user's eye or other position. The resulting image represents the scene as seen from the perspective of the eye of the user. The resulting image may be further modified by augmenting the image with additional images, graphics, or other data. Stereoscopic mechanisms may also be adjusted or configured based on the location or the user's eyes or other parts.03-07-2013
20130057588ARRANGING TILES - This document describes techniques and apparatuses for arranging tiles. These techniques and apparatuses enable users to quickly and easily arrange tiles within an interface, such as an application-launching interface. In some cases, users may arrange tiles in an interface with as little as one continuous gesture.03-07-2013
20130057654METHOD AND SYSTEM TO SEGMENT DEPTH IMAGES AND TO DETECT SHAPES IN THREE-DIMENSIONALLY ACQUIRED DATA - A method and system analyzes data acquired by image systems to more rapidly identify objects of interest in the data. In one embodiment, z-depth data are segmented such that neighboring image pixels having similar z-depths are given a common label. Blobs, or groups of pixels with a same label, may be defined to correspond to different objects. Blobs preferably are modeled as primitives to more rapidly identify objects in the acquired image. In some embodiments, a modified connected component analysis is carried out where image pixels are pre-grouped into regions of different depth values preferably using a depth value histogram. The histogram is divided into regions and image cluster centers are determined. A depth group value image containing blobs is obtained, with each pixel being assigned to one of the depth groups.03-07-2013
20130058565GESTURE RECOGNITION SYSTEM USING DEPTH PERCEPTIVE SENSORS - Acquired three-dimensional positional information is used to identify user created gesture(s), which gesture(s) are classified to determine appropriate input(s) to an associated electronic device or devices. Preferably at at least one instance of a time interval, the posture of a portion of a user is recognized, based at least one factor such as shape, position, orientation, velocity. Posture over each of the instance(s) is recognized as a combined gesture. Because acquired information is three-dimensional, two gestures may occur simultaneously.03-07-2013
20130060756DOMAIN EXPERTISE DETERMINATION - A user's domain expertise may be estimated through several factors by monitoring different aspects of a user's interaction with a web browser. Based on the user's domain expertise, search results may be presented to the user that is commensurate with their expertise, resulting in a more efficient and productive on line session. A user's expertise in a knowledge domain may be determined from the user's behavior, including analyzing search queries, monitoring how the user navigates between and through websites, and analyzing the specific cites visited. As a user interacts with a browser, the user's estimated domain expertise may be updated and used to provide appropriate and useful search results. In many embodiments, a user may have different expertise levels for different technical domains.03-07-2013
20130060972BALANCING USAGE OF HARDWARE DEVICES AMONG CLIENTS - Techniques are disclosed for managing the flow of IO jobs from a client to a hardware device such that resource starvation is reduced without significantly impacting throughput. Each flow can be assigned an amount of time that a hardware device can deplete completing IO jobs from the client. When the allocated amount of time is used IO jobs associated with the client can be stored in a queue until the client obtains more time.03-07-2013
20130063448Aligning Script Animations with Display Refresh - Various embodiments align callbacks to a scripting component that enable the scripting component to update animation, with a system's refresh notifications. Specifically, an application program interface (API) is provided and implemented in a manner that generates and issues a callback to the scripting component when the system receives a refresh notification. This provides the scripting component with a desirable amount of time to run before the next refresh notification.03-14-2013
20130063490Progressively Indicating New Content in an Application-Selectable User Interface - This document describes techniques for progressively indicating new content in an application-selectable user interface. These techniques permit a user to view indications of new content for applications progressively, rather than all at one time. By so doing, the techniques may avoid mentally or visually overloading or over-stimulating a user viewing the indications.03-14-2013
20130066824SEMANTICS UPDATE AND ADAPTIVE INTERFACES IN CONNECTION WITH INFORMATION AS A SERVICE - Additional semantic information that describes data sets is inferred in response to a request for data from the data sets, e.g., in response to a query over the data sets, including analyzing a subset of results extracted based on the request for data to determine the additional semantic information. The additional semantic information can be verified by the publisher as correct, or satisfy correctness probabilistically. Mapping information based on the additional semantic information can be maintained and updated as the system learns additional semantic information (e.g., information about what a given column represents and data types represented), and the form of future data requests (e.g., URL based queries) can be updated to more closely correspond to the updated additional semantic information.03-14-2013
20130066925ACCESSING DIFFERENT APPLICATION DATA VIA A COMMON DATA STRUCTURE - A common data type structure can be used to correlate access requests between applications that implement data in accordance with different types or type structures. In one implementation, a common data structure includes schemes for operations, sequences, records, and atoms (i.e., undefined). The system can then map any type structure to the schemes of the common data structure. In operation, a request for data by an application can involve identifying one or more proxies used by an application to map the data to the common data structure. The proxies map the data to the common data structure based on the shape of the data (to the extent it can be identified). The proxies then can return one or more data structures that comprise the identified mapping information. The application can then perform operations directly on the received data structures.03-14-2013
20130067310Displaying Multiple Row and Column Header Areas in a Summary Table - A data analysis program receives a selection of data fields defining multiple row header areas and/or multiple column header areas for display in a summary table. Data is read from a data source containing values for the data fields and transformed into summary level data for building the summary table. A display is rendered in the summary table for each of the multiple row header areas and column header areas defined, with the row header areas being displayed vertically adjacent to one another and the column header areas being displayed horizontally adjacent to one another.03-14-2013
20130067320Batch Document Formatting and Layout on Display Refresh - In one or more embodiments, processing efficiencies are gained within the web browser by utilizing the display refresh notifications to drive layout processing within a web browser's layout pipeline. By doing so, the browser can ensure that layout computation is performed when the computed layout is actually to be displayed by the computing device. This can enable the web browser to defer and batch numerous changes into a single layout update, thereby reducing overall CPU utilization while maintaining user responsiveness.03-14-2013
20130067359Browser-based Discovery and Application Switching - Various embodiments enable a web browser to promote the availability of an installable application that is associated with a website to which the web browser has been navigated. The web browser is configured to discover the availability of these applications and, responsively, provide a user experience through which the user can acquire and install such applications, as well as switch to applications that have previously been installed. Thus, through the various embodiments, a user is relieved of the burden of having to navigate to a particular application store and periodically search for applications associated with sites to which they browse.03-14-2013
20130067486MESSAGE COMMUNICATION OF SENSOR AND OTHER DATA - A service may be provided that reads sensors, and that communicates information based on the sensor readings to applications. In one example, an operating system provides a sensor interface that allows programs that run on a machine to read the values of sensors (such as an accelerometer, light meter, etc.). A service may use the interface to read the value of sensors, and may receive subscriptions to sensor values from other programs. The service may then generate messages that contain the sensor value, and may provide these messages to programs that have subscribed to the messages. The messages may contain raw sensor data. Or, the messages may contain information that is derived from the sensor data and/or from other data.03-14-2013
20130067501VIRTUALIZED STORAGE ASSIGNMENT METHOD - Various aspects are disclosed for building a device driver stack in a virtual machine partition that does not physically control the device represented by the stack. In an embodiment, a secondary interface and driver for an I/O device may be instantiated. Information from an I/O virtualization layer describing the devices that the associated driver may control may be requested. A multi-path redirection layer may provide a handle to an existing stack that includes a driver for the I/O device. This existing stack may then be used to communicate with the device and allow the creation of a new stack including an object representing the device and a new driver for the device. The multi-path redirection layer may then open a handle to the new stack and inform the device virtualization layer, which may then ask the existing device interface to relinquish control of the device to the newly created interface.03-14-2013
20130067503EXPOSURE OF REMOTELY INVOKABLE METHOD THROUGH A WEBPAGE TO AN APPLICATION OUTSIDE WEB BROWSER - Web browsing environments are commonly used to facilitate user interaction with data over the Internet. A web browser is a tool used to view and interact with a webpage. A webpage may interface with a web service to provide remote functionality that the webpage does not locally provide. An effective method for specifying and consuming remote functionality that an application invokes outside of the web browser is disclosed herein. A webpage exposes remote functionality (e.g., web service) that a web browser and/or browser extensions may discover through browsing the webpage. A browser extension associated with an application determines whether the application is compatible with the remote functionality. Once a compatible application is determined, it may be executed so as to connect to and invoke the remote functionality outside of the web browser. The application may provide a more robust experience with the remote functionality compared to the web browsing environment.03-14-2013
20130070058SYSTEMS AND METHODS FOR TRACKING A MODEL - An image such as a depth image of a scene may be received, observed, or captured by a device. A grid of voxels may then be generated based on the depth image such that the depth image may be downsampled. A model may be adjusted based on a location or position of one or more extremities estimated or determined for a human target in the grid of voxels. The model may also be adjusted based on a default location or position of the model in a default pose such as a T-pose, a DaVinci pose, and/or a natural pose.03-21-2013
20130070122Camera-Based Scanning - Embodiments of camera-based scanning are described. In various embodiments, one or more quadrangular objects are automatically selected from a captured image for scanning. The automatic selection is determined to be successful based on the selected quadrangular objects having an associated score that exceeds a predefined threshold. One or more scanned documents are created from portions of the captured image corresponding to the selected quadrangular objects, and the created scanned documents include corrections for perspective distortions of the selected quadrangular objects in the captured image.03-21-2013
20130070843ADAPTIVE COEFFICIENT SCAN ORDER - A digital media codec adaptively re-arranges a coefficient scan order of transform coefficients in accordance with the local statistics of the digital media, so that the coefficients can be encoded more efficiently using entropy encoding. The adaptive scan ordering is applied causally at encoding and decoding to avoid explicitly signaling the scan order to the decoder in the compressed digital media stream. For computational efficiency, the adaptive scan order re-arranges the scan order by applying a conditional exchange operation on adjacently ordered coefficient locations via a single traversal of the scan order per update of the statistical analysis.03-21-2013
20130070914AUGMENTING A CALL WITH CONTEXT - A method and system for providing context of a caller to a callee when a call is initiated is provided. The context system executing on the calling device collects context for the call. The calling device initiates the call and sends a message to the callee that includes the context. Upon receiving the message, the callee device notifies the caller that a call has been initiated and displays the received context. The callee can decide based on the received context whether to answer the call or not answer the call.03-21-2013
20130073202LEARNING TRANSPORTATION MODES FROM RAW GPS DATA - Described is a technology by which raw GPS data is processed into segments of a trip, with a predicted mode of transportation (e.g., walking, car, bus, bicycling) determined for each segment. The determined transportation modes may be used to tag the GPS data with transportation mode information, and/or dynamically used. Segments are first characterized as walk segments or non-walk segments based on velocity and/or acceleration. Features corresponding to each of those walk segments or non-walk segments are extracted, and analyzed with an inference model to determine probabilities for the possible modes of transportation for each segment. Post-processing may be used to modify the probabilities based on transitioning considerations with respect to the transportation mode of an adjacent segment. The most probable transportation mode for each segment is selected.03-21-2013
20130073592MATCHING OFFERS TO KNOWN PRODUCTS - A method and apparatus for electronically matching an electronic offer to structured data for a product offering is disclosed. The structure data is reviewed and a dictionary of terms for each attribute from the structure data is created. Attributes in unstructured text may be determined. Each pair of the attributes (name and value) from the unstructured data and the structured data are obtained, the attribute pairs of the structured data and the unstructured data and compared and a similarity level is calculated for the matching the attribute pairs. The structured data pair that has the highest similarity score to the unstructured data pair is selected and returned.03-21-2013
20130073923FAST AND RELIABLE WIRELESS COMMUNICATION - A communication system that provides fast and reliable communications. The system is suitable for use in connection with wireless computing devices in which transmission errors may occur because of channel conditions, such as interference. Channel conditions causing transmission errors may be bursty and transient such that the errors temporarily overwhelm an error control code. By combining data received for multiple transmission attempts of a packet that fail error checking or that pass error checking with low reliability, a reliable representation of the packet may be quickly constructed. Though, combining may be omitted when a transmission attempt is received that passes error checking with high reliability.03-21-2013
20130073955Dynamic Screentip Language Translation - When a user interface cursor hovers over a user interface item, a determination is made as to whether the user interface item has an associated screentip. If the user interface item has an associated screentip, text associated with the screentip is identified, a translated text string is located for the text string, and the translated text string is displayed in the screentip. If the user interface item does not have an associated screentip, a determination is made as to whether the user interface item contains a text string. If so, a determination is made as to whether a translated text string is available that corresponds to the text in the user interface item. If so, the translated text string is displayed in a screentip for the user interface item.03-21-2013
20130074002Recognizing User Intent In Motion Capture System - Techniques for facilitating interaction with an application in a motion capture system allow a person to easily begin interacting without manual setup. A depth camera system tracks a person in physical space and determines a probabilistic measure of the person's intent to engage of disengage with the application based on location, stance and movement. Absolute location in a field of view of the depth camera, and location relative to another person, can be evaluated. Stance can include facing a depth camera, indicating a willingness to interact. Movements can include moving toward or away from a central area in the physical space, walking through the field of view, and movements which occur while standing generally in one location, such as moving one's arms around, gesturing, or shifting weight from one foot to another.03-21-2013
20130074167Authenticating Linked Accounts - Embodiments of authenticating linked accounts are presented herein. In an implementation, an authentication service provides functionality to form links between a plurality of user accounts. A client may then authenticate by providing credentials for one account in a group of linked accounts, and is permitted access to each account in the group of linked accounts based upon the linking. Thus, a single sign-in of a client to one account may permit the client to obtain services for service providers corresponding to multiple linked accounts, without an individual sign-in to each account.03-21-2013
20130076759MULTI-LAYERED SLIDE TRANSITIONS - Architecture that enhances the visual experience of a slide presentation by animating slide content as “actors” in the same background “scene”. This is provided by multi-layered transitions between slides, where a slide is first separated into “layers” (e.g., with a level of transparency). Each layer can then be transitioned independently. All layers are composited together to accomplish the end effect. The layers can comprise one or more content layers, and a background layer. The background layer can further be separated into a background graphics layer and a background fill layer. The transition phase can include a transition effect such as a fade, a wipe, a dissolve effect, and other desired effects. To provide the continuity and uniformity of presentation the content on the same background scene, a transition effect is not applied to the background layer.03-28-2013
20130077769ENHANCED VOICEMAIL USAGE THROUGH AUTOMATIC VOICEMAIL PREVIEW - Textual preview of a voicemail is generated and provided through email or similar media to users along with the audio version. Transcription of the textual version, as well as additional capabilities such as actionable terms, playback-jump, switching between text and audio versions, direct or metadata based searchability, and enhanced response capabilities are provided based on contextual data obtained from voicemail metadata and user associated data stores such as contact list, email history.03-28-2013
20130080485QUICK FILENAME LOOKUP USING NAME HASH - A method of updating a file record on at least one of a first one or more computer readable storage media including writing at least three contiguous DirectoryEntry data structures corresponding to a directory entry set, the directory entry set corresponding to a file, the writing occurring to the at least one of a first one or more computer readable storage media.03-28-2013
20130080558PERSISTING A GROUP IN AN INSTANT MESSAGING APPLICATION - Various technologies pertaining to instant messaging are described herein. A persistent instant messaging group is created, wherein the persistent instant messaging group comprises a plurality of members and persists over a plurality of instant messaging sessions. Instances of an instant messaging application are installed on mobile telephones, and the instant messaging application is used to transmit instant messages between members of the persistent instant messaging group. Messages directed towards offline members of the persistent instant messaging group are transmitted to such members when they come online.03-28-2013
20130080632CRISSCROSS CANCELLATION PROTOCOL - Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A sends message 3 towards Node B and, shortly thereafter, Node B sends message X to Node A. Node A would like to know whether or not message X reflects Node B's state after receiving message 3. If Node B received message 3 prior to sending message X, then proper state may be maintained between the nodes. But if messages 3 and X crisscrossed, or if message 3 was never properly received by Node B, then the state between the nodes may be corrupt. Technologies, systems, and methods are provided to avoid such corruption.03-28-2013
20130080965VIRTUAL KEYBOARD TEXT REPLICATION - Text that is selected at a virtual keyboard is submitted to and displayed at an application data field another data field, such as a keyboard data field, that can be in closer proximity to the virtual keys used to select the text. Thus, a user does not have to alter their field of view to the application data field to determine what was submitted to the application data field.03-28-2013
20130080979EXPLICIT TOUCH SELECTION AND CURSOR PLACEMENT - A system and method for implementing an efficient and easy to user interface for a touch screen device. A cursor may be placed by a user using simple inputs. The device operates places the cursor coarsely and refines the cursor placement upon further input from the user. Text may be selected using a gripper associated with the cursor. The user interface allows text selection without occluding the text being selected with the user's finger or the gripper. For selecting text in a multi-line block of text, a dynamic safety zone is implemented to simplify text selection for the user.03-28-2013
20130081116TRUSTED INTERNET IDENTITY - A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requestor by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request.03-28-2013
20130082818Motion Triggered Data Transfer - Methods of controlling the transfer of data between devices are described in which the manner of control is determined by a movement experienced by at least one of the devices. The method involves detecting a triggering movement and determining a characteristic of this movement. The transfer of data is then controlled based on the characteristic which has been identified.04-04-2013
201300830173D LAYERING OF MAP METADATA - Techniques and tools are described for rendering views of a map in which map metadata elements are layered in 3D space through which a viewer navigates. Layering of metadata elements such as text labels in 3D space facilitates parallax and smooth motion effects for zoom-in, zoom-out and scrolling operations during map navigation. A computing device can determine a viewer position that is associated with a view altitude in 3D space, then render for display a map view based upon the viewer position and metadata elements layered at different metadata altitudes in 3D space. For example, the computing device places text labels in 3D space above features associated with the respective labels, at the metadata altitudes indicated for the respective labels. The computing device creates a map view from points of the placed labels and points of a surface layer of the map that are visible from the viewer position.04-04-2013
20130083698NATIVE WI-FI ARCHITECTURE FOR 802.11 NETWORKS - A software based wireless infrastructure system is provided. The system has a driver that communicates with the network stack and a network interface card (NIC), a station server in communication with the station driver and an 802.1X supplicant or an 802.1X authenticator. Each NIC provides station and/or access point functionality support. The driver drops packets that have been received if the packet has not been authenticated and associated. Packets that have been fragmented or encrypted are unfragmented and decrypted. An association manager is used in conjunction with a configuration table manager to associate stations and access points via management packets. A manager receives 802.1X data packets from the packet processor and sends them up to a station server that communicates with user mode applications and an 802.1X supplicant or an 802.1X authenticator that are used to authenticate and deauthenticate stations and access points. APIs are provided to enable communication between the components.04-04-2013
20130085994CREATING HOST-LEVEL APPLICATION-CONSISTENT BACKUPS OF VIRTUAL MACHINES - A host server hosting one or more virtual machines can back up host volumes and the one or more virtual machines installed thereon in an application-consistent manner. In one implementation, a host-level requestor instructs a host-level writer to identify which virtual machines qualify for application-consistent backups. The host-level requestor then instructs the host-level writer to initiate virtual machine backups through guest-level requesters in each appropriately-configured virtual machine, wherein the virtual machines create application-consistent backups within the virtual machine volumes. The host-level requester then initiates snapshots of the server volumes on the host-level. The virtual machine-level snapshots can thus be retrieved from within the host-level snapshots of the server volumes.04-04-2013
20130086226MODELING RECURRING EVENTS IN A DATA STORE - Time-related properties may be modeled independent of a base object. Rather than storing time properties with the object, they may be stored independently. A given object may be stored once, even if it has a recurrent time property. The description of a “meeting,” for example, may be stored once. Each occurrence of that object over time may be stored in a “timeslot” (object occurs at time ‘t’ on day ‘d’). If it is a recurring property, recurrence information may be stored independently. “Exception” information may be stored independently as well.04-04-2013
20130086605PROGRAM PROMOTION FEEDBACK - A user request to watch a program is received in response to a promotion for the program. One or both of recording the program and playback of the program is performed. Information regarding one or both of the recording and the playback is output, this information including an identifier of the promotion. Additionally, a report can be generated from this information output by multiple devices, the report describing the recording of the program and the playback of the program on the multiple device in response to the promotion.04-04-2013
20130086678INTEGRATING SECURITY PROTECTION TOOLS WITH COMPUTER DEVICE INTEGRITY AND PRIVACY POLICY - At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.04-04-2013
20130090846ROUTE MODIFICATIONS - A computer system and media for delivering routing information are provided. The computer system includes a routing engine, a database, and routing network that are employed to respond to routing requests and user modifications of routing information received in response to the routing requests. The routing engine receives the routing requests and generates routing information that illustrates a route and metadata for directions that guides a user when navigating the route. A user that is dissatisfied with the routing information may use route modification tools to alter the route in a manner that is consistent with the user's understanding of alternate routes that may supplement the routing information provided by the routing engine. The computer system receives the user modifications, stores the user modifications, and updates the routing network to learn the alternate route provided in the user modifications.04-11-2013
20130091097IDENTIFICATION OF MOVED OR RENAMED FILES IN FILE SYNCHRONIZATION - A method for synchronizing files is provided. Current metadata including a filename and a hash identifier for each file of the synchronized folder is created. The current metadata is compared to previous metadata. Based on the comparison, a first file and a first folder added to the synchronized folder and a second file and a second folder deleted from the synchronized folder are identified. The hash identifiers of the first and second files are compared. If the hash identifiers match, the filenames of the first and second files are compared. If the filenames do not match, the first file is identified as a renamed file. Metadata is sent to a synchronized device with information related to the first folder sent before information related to the first file, which is sent before information related to the second folder.04-11-2013
20130091159Product Synthesis From Multiple Sources - Methods and systems for automatically synthesizing product information from multiple data sources into an on-line catalog are disclosed, and in particular, for automatically synthesizing the product information based on attribute-value pairs. Information for a product may be obtained, via entity extraction, feed ingestion, and other mechanisms, from a plurality of structured and unstructured data sources having different taxonomies and schemas. Product information may additionally or alternatively be obtained or derived based on popularity data. The product information may be cleansed, segmented and normalized. The product information may be clustered so closest products, attribute names and attribute values are associated. A representative value for an attribute name may be determined, and the on-line catalog may be updated so that entries are comprehensive, meaningful and useful to a catalog user. Updates from at least 500 million different data sources may be scheduled to occur as frequently as several times daily.04-11-2013
20130091199DATA COMMUNICATION COORDINATION WITH SEQUENCE NUMBERS - Described are sequence numbers for client-server communication, to control a client's use of server resources. A server grants the client credits, and the client consumes a credit for sending each command to the server. Each credit corresponds to a sequence number, with the set of sequence numbers forming a valid command window. The server enforces that for each received command, the command includes a sequence number that is within the valid command window and that the sequence number has not been used with another command. The server may also maintain a maximum window size, such that clients with credits cannot send a command with a sequence number that beyond a maximum sequence number. When incorporated into a data communication protocol, quality of service, combating denial of service, detection of message loss, division of server resources, secure message signing, and other numerous benefits result.04-11-2013
20130091451SYSTEM AND METHOD FOR VISUALLY BROWSING OF OPEN WINDOWS - A method referred to as visual window browsing allows a user to browse through windows on their desktop. Aspects of the invention include responsive to a command, moving open windows to form a visual stack with the topmost window in the stack being in focus. Responsive to a browse the windows in the visual stack can be browsed, where the topmost window moves to the bottom of the visual stack and the other windows move higher in the stack, with the second highest window becoming the topmost window and being in focus. Successive browse commands causes this behavior to repeat allowing a user to cycle through each of the open windows.04-11-2013
20130091471VISUAL SEARCH AND THREE-DIMENSIONAL RESULTS - Methods, systems, graphical user interfaces, and computer-readable media for visually searching and exploring a set of objects are provided. A computer system executes a method that generates three-dimensional representations or two-dimensional representations for a set of objects in response to a user interaction with an interface that displays the three-dimensional representations or the two-dimensional representations. The interface includes filter controls, sorting controls, and classification controls, which are dynamically altered based on the content of a user query or the attributes of the objects in the three-dimensional representations or two-dimensional representations.04-11-2013
20130093831Satellite Microphones for Improved Speaker Detection and Zoom - Architecture for exploiting satellite microphones and employing other techniques of conference room camera/microphone systems to significantly improve the true positive rate (reduce false positives) in sound source localization (SSL). Techniques for realizing the improvement include using an LED emitter to determine the precise location of the satellite microphones on a table, using the base SSL and external sounds to determine the approximate location of the satellite microphone on the table, using the satellite microphone phase to improve the SSL performance, using the satellite microphone amplitude to improve the active speaker detector (ASD) performance, and using the satellite microphones to estimate camera zoom.04-18-2013
20130095772COMPUTING DEVICE WITH CONFIGURABLE ANTENNA - A computing device with a configurable antenna. The antenna is configured through a switching circuit operating under software control. Operating characteristics of the antenna are configured based on connections between conducting segments established by the switching circuit, allowing the nominal frequency, bandwidth or other characteristics of the antenna to be configured. Because the switching is software controlled, the configurable antenna may be integrated with a software defined radio. The radio and antenna can be reconfigured to support communication according to different wireless technologies at different times or to interleave packets according to different wireless technologies to support concurrent sessions using different wireless technologies.04-18-2013
20130097022COMMERCIALLY SUBSIDIZED MOBILE COMMUNICATION DEVICES AND SERVICES - Mobile communication devices, such as mobile phones, may be capable of recommending to a user various providers of one or more solicited services, e.g., by identifying a user location and identifying providers near the user location that provide the services, and by initiating a call between the user and a selected provider. However, the equipment and service costs of such devices may be prohibitive, particularly for mid-range mobile communication devices that may appeal to cost-conscious users. The prohibitive costs may be diminished by redirecting part or all of the cost of providing the recommendation service from the providers, e.g., by charging the provider a service cost upon initiating a call from the user to the provider, or upon representing the provider in a provider database. In one such embodiment, all service costs may be borne by providers, providing to the user a free recommendation service via the mobile communication device.04-18-2013
20130097174Calculating Valence of Expressions within Documents for Searching a Document Index - Tools and techniques related to calculating valence of expressions within documents. These tools may provide methods that include receiving input documents for processing, and extracting expressions from the documents for valence analysis, with scope relationships occurring between terms contained in the expressions. The methods may calculate calculating valences of the expressions, based on the scope relationships between terms in the expressions.04-18-2013
20130097211DATA COMMUNICATION PROTOCOL - Described is a data communication protocol, in which a client and server negotiate in a manner that does not require the client to retry negotiation when servers are not capable of the client-desired protocol. In one example implementation, the desired protocol is SMB 2.0 or greater. The protocol describes a create command with possibly additional context data attached for built-in extensibility, and a compound command comprising a plurality of related commands or unrelated commands. A multi-channel command requests data transfer on a separate data channel, a signed capability verification may be used to ensure that a secure connection is established, and the protocol provides the ability to transfer extended error data from the server in response to a request.04-18-2013
20130097313WEB PAGE LOAD TIME PREDICTION AND SIMULATION - Embodiments of automated cloud service performance prediction are disclosed. The automated cloud service performance prediction includes extracting one or more dependency relationships for each web object in the webpage. The prediction further includes determining an original performance metric value and original timing information associated with a page loading of a webpage. The prediction also includes simulating a page loading of the webpage based on the adjusted timing information and the dependency relationships to estimate a new performance metric value associated with the simulated page loading of the webpage. The prediction additionally includes comparing the original performance metric value to the new performance metric value to determine whether the adjusted timing information increased or decreased the new performance metric value relative to the original performance metric value.04-18-2013
20130097424DISCOVERY OF SECURE NETWORK ENCLAVES - A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located.04-18-2013
20130097440EVENT SERVICE FOR LOCAL CLIENT APPLICATIONS THROUGH LOCAL SERVER - In server/client architectures, the server application and client applications are often developed in different languages and execute in different environments specialized for the different contexts of each application (e.g., low-level, performant, platform-specialized, and stateless instructions on the server, and high-level, flexible, platform-agnostic, and stateful languages on the client) and are often executed on different devices. Convergence of these environments (e.g., server-side JavaScript using Node.js) enables the provision of a server that services client applications executing on the same device. The local server may monitor local events occurring on the device, and may execute one or more server scripts associated with particular local events on behalf of local clients subscribing to the local event (e.g., via a subscription model). These techniques may enable development of local event services in the same language and environment as client applications, and the use of server-side code in the provision of local event service.04-18-2013
20130097499METHOD AND APPARATUS FOR PROVIDING PROCESS GUIDANCE - A context-sensitive process guidance system provides process guidance based on context data from a system used in performing the process. The system may be a work item tracking system or similar project management tool. Process guidance may provide information to a user performing actions related to a process. Context data may be derived from various sources, including the state of an application at the time of the request for process guidance, the user making the request and the role assigned to that user in the process, or the data displayed for the user who made the request. The context-sensitive process guidance system may display context-sensitive process guidance content and provide links to related process guidance content based on the context data.04-18-2013
20130097561SIMULTANEOUS INPUT ACROSS MULTIPLE APPLICATIONS - One or more users may interact simultaneously with different applications on the same device through an input system such as a touch-sensitive display screen. Simultaneous user input may be detected by a multiple input system and subsequently transmitted to an application using a single transmission frame. An application corresponding to the user input is determined based on an input location of the user input and a location and size of a corresponding application. Simultaneous user inputs are rendered simultaneously by each corresponding application. Each application may further include a secondary event processing thread that runs in parallel to traditional operating system event threads. The secondary event processing thread bypasses sequential processing limits of an operating system event thread, providing substantially simultaneous processing of input.04-18-2013
20130097690SECURITY AND SUPPORT FOR FLEXIBLE CONFERENCING TOPOLOGIES SPANNING PROXIES, FIREWALLS AND GATEWAYS - A method and system for setting up and managing secure data/audio/video conferences with a wide range of topologies is described. The disclosed method and system allow extending the range of topologies possible with the H.323 conferencing standards while overcoming T.120 negotiating constraints. Security in such conferences may be based on a trusted node system or on more complex security procedures. Furthermore, the taught conference topologies fully utilize the T.120 standards while also permitting the reach of the conferences to the extent enabled by the H.323 standards by implementing additional modules to manage the setting up and tearing down of one or more conference connections. In addition, the method and system allow for dynamically adjusting conference connections to improve bandwidth usage and utilize H.323 support for gatekeepers.04-18-2013
20130099917REDUCING PROCESSING RESOURCES INCURRED BY A USER INTERFACE - This document describes techniques and apparatuses for limiting processing resources incurred due to refreshing a user interface. In various embodiments, an event is received, and it is determined whether a delay time period has elapsed. A length of the delay time period is based on a timing of receipt of one or more previous events. If the delay time period has not elapsed, refreshing of the user interface is postponed. When the delay time period elapses, the user interface is refreshed to display an indication of the event.04-25-2013
20130100129Systems and Methods for Tracking a Model - An image such as a depth image of a scene may be received, observed, or captured by a device and a model of a user in the depth image may be generated. The background of a received depth image may be removed to isolate a human target in the received depth image. A model may then be adjusted to fit within the isolated human target in the received depth image. To adjust the model, a joint or a bone may be magnetized to the closest pixel of the isolated human target. The joint or the bone may then be refined such that the joint or the bone may be further adjusted to a pixel equidistant between two edges the body part of the isolated human target where the joint or bone may have been magnetized.04-25-2013
20130100818METHOD FOR DETERMINING PLACEMENT OF INTERNET TAPS IN WIRELESS NEIGHBORHOOD NETWORKS - Disclosed is a method for determining the placement of ITAPs in wireless neighborhood networks. The method disclosed provides for efficient integration of multi-hop wireless networks with the Internet by placing ITAPs at strategic locations. Initially the method provides for the formulation of the ITAP placement problem under three wireless models. For each model, methods are developed to efficiently place ITAPs in the networks. The methods aim to minimize the number of required ITAPs while guaranteeing users' bandwidth requirements. Next, a fault tolerance version of the placement method is presented that provides bandwidth guarantees in the presence of failures. Finally the methods are extended to take into account variable traffic demands by developing an approximation algorithm to simultaneously optimize ITAP placement based on demands over multiple periods.04-25-2013
20130100956ROUTING USING GLOBAL ADDRESS PAIRS - The present invention extends to methods, systems, and computer program products for routing using global address pairs. Embodiments of the invention use publicly routable Internet Protocol (“IP”) addresses to represent sites rather than individual hosts. Hosts can be represented by a global address pair, including site public IP address and a node private IP address. Nodes route packets to address processing modules using IP-in-IP encapsulation. An outer header contains a site public IP address and is destined to a site on inter-site links. An inner header contains a node private IP address and is destined to a private endpoint in intra-site links. In some embodiments, a site public IPv4 address and a node private IPv4 address are encoded into an IPv6 address. Use of an IPv6 address makes encoding of the two IPv4 address transparent to IPv6 applications.04-25-2013
20130101207Systems and Methods for Detecting a Tilt Angle from a Depth Image - A depth image of a scene may be received, observed, or captured by a device. A human target in the depth image may then be scanned for one or more body parts such as shoulders, hips, knees, or the like. A tilt angle may then be calculated based on the body parts. For example, a first portion of pixels associated with an upper body part such as the shoulders and a second portion of pixels associated with a lower body part such as a midpoint between the hips and knees may be selected. The tilt angle may then be calculated using the first and second portions of pixels.04-25-2013
20130102366Unlock Screen - Unlock screen and notification techniques are described. In an implementation, an unlock screen is displayed by a mobile communications device that indicates that the mobile communications device is locked. If an input is detected to remove the lock by dragging across a Y-axis of the display device, an animation is displayed that gives an appearance that the unlock screen is being removed and the lock on the mobile communications device is removed.04-25-2013
20130103659DISTRIBUTED TRANSACTION MANAGEMENT FOR DATABASE SYSTEMS WITH MULTIVERSIONING - The subject disclosure relates to a distributed transaction management technique that ensures synchronization between participating nodes in a global or distributed database transaction. The technique leverages a commit protocol that uses local clocks at the respective participating nodes. Participants in a global transaction are configured to utilize the same commit timestamp and logical read time and can advance their respective local clocks to establish this synchronization. In one embodiment, distributed commit utilizes a modified version of two-phase commit that includes an extra phase to collect commit timestamp votes from participants. Additionally, a heartbeat mechanism can be used to establish loose synchronization between nodes. In another embodiment, a node can respond to a remote transaction request by returning a list of nodes involved in generating the result of the transaction and the types of access used by such nodes in addition to the transaction result itself.04-25-2013
20130103699AUTOMATICALLY FINDING CONTEXTUALLY RELATED ITEMS OF A TASK - Architecture for enabling a user to automatically recover documents and other information associated with work contexts and recover documents and other information artifacts associated with a specific project. The architecture enables monitoring and recording of activity information related to user interactions with information artifacts pertaining to a particular work context. The user can select a document having a portion of work content (e.g., a term or other type of reference item in a document) related to the work context. A lexical analysis is performed on the activity information and the reference item to identify lexical similarities. A list of candidate items (e.g., related documents) is inferred from the information artifacts based on the lexical similarities. The candidate items related to the work context are presented to the user, who can select specific items to reestablish the work context.04-25-2013
20130103774TRANSPORT HIGH AVAILABILITY VIA ACKNOWLEDGE MANAGEMENT - Architecture that facilitates transport high availability for messaging services by providing the ability of a receiving entity (e.g., receiving message transfer agent (MTA)) to detect if a sending entity (e.g., sending MTA or client) is a legacy sending entity. When the receiving entity detects that the sending entity is a legacy system, by advertising transport high availability capability to the sending entity, if the sending entity does not opt-in to this capability, the receiving entity keeps the sending entity client “on hold”, that is, waiting for an acknowledgement (ACK) until the receiving entity delivers the message to the next hops (immediate destinations). This approach maintains at least two copies of the message until the message is successfully delivered (to the next hop(s)). Hence, if the legacy sending entity or the receiving entity fails, the message is still delivered successfully.04-25-2013
20130103809Logical Networks - An invention is provided for creating logical network abstractions of physical networks, and deploying computer services to physical networks based on a specified logical network. In an embodiment, a physical network is divided into one or more logical networks. Upon receiving an indication to deploy a computer service to a logical network, a mapping from that logical network to a sub-network of the physical network is determined, the service is configured to execute on the sub-network of the physical network, and an indication of this configuration of the service is stored.04-25-2013
20130103977FAULT TOLERANCE FOR TASKS USING STAGES TO MANAGE DEPENDENCIES - A high availability system has an application server communicatively coupled to one or more client machines through a network utilizing stateless communication sessions. The application server manages concurrent execution of tasks on multiple client machines. A task may be dependent on the execution of another task and the dependencies are managed through stages. The application server utilizes a fault tolerance methodology to determine a failure to any one of the components within the system and to perform remedial measures to preserve the integrity of the system.04-25-2013
20130104023MOBILE DATA AND HANDWRITING SCREEN CAPTURE AND FORWARDING - The claimed subject matter provides a system and/or a method that facilitates communicating data utilizing a portable device. An interface component can receive annotation data related to a display associated with a portable device. An annotation component can append a screen shot corresponding to the display with the annotated data to create an annotated screen shot.04-25-2013
20130104053TECHNIQUES TO SHARE MEDIA FILES THROUGH MESSAGING - Techniques to share media files through messaging are described. An apparatus may comprise a processor and a memory communicatively coupled to the processor. The memory may store a message application that when executed by the processor is operative to communicate a message and a message attachment comprising a media file at different time intervals using different transports. The message may have a link comprising a reference to a discoverable storage location for the media file. Other embodiments are described and claimed.04-25-2013
20130104075ARRANGING DISPLAY AREAS UTILIZING ENHANCED WINDOW STATES - Computer-readable media, computerized methods, and user interfaces (UIs) for manipulating display areas on a GUI workspace by transitioning the display areas from an original state to one of a set of enhanced window states are provided. Initially, an indication to resize a display area is received at an operating system, which consequently invokes an appropriate window state. The indication may include capturing an edge of the display area and vertically dragging the edge to a dock-target region, thereby invoking a vertically-maximized state. Accordingly, configuration settings of the vertically-maximized state are applied such that the display area is stretched to approximately the screen height. In another instance, the indication may include capturing the display area and dragging a display area into a dock-target region, thereby invoking a semi-maximized state. Configuration settings of the semi-maximized state are applied, thus, extending the display area to approximately cover a predefined GUI workspace region.04-25-2013
20130113821ASSIGNING COLOR VALUES TO PIXELS BASED ON OBJECT STRUCTURE - Systems and methods are provided for assigning color values to pixels based on object structure. For example, when rendering a writing system symbol on an electronic display, a non-color characteristic of the symbol can be measured and the measurement can be used to select a color value for a pixel associated with the symbol. Legibility of open and closed line-based graphical objects can be increased by inferring spatial depth and distance through application of a color assignment model.05-09-2013
20130114002Estimating Quality of a Video Signal - Method, device and computer program product for estimating quality of a video signal, wherein frames of the video signal are received at receiving means of the device, each frame comprising a plurality of blocks of pixels. A section of a first frame of the video signal, which is correctly received, is used to provide a concealed block for use in place of a block of a second frame of the video signal. A difference measure is determined indicative of a difference between at least some of the pixels surrounding the block in the second frame and the corresponding pixels surrounding the section in the first frame. The difference measure is used to estimate the quality of the second frame of the video signal.05-09-2013
20130114064SYSTEM ARCHITECTURE DESIGN FOR TIME-OF-FLIGHT SYSTEM HAVING REDUCED DIFFERENTIAL PIXEL SIZE, AND TIME-OF-FLIGHT SYSTEMS SO DESIGNED - Embodiments of the present invention provide methods to produce a high performance, feature rich TOF system, phase-based or otherwise using small TOF pixels, single-ended or preferably differential, as well as TOF systems so designed. IC chip area required for pixels is reduced by intelligently off-loading or removing from within the pixel certain components and/or functionality. In some embodiments during a single TOF system capture period, analog values from each pixel are repeatedly sampled and converted to digital values, which are combined and manipulated on the sensor chip. Combining this plurality of values enables appropriately compact data from the sensor chip. Embodiments of the present invention implement a TOF system with high ambient light resilience, high dynamic range, low motion blur and dealiasing support, while advantageously reducing pixel area size relative to prior art TOF pixels.05-09-2013
20130114741SIGNALING OF STATE INFORMATION FOR A DECODED PICTURE BUFFER AND REFERENCE PICTURE LISTS - Innovations for signaling state of a decoded picture buffer (“DPB”) and reference picture lists (“RPLs”). In example implementations, rather than rely on internal state of a decoder to manage and update DPB and RPLs, state information about the DPB and RPLs is explicitly signaled. This permits a decoder to determine which pictures are expected to be available for reference from the signaled state information. For example, an encoder determines state information that identifies which pictures are available for use as reference pictures (optionally considering feedback information from a decoder about which pictures are available). The encoder sets syntax elements that represent the state information. In doing so, the encoder sets identifying information for a long-term reference picture (“LTRP”), where the identifying information is a value of picture order count least significant bits for the LTRB. The encoder then outputs the syntax elements as part of a bitstream.05-09-2013
20130115879Connecting Mobile Devices via Interactive Input Medium - A mobile device connection system is provided. The system includes an input medium to detect a device position or location. An analysis component determines a device type and establishes a connection with the device. The input medium can include vision systems to detect device presence and location where connections are established via wireless technologies.05-09-2013
20130117220MULTI-MASTER TEXT SYNCHRONIZATION USING DELTAS - A server enforces a policy for selecting what received change to process. The non-selected changes are not processed by the server. Instead, after the selected change is processed and is incorporated into the current version of the text, the server sends an update to each of the clients indicating the change made to the current version of text. A client performs a conflict resolution procedure when its change was not processed by the server. The conflict resolution procedure detects the differences between the updated text version and its text change that was not accepted by the server and uses the differences to deduce the intent of the user and come up with a merged version of the text which preserves the intent and avoids data loss. The updated version is then sent back to the server to update the current version of the text.05-09-2013
20130117270CATEGORY-PREFIXED DATA BATCHING OF CODED MEDIA DATA IN MULTIPLE CATEGORIES - Innovations for category-prefixed data batching (“CPDB”) of entropy-coded data or other payload data for coded media data, as well as innovations for corresponding recovery of the entropy-coded data (or other payload data) formatted with CPDB. The CPDB can be used in conjunction with coding/decoding for video content, image content, audio content or another type of content. For example, after receiving coded media data in multiple categories from encoding units, a formatting tool formats payload data with CPDB, generating a batch prefix for a batch of the CPDB-formatted payload data. The batch prefix includes a category identifier and a data quantity indicator. The formatting tool outputs the CPDB-formatted payload data to a bitstream. At the decoder side, a formatting tool receives the CPDB-formatted payload data in a bitstream, recovers the payload data from the CPDB-formatted payload data, and outputs the payload data (e.g., to decoding units).05-09-2013
20130117361AUTOMATED CONTENT SUBMISSION TO A SHARE SITE - Methods, systems, and computer-readable media for remotely submitting content to a website without navigating to the website are provided. The website is a content-sharing website that accepts public content submissions and makes the content available to multiple users. Initially, a client application may download remote-content-submission instructions from the website. Subsequently, the client application may follow the instructions to format a remote content submission and communicate it to the website.05-09-2013
20130117419Mail Object Migration - A mail enabled object may be migrated from one hosting server to another by using a temporary buffer that may capture incoming mail during the migration operation. A new mail enabled object may be created and enabled on a target server, and the old mail object may be disabled and forwarded to a buffer that may collect incoming messages. While the buffer receives incoming messages, the contents of the old mail object may be copied to the new mail object. After verifying the transfer of the contents, the buffer may be released to forward any collected messages to the new mail object. The old mail object may then be cleaned up. The migration may be performed from one server to another, from one forest to another, and to and from a remotely hosted messaging service.05-09-2013
20130117446ADDRESS MANAGEMENT IN A CONNECTIVITY PLATFORM - Disclosed are an approach form managing and assigning addresses in a connectivity platform that allows for proprietary connectivity modules (Providers) to plug into the operating system. In this disclosure, when a user/application/computing device, connects to another user on another computing device an address is generated for that user. However, because of a limited number of addresses that are available in an address space, it is necessary to ensure that a conflicting address is not present. To ensure this the connectivity platform determines if the address assigned is in conflict with another address associated with users that are located on the other computing devices. If an address is found to be in conflict the connectivity platform reassigns the address until a non-conflicting address is found. If a non-conflicting address cannot be found the connectivity platform blocks the connection between the user and the other user.05-09-2013
20130117792ADAPTIVE VIDEO SWITCHING FOR VARIABLE NETWORK CONDITIONS - A method for video playback switching in response to changing network conditions. The method includes accessing a server to retrieve respective index files for a low bit rate version and a high bit rate version of the video file, and instantiating a low bit rate media player and a high bit rate media. Playback of the video file is begun by the high bit rate media player streaming the high bit rate version from the server. Upon an indication of impeded network conditions, a transition point is selected, wherein the transition point indicates where downloading of the high bit rate version stops and where downloading of the low bit rate version begins. The low bit rate media player is then positioned to begin playback at the transition point. Playback of the video file is then switched to the low bit rate player upon encountering the transition point.05-09-2013
20130120244Hand-Location Post-Process Refinement In A Tracking System - A tracking system having a depth camera tracks a user's body in a physical space and derives a model of the body, including an initial estimate of a hand position. Temporal smoothing is performed in which some latency is imposed when the initial estimate moves by less than a threshold level from frame to frame, while little or no latency is imposed when the movement is more than the threshold. The smoothed estimate is used to define a local volume for searching for a hand extremity to define a new hand position. Another process generates stabilized upper body points that can be used as reliable reference positions, such as by detecting and accounting for occlusions. The upper body points and a prior estimated hand position are used to define an arm vector. A search is made along the vector to detect a hand extremity to define a new hand position.05-16-2013
20130122814GESTURING TO SELECT AND CONFIGURE DEVICE COMMUNICATION - Described is a technology by which a gesture made with a source device (e.g., a cellular telephone), such as a throwing or pointing motion, is used to automatically set up a connection with another device to which the gesture is directed. Audio signals output during the gesture, e.g., such as at the start and end of the gesture, are detected by candidate (listening) devices. The device having the least time difference between detection of the start and end signals is the device that is generally best aligned with the throwing or pointing motion, and thus may be selected as the target device. Once selected, a connection such as a network connection may be set up between the source device and the target device for further communication, such as for application data exchange.05-16-2013
20130122875LOCATION-BASED AND GROUP-BASED OPERATIONS ON A DATA PROCESSING DEVICE - A system and method are described for location-based and group-based operations on a data processing device. For example, a computer-implemented method according to one embodiment of the invention comprises: establishing a group containing identities of a plurality of users within the group and notification data indicating when other users are to be notified about current locations of the users in the group; determining whether wireless data processing devices of two or more users of the group are at the same location or within a particular distance of the location; identifying the users and the location; and notifying other users in the group of the identity of the users and the location.05-16-2013
20130124074SELECTIVE EXCHANGE OF VEHICLE OPERATIONAL DATA - Velocity information can be beneficial to various entities including other vehicles and a central traffic monitoring and routing system. Vehicles with sensors can serve as velocity probes to update speeds that are shared via a more global service. However, individuals may be reluctant to provide location and velocity information given privacy preferences. Local policies about sharing personal data are described that can be harnessed to enhance privacy while minimizing communication costs. The local data-sharing policies allow devices to monitor their own speeds and locations and to employ models and analyses that determine the value of sharing flow information with a larger service in accordance with privacy preferences, and to make local decisions as to when to respond to broadcasted queries for specific information, while minimizing the redundancy of signals from multiple vehicles.05-16-2013
20130124481UPGRADE OF HIGHLY AVAILABLE FARM SERVER GROUPS - A machine manager controls the deployment and management of machines (physical and virtual) for an online service. Multi-tier server groups are arranged in farms that each may include different configurations. For example, their may be content farms, federated services farms and SQL farms that are arranged to perform operations for the online service. When the multiple farms are upgraded, new farms are deployed and the associated content databases from the old farms are moved to the newly deployed farms. During the upgrade of the farms, requests may continue to be processed by the farms. The farms may be automatically load balanced during an upgrade. As content becomes available on the new farm, requests for the content may be automatically redirected to the new farm.05-16-2013
20130124697OPTIMIZED CLIENT SIDE RATE CONTROL AND INDEXED FILE LAYOUT FOR STREAMING MEDIA - An indexed file layout, comprising index information, is defined for segmented streaming of multimedia content. The index information can comprise program description information and streaming segment index information. In addition, the layout can comprise files containing streaming segments of the program, where the streaming segments are each encoded at one or more bitrates independently of other streaming segments of the program. The layout supports client switching between different bitrates at segment boundaries. Optimized client-side rate control of streaming content can be provided by defining a plurality of states, selecting available paths based on constraint conditions, and selecting a best path through the states (e.g., based on a distortion measure). In one client-side rate control solution states correspond to a specific bitrate of a specific streaming segment, and in another client-side rate control solution states correspond to a measure of client buffer fullness.05-16-2013
20130124748MEDIA STREAMING WITH ENHANCED SEEK OPERATION - The present disclosure relates to playback of video/audio streaming media data. The media stream is available from the network at multiple bit rates. When a seek operation is performed, a playback device requests a lower bit rate media stream in order to quickly fill a playback buffer so that playback can commence more readily. After a seek start-up period is complete, the playback device can return to downloading the media stream associated with higher bit rates in order to increase the quality of the playback.05-16-2013
20130124811DYNAMIC STORAGE HIERARCHY MANAGEMENT - A data block may be moved between a first medium and a second medium. The movement of the data block involves measuring the access characteristic of the data block as the data block is stored on the first medium. The performance characteristics of the first medium and the second medium are then determined, in which each performance characteristic has a static performance characteristic component and a dynamic performance characteristic component. Alternatively or concurrently, the static performance characteristic components of the first medium and the second medium may be compared, and the dynamic performance characteristic components of the first medium and the second medium are compared. Accordingly, the data block is moved from the first medium to the second medium when at least one of these comparisons indicate that the second medium is more suitable for storing the data block having the access characteristic than the first medium.05-16-2013
20130125142SYSTEM AND METHOD FOR OPTIMIZING USER NOTIFICATIONS FOR SMALL COMPUTER DEVICES - A system and method for notifying users in a manner that is appropriate for the event and the environment for the user. The method of the present invention relates to determining the desired properties of an event and assigning varying notification characteristics to that event. Profiles are created of the various events, wherein each profile relates to a different mode or situational environment, such as a meeting environment, an office or normal environment, a louder outside-type environment, etc. The invention further relates to placing the small computer device in a particular mode, either automatically or manually. Once in a particular mode the device provides notifications according to that mode.05-16-2013
20130125144Device Display Object Infrastructure - Multi-function devices expose multiple functions to device drivers or other lower-level software. Device function providers can interface with such drivers or lower-level software and can provide information, including device identifiers regarding such functions, to a device display object infrastructure. A device display object can then be created that encompasses one or more functions such that, in one embodiment, the device display object corresponds to a single, physical multi-function device. Alternatively, any combination of functionality from one or more physical devices can be combined into a single device display object representing a virtual multi-function device. Properties of the device display object can be set with reference to user-specified settings, remotely maintained metadata, locally available metadata, and information associated with each function. Functions can be ranked such that, if there is a conflict, information from more highly ranked functions is used to set the properties of the device display object.05-16-2013
20130125215REMOTE APPLICATION PRESENTATION OVER A PUBLIC NETWORK CONNECTION - Web access over a public network for applications that operate on virtual desktops on a plurality of servers is facilitated. Through the web access the user is provided with the information necessary to establish a connection with an application by way of the virtual desktop. Applications that the user is authorized to access are determined and those applications that the user is not authorized to access are filtered out. The applications associated access control list is used for determining the user's access to discover an application.05-16-2013
20130125237OFFLINE EXTRACTION OF CONFIGURATION DATA - A configuration scanning system is described herein that scans a system configuration database for malware-related information with less impact on other operations that access the system configuration database. The system employs techniques to reduce the impact on other operations that access the configuration database, including parsing a file-based stored version of the configuration database, accessing the configuration database using opportunistic locking, and caching configuration information obtained by scanning the configuration database. In this way, the system is able to respond to requests antimalware programs using cached information without impacting other programs using the configuration database. Thus, the configuration scanning system protects a computer system against malware while reducing the burden on the configuration database and on other programs that access the configuration database.05-16-2013
20130125243METHOD FOR PREVENTING SOFTWARE REVERSE ENGINEERING, UNAUTHORIZED MODIFICATION, AND RUNTIME DATA INTERCEPTION - A method for preventing the unauthorized modification of a software or unauthorized modification of runtime data. According to this method, a converter, which is capable of converting the software into a generalized machine code is provided. The converter is designed such that it cannot he reverse engineered, by using a conversion process that causes data loss. An interpreter, which the knowledge of its process method is kept restricted, is also provided. The interpreter interprets the general machine code into a specific machine code, while reconstructing the lost data during the interpretation process.05-16-2013
20130125249Remote Access Control Of Storage Devices - An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storage device. Alternatively, the access control device can comprise information to establish a secure connection to an authorization computing device and the access control device can implement the decisions of the authorization computing device. The access control device can control access by instructing a storage device to execute specific firmware instructions to prevent meaningful responses to data storage related requests. The access control device can also comprise storage-related cryptographic information utilized by the storage device to encrypt and decrypt data. In such a case, the access control device can control access by not releasing the storage-related cryptographic information to the storage device.05-16-2013
20130128793SIGNALING OVER CELLULAR NETWORKS TO REDUCE THE WI-FI ENERGY CONSUMPTION OF MOBILE DEVICES - Techniques for increasing the battery life on a mobile device by decreasing the energy consumption of the mobile device's wireless fidelity (Wi-Fi) interface are described. In one embodiment, the mobile device's Wi-Fi interface is automatically disabled when the device is not engaged. When the device receives a wake up call from a server via its Cellular interface, the Wi-Fi interface is enabled if the device answers the wake up call and the Wi-Fi interface is available. Using its Wi-Fi interface, the mobile device then connects to an IP-based network via a Wi-Fi access point.05-23-2013
20130129101MULTICHANNEL ACOUSTIC ECHO REDUCTION - A multichannel acoustic echo reduction system is described herein. The system includes an acoustic echo canceller (AEC) component having a fixed filter for each respective combination of loudspeaker and microphone signals and having an adaptive filter for each microphone signal. For each microphone signal, the AEC component modifies the microphone signal to reduce contributions from the outputs of the loudspeakers based at least in part on the respective adaptive filter associated with the microphone signal and the set of fixed filters associated with the respective microphone signal.05-23-2013
20130129155MOTION DETECTION USING DEPTH IMAGES - A sensor system creates a sequence of depth images that are used to detect and track motion of objects within range of the sensor system. A reference image is created and updated based on a moving average (or other function) of a set of depth images. A new depth images is compared to the reference image to create a motion image, which is an image file (or other data structure) with data representing motion. The new depth image is also used to update the reference image. The data in the motion image is grouped and associated with one or more objects being tracked. The tracking of the objects is updated by the grouped data in the motion image. The new positions of the objects are used to update an application.05-23-2013
20130129169Body scan - A depth image of a scene may be received, observed, or captured by a device. The depth image may then be analyzed to determine whether the depth image includes a human target. For example, the depth image may include one or more targets including a human target and non-human targets. Each of the targets may be flood filled and compared to a pattern to determine whether the target may be a human target. If one or more of the targets in the depth image includes a human target, the human target may be scanned. A skeletal model of the human target may then be generated based on the scan.05-23-2013
20130129227Environment and/or Target Segmentation - A depth image of a scene may be observed or captured by a capture device. The depth image may include a human target and an environment. One or more pixels of the depth image may be analyzed to determine whether the pixels in the depth image are associated with the environment of the depth image. The one or more pixels associated with the environment may then be discarded to isolate the human target and the depth image with the isolated human target may be processed.05-23-2013
20130129321RECORDING OF TELEVISION PROGRAMMING - A video recording system that controls recording of television programming relating to sporting events to better match the intent of a user who specified programming for recording. The system merges data from an electronic program guide and sports data, such as from a news feed, to determine values of recording parameters, such as start and stop time and channel. User input may specify a player, team, league or other sports entity for which sporting events are to be recorded. The system may use the sports data to identify sporting events involving the specified sports entity and then access an electronic program guide to determine a channel on which to record the sporting events. When the user specifies a sporting event to record, sports data may be used to track progress of the event and dynamically adjust an ending time of the recording to ensure that the full event is recorded.05-23-2013
20130132083GENERIC FRAMEWORK FOR LARGE-MARGIN MCE TRAINING IN SPEECH RECOGNITION - A method and apparatus for training an acoustic model are disclosed. A training corpus is accessed and converted into an initial acoustic model. Scores are calculated for a correct class and competitive classes, respectively, for each token given the initial acoustic model. Also, a sample-adaptive window bandwidth is calculated for each training token. From the calculated scores and the sample-adaptive window bandwidth values, loss values are calculated based on a loss function. The loss function, which may be derived from a Bayesian risk minimization viewpoint, can include a margin value that moves a decision boundary such that token-to-boundary distances for correct tokens that are near the decision boundary are maximized. The margin can either be a fixed margin or can vary monotonically as a function of algorithm iterations. The acoustic model is updated based on the calculated loss values. This process can be repeated until an empirical convergence is met.05-23-2013
20130132493DATA SYNCHRONIZATION AND SHARING RELATIONSHIPS - Systems and methods for synchronizing and sharing data associated with sharing relationships are disclosed. Such systems and methods may be implemented by interfacing with an application that manages or accesses the data to be shared, and by making shared data available using a feed along with some mechanism for tracking changes or enabling synchronization between different endpoints.05-23-2013
20130132586Selective Connection Between Corresponding Communication Components Involved in a Teleconference - A client device selectively establishes connections between selected client communication components and corresponding server communication components. The client device receives data from the corresponding server communication components via the connections between the selected client communication components and the server communication components. The data received via different ones of the connections is associated with a different content stream of a teleconference. During the teleconference, a given connection is suspended. When the given connection is suspended, the client computing device continues to receive data via connections other than the given connection.05-23-2013
20130132844EXAMPLE BASED VIDEO EDITING - Enabling creation of a user-specific storyboard style based on a storyboard edited by a user. Metadata defined by analyzing the editing decisions made by the user and the media content associated with the storyboard represents the user-specific style. The user-specific style may be applied to other media content to produce a fully edited storyboard that matches the style of the example storyboard from which the user-specific style was created. The produced storyboard is combined with the other media content to produce audio/video data for consumption by the user.05-23-2013
20130132928WORKFLOW SCHEDULE AUTHORIZING TOOL - A workflow schedule authoring tool enables a user to author a workflow by arranging building blocks in a particular order. Building blocks may correspond to events, conditions or actions. Each building block is associated with source code that defines an action to be taken when the building block is processed. The order of the building blocks determines the workflow schedule process. The building blocks allow a user to establish logic conditions for how the tasks in the workflow schedule are executed. A building block may require a user to input parameters before the building block may be executed. The workflow schedule is associated with an event such that the workflow schedule triggers when the event occurs. The building blocks simplify workflow schedule authoring because the user does not need to write any code.05-23-2013
20130132965STATUS TOOL TO EXPOSE METADATA READ AND WRITE QUEUES - A method to expose status information is provided. The status information is associated with metadata extracted from multimedia files and stored in a metadata database. The metadata information that is extracted from the multimedia files is stored in a read queue to allow a background thread to process the metadata and populate the metadata database. Additionally, the metadata database may be updated to include user-define metadata, which is written back to the multimedia files. The user-defined metadata is included in a write queue and is written to the multimedia files associated with the user-defined metadata. The status of the read and write queues are exposed to a user through a graphical user interface. The status may include the list of multimedia files included in the read and write queues, the priorities of each multimedia file, and the number of remaining multimedia files.05-23-2013
20130133006ANIMATED STATION IDENTIFIER IN PROGRAM GUIDES - A television program guide is displayed having a station identifier portion in a first location. A determination is made as to when a user navigates in the television program guide between past programs and future programs. In response to the user navigating in the television program guide between the past programs and the future programs, the station identifier portion is changed to a second location.05-23-2013
20130133046SEARCH SERVICE ADMINISTRATION WEB SERVICE PROTOCOL - The embodiments described herein generally relate to a method and system for enabling a client to configure and control the crawling function available through a crawl configuration Web service. A client is able to configure and control the crawling function by defining the URL space of the crawl. Such space may be defined by configuring the starting point(s) and other properties of the crawl. The client further configures the crawling function by creating and configuring a content source and/or a crawl rule. Further, a client defines authentication information applicable to the crawl to enable the discovery and retrieval of electronic documents requiring authentication and/or authorization information for access thereof. A protocol governs the format, structure and syntax (using a Web Services Description Language schema) of messages for communicating to and from the Web crawler through an application programming interface on a server hosting the crawler application.05-23-2013
20130136089Providing Notifications of Call-Related Services - A first near-end terminal is able to conduct voice or video calls with at least one far-end terminal via a packet-based communication system, the first near-end terminal being a mobile user terminal of a near-end user. The first near-end terminal is enabled to discover proximity of at least one second near-end terminal available to provide a resource for use by the near-end user in conjunction with the first near-end terminal when conducting one of said calls, the resource being for use in conducting at least part of the call or in conjunction with the call. The first near-end terminal is also arranged, based on discovering said proximity, to present the near-end user with a message indicating the availability of the second near-end terminal to provide the resource when conducting the call.05-30-2013
20130136133DISTRIBUTED VIRTUAL NETWORK GATEWAYS - Computerized methods, systems, and computer-readable media are provided for distributing virtualized gateway functionality to multiple nodes within a physical network. Initially, drivers that carry out the gateway functionality are provisioned to cooperate with endpoints instantiated on the network nodes, while a directory service is implemented to maintain a mapping between virtual internet protocol (IP) addresses and location-dependent addresses, as well as a table enumerating transformation actions according to known pathways connecting the endpoints within a network. In operation, the directory service replies to requests from the driver (carrying source and destination IP addresses of data packets) with the appropriate location-dependent addresses (utilizing the mapping) and the appropriate transformation action(s) (utilizing the table). The transformation action(s) include rewriting headers of the data packets to include the location-dependent addresses, encapsulating the data packets as inner data packets within respective outer data packets, or configuring the data packets with a tunneling protocol.05-30-2013
20130136359SEGMENTATION OF TEXTUAL LINES IN AN IMAGE THAT INCLUDE WESTERN CHARACTERS AND HIEROGLYPHIC CHARACTERS - An image processing apparatus segments Western and hieroglyphic portions of textual lines. The apparatus includes an input component that receives an input image having at least one textual line. The apparatus also includes an inter-character break identifier component that identifies candidate inter-character breaks along a textual line and an inter-character break classifier component. The inter-character break classifier component classifies each of the candidate inter-character breaks as an actual break, a non-break or an indeterminate break based at least in part on the geometrical properties of each respective candidate inter-character break and the bounding boxes adjacent thereto. A character recognition component recognizes the candidate characters based at least in part on a feature set extracted from each respective candidate character that can be histogram features, Gabor features or any other feature set applicable to character recognition. A Western and hieroglyphic text classifier component finds and classifies textual line segments as Western text segments or hieroglyphic text segments and further passes the recognition results to an output component.05-30-2013
20130138609CROSS-POLINATION SYNCHRONIZATION OF DATA - A technique and mechanism to effect cross-pollination synchronization of PIM (personal information manager) data to multiple sources. Additionally, a novel feature of the subject invention is the ability to effect cross-pollination synchronization with any number of devices and sources in a network. The invention provides for a user to employ a mobile device or set of devices as a central repository for PIM data (e.g., calendar, contacts and tasks) synchronized from multiple sources (e.g., multiple PC's (personal computers), an exchange server). The invention provides for synchronization of PIM data from multiple types of server sources to multiple devices regardless of the synchronization protocol versions and different schemas.05-30-2013
20130138617DE-DUPLICATION IN BILLING SYSTEM - A computing system partitions received events into a number of channels by account identifier. The channels receive the events and perform de-duplication of the events. This de-duplication can be performed with a filter that is updated to reflect the receipt of any original event. The filter may be used to either determine that the event is not a duplicate of another, or to determine that the event cannot be ruled out as being a duplicate of another. In the latter case, further processing may be performed to for definitively determine whether the event is truly a duplication, or in the alternative, the event may be immediately treated as a duplicate.05-30-2013
20130138730AUTOMATED CLIENT/SERVER OPERATION PARTITIONING - An operation (such as a relational query) may be processed on a processing engine (such as a relational database server) on behalf of a client. A conventional processing involves the delivery of the operation to the processing engine, which executes the entire operation to completion and returns a result data set. It may be more efficient to allocate part of the operation to be performed on the client, but a developer may be unable or unavailable to rewrite the operation in a distributed manner. Instead, the operation may be automatically partitioned into a pre-engine client portion, a processing engine portion, and a client portion, and the instructions of each portion may be automatically allocated respectively to the client, the server, and the client. The partitioning may be adjusted to conserve computing resources, such as bandwidth and storage, and the instructions may be reordered to improve the processing of the operation.05-30-2013
20130138731AUTOMATED CLIENT/SERVER OPERATION PARTITIONING - An operation (such as a relational query) may be processed on a processing engine (such as a relational database server) on behalf of a client. A conventional processing involves the delivery of the operation to the processing engine, which executes the entire operation to completion and returns a result data set. It may be more efficient to allocate part of the operation to be performed on the client, but a developer may be unable or unavailable to rewrite the operation in a distributed manner. Instead, the operation may be automatically partitioned into a pre-engine client portion, a processing engine portion, and a client portion, and the instructions of each portion may be automatically allocated respectively to the client, the server, and the client. The partitioning may be adjusted to conserve computing resources, such as bandwidth and storage, and the instructions may be reordered to improve the processing of the operation.05-30-2013
20130138740ACTIVE SPEAKER IDENTIFICATION - Procedures for identifying clients in an audio event are described. In an example, a media server may order clients providing audio based on the input level. An identifier may be associated with the client for identifying the client providing input within the event. The ordered clients may be included in a list which may be inserted into a packet header carrying the audio content.05-30-2013
20130138751ROLE-INDEPENDENT CONTEXT EXCHANGE - Technologies for conversations between various parties, the conversations including context information that can be persisted to maintain the conversation when the parties or the communications media they communicate over operate intermittently. In such a conversation, any party can embed its view of the context into a message and any party can send the next message regardless of role and regardless of the underlying network, transport, or application message exchange pattern. Such technologies provide for durable services.05-30-2013
20130138784ROLE BASED SERVER INSTALLATION AND CONFIGURATION - The described systems and methods are directed at configuring a server based on a selected role. An installation application is configured to install core components in a server where these core components enable the server to perform the basic functions of a network computing device. A role management application is configured to enable a system administrator to select a role for the server and to automatically determine software components associated with the selected role. The role management application is then configured to build the software components and install the components on the server. The role management application is further configured to configure the components for the selected role. The automated installation process performed by the role management application enables a server to be efficiently configured for a particular role without installing other unnecessary components unrelated to the role.05-30-2013
20130138935AUTOMATICALLY STARTING SERVERS AT LOW TEMPERATURES - This document describes various techniques for automatically starting servers at low temperatures. A server may be powered on into a heating mode responsive to determining that a temperature of the server is below an operational temperature range. The server may then be restarted when the temperature of the server has increased to a temperature that is within the operational temperature range.05-30-2013
20130139011PREDICTING DEGRADATION OF A COMMUNICATION CHANNEL BELOW A THRESHOLD BASED ON DATA TRANSMISSION ERRORS - Applicants have discovered that error detection techniques, such as Forward Error Correction techniques, may be used to predict the degradation below a certain threshold of an ability to accurately convey information on a communication channel, for example, to predict a failure of the communication channel. In response, transmission and/or reception of information on the channel may be adapted, for example, to prevent the degradation below the threshold, e.g., prevent channel failure. Predicting the degradation may be based, at least in part, on data transmission error information corresponding to one or more blocks of information received on the channel and may include determining an error rate pattern over time. Based on these determinations, the degradation below the threshold may be predicted and the transmission and/or reception adapted. Adapting may include initiating use of a different error encoding scheme and/or using an additional communication channel to convey information.05-30-2013
20130139151Streaming Optimized Virtual Application Images - Embodiments provide an optimized virtual application or suite of virtual applications, but are not so limited. In an embodiment, components of a system are configured to generate an optimized virtual package that can be used in a virtual application streaming environment. Components of the system can provide bits of the optimized virtual package based in part on scenario mappings associated with a user action and/or an application or application feature. In one embodiment, a client virtualization handler can operate to download byte ranges of an optimized virtual package including re-prioritizing byte range download operations as part of streaming virtual application functionality over a computing network.05-30-2013
20130141436Hybrid Image Format - Hybrid image format techniques are described in which multiple resolution images are concatenated to a standard bitmap image to create a hybrid image file. The hybrid image file is created through combining a relatively low resolution image with the additional images in a multi-frame format having higher resolution. The hybrid image file may contain data detectable to signal that higher resolution images are available in the hybrid image file. A hybrid aware application may be configured to detect and output a higher resolution image from the hybrid image file based on detection of the data. A legacy application that is not configured to detect the data may be unaware of higher resolution images contained in the hybrid image file, and accordingly outputs the relatively low resolution image.06-06-2013
20130142086METHOD AND SYSTEM FOR DATA TRANSMISSION - A method, system and program for transmitting a data stream in a network of interconnectable end-user nodes comprising a source node, a plurality of recipient nodes and a plurality of further nodes, wherein each end-user node executes a communication client application. The method comprises: the source receiving a command to transmit the data stream to the plurality of recipients; selecting from the plurality of further nodes at least one relaying node to relay the data stream between the source node and the plurality of recipients; the source establishing a connection to the at least one relaying node; the at least one relaying node establishing a connection to each of the plurality of recipients; transmitting the data stream from the source to the at least one relaying node; and transmitting the data stream from the at least one relaying node to the plurality of recipients.06-06-2013
20130142188WIRELESS NETWORK HOST IN SILENT MODE - An access point that implements operating modes in which beacons may be selectively disabled. Beacons may be disabled when no device is actively associated through the access point. Beacons may be enabled in response to one or more triggers, which may include events such as a client forming an association through the access point following a probe request message identifying the access point. In addition, active beaconing may be triggered by user input or may occur during periodic brief intervals that allow client devices to discover the network identifier for the access point. Selective control of beaconing may lead to more effective wireless communication, particularly in areas where users congregate with computers implementing soft APs for personal networks.06-06-2013
20130142201CONNECTING ON-PREMISE NETWORKS WITH PUBLIC CLOUDS - A computer system for encapsulating a packet between a customer premise for delivery to customer resources within a public cloud data center. The computer system comprises a shim gateway. The shim gateway comprises a plurality of customer specific shim components. The shim gateway is configured to receive a packet from a customer premise. The packet has a VLAN tag. The packet identifies a tenant within a designated virtual network for the customer. The designated virtual network is within the public cloud data center. The shim gateway is further configured to encapsulate the packet into an encapsulated packet. Encapsulation includes mapping the VLAN tag to a destination network address of a tenant gateway for the customer. The tenant gateway is in the designated virtual network. The shim gateway is further configured to forward the encapsulated packet to the tenant gateway in the designated virtual network for delivery to the identified tenant.06-06-2013
20130142427CLASSIFICATION AND ENCODER SELECTION BASED ON CONTENT - In various embodiments, methods and systems are disclosed for dynamic runtime implementation and end-to-end biased tuning of a two stage image classification system based on a decision function that uses network packet sizes and multiple image characteristics to determine the selection of an encoding codec to reduce overall network bandwidth consumption.06-06-2013
20130143662CONTROLLER NOTIFICATION SYSTEM - A method of associating a controller to a console comprises, at the controller, establishing a connection with the console such that the controller is assigned to one of a plurality of different ports of the console over which different controllers may separately communicate with the console. A visual indication is then provided on the controller to indicate to the user of the controller which one of the plurality of different ports of the console has been assigned to the controller and over which the controller communicates with the console.06-06-2013
20130144524DOUBLE-HUB INDEXING IN LOCATION SERVICES - Techniques using double-hub indexing are provided that can provide efficient solutions to location-based services that depend on two query points. Such services include point of interest (POI) prediction, best via point, and ride sharing. Double-hub indexing builds on the hub labels (HL) algorithm for computing shortest paths on road networks. It associates two labels (forward and backward) to each vertex v in the network. Each label comprises a set of hubs (other vertices), together with the distances between these hubs and v. The set of labels have a cover property that for any two vertices s and t, their labels intersect in at least one hub that is on the shortest s-t path.06-06-2013
20130144600ADAPTIVE PATTERN LEARNING FOR BILINGUAL DATA MINING - Embodiments for the adaptive learning of translation layout patterns to mine bilingual data are disclosed. In accordance with at least one embodiment, the adaptive learning of patterns to mine bilingual data includes processing a bilingual web page into a plurality bilingual snippet pairs. The embodiment also includes determining one or more best fit candidate patterns based on the plurality of translation snippets. The embodiment additionally includes mining one or more translation pairs from the bilingual web page using the one or more best fit candidate patterns. The translation pairs are further stored in a data storage. The one or more translation pairs including at least one of a term pair, a phrase pair, or a sentence pair.06-06-2013
20130144630MULTI-CHANNEL AUDIO ENCODING AND DECODING - An audio encoder and decoder use architectures and techniques that improve the efficiency of multi-channel audio coding and decoding. The described strategies include various techniques and tools, which can be used in combination or independently. For example, an audio encoder performs a pre-processing multi-channel transform on multi-channel audio data, varying the transform so as to control quality. The encoder groups multiple windows from different channels into one or more tiles and outputs tile configuration information, which allows the encoder to isolate transients that appear in a particular channel with small windows, but use large windows in other channels. Using a variety of techniques, the encoder performs flexible multi-channel transforms that effectively take advantage of inter-channel correlation. An audio decoder performs corresponding processing and decoding. In addition, the decoder performs a post-processing multi-channel transform for any of multiple different purposes.06-06-2013
20130144849DELTA COMPRESSION USING MULTIPLE POINTERS - Encoding a new version of a data module includes constructing a delta data module having data for providing the new version of the data module. The delta data module may indicate an encoding for copying data at an offset from one of a number of pointers into different versions of the data module. Decoding a delta data module to provide a new version of a data module includes copying, to the new version of the data module, data relative to a target pointer when an encoding in the delta data module indicates a matching pattern relative to the target pointer, and copying, to the new version of the data module, data relative to at least one other pointer when an encoding in the delta data module indicates a matching pattern relative to the at least one other pointer.06-06-2013
20130144965SUSTAINING SESSION CONNECTIONS - In an embodiment, techniques for sustaining session connections are provided. The techniques send heartbeat messages when not sending a message may cause the session connection to close because of a timeout condition. Heartbeat messages are valid transport layer messages that will be ignored by protocols at higher levels of a data communications stack. As an example, the techniques may send a TCP message containing only a carriage return and line feed (“CRLF”) in its payload. Because the TCP layer considers a message containing only a CRLF to be a valid TCP message, intermediary computing devices such as proxy servers may not interpret heartbeat messages as “keep alive” messages, and may sustain session connections.06-06-2013
20130145043MAPPING NETWORK ADDRESSES TO GEOGRAPHICAL LOCATIONS - A network address mapping system is described. The network address mapping system can identify a set of Web pages, collects information from the Web pages indicating geographical locations (“geolocations”), and correlate the geolocations with the network addresses from which the identified Web pages are served. The collected information can be weighted based on various factors, such as its relative position in a Web page. The collected information can then be used to identify a geolocation. The network mapping system can deduce geolocations for portions of ranges of network addresses based on the score, and can infer geolocations for other portions based on the deduced geolocations. This mapping can then be stored in a database and provided as a geomapping service. The network address mapping system is able to map network addresses to geographical locations. Thereafter, when a user's client computing device accesses a Web server, the Web server can easily and accurately determine a geographical location by querying the database storing the mapping or a geomapping service.06-06-2013
20130145069HARDWARE CONTROL INTERFACE FOR IEEE STANDARD 802.11 - A standardized 802.11 hardware control interface may be provided such that a driver may communicate with any one or more of a variety of network adapters.06-06-2013
20130145136HANDLING EXCEPTIONS IN A DATA PARALLEL SYSTEM - A method of handling exceptions in a data parallel system includes forwarding exceptions thrown by concurrent worker tasks to a coordination task. The thrown exceptions are aggregated into an aggregation exception structure. It is determined whether the aggregation exception structure will be handled by an exception handler. The concurrent worker tasks are unwound when it is determined that the aggregation exception structure will be handled.06-06-2013
20130145178PORTABLE SECURE DATA FILES - A portable secure data file includes an encrypted data portion and a metadata portion. When a request associated with a current user of a device to access a portable secure data file is received, one or more records in the metadata portion are accessed to determine whether the current user is permitted to access the file data in the encrypted data portion. If a record indicates the user is permitted to access the file data, a content encryption key in that record is used to decrypt the encrypted data portion.06-06-2013
20130145179Corralling Virtual Machines With Encryption Keys - A virtual machine comprises a unique identifier that is associated with one or more encryption keys. A management server encrypts the virtual machine's virtual hard disk(s) using the one or more associated encryption keys. The management server further provides the one or more encryption keys to a limited number of one or more servers in a system. Only those one or more servers that have been provided the one or more encryption keys can be used to load, access, and/or operate the virtual machine. The management server can thus differentiate which virtual machines can be operated on which servers by differentiating which servers can receive which encryption keys. In one implementation, a management server encrypts all virtual machines in the system, but encrypts virtual machines with sensitive data with a limited set of encryption keys, and further provides those encryption keys to a limited set of trusted servers.06-06-2013
20130145355DELTA COMPRESSION USING MULTIPLE POINTERS - Encoding a new version of a data module includes constructing a delta data module having data for providing the new version of the data module. The delta data module may indicate an encoding for copying data at an offset from one of a number of pointers into different versions of the data module. Decoding a delta data module to provide a new version of a data module includes copying, to the new version of the data module, data relative to a target pointer when an encoding in the delta data module indicates a matching pattern relative to the target pointer, and copying, to the new version of the data module, data relative to at least one other pointer when an encoding in the delta data module indicates a matching pattern relative to the at least one other pointer.06-06-2013
20130147748Active Vibrations - Active vibration techniques are described. In implementations, a selection of a type of writing surface or a type of writing implement is received, the selection made through interaction with a user interface. The selected type of writing surface or type of writing implement is simulated using vibrations of a stylus or surface of a computing device that is configured to receive one or more inputs from the stylus.06-13-2013
20130147749PANNING CONTENT UTILIZING A DRAG OPERATION - Computer-readable media, computerized methods, and computer systems for intuitively invoking a panning action (e.g., moving content within a content region of a display area) by applying a user-initiated input at the content region rendered at a touchscreen interface are provided. Initially, aspects of the user-initiated input include a location of actuation (e.g., touch point on the touchscreen interface) and a gesture. Upon ascertaining that the actuation location occurred within the content region and that the gesture is a drag operation, based on a distance of uninterrupted tactile contact with the touchscreen interface, a panning mode may be initiated. When in the panning mode, and if the application rendering the content at the display area supports scrolling functionality, the gesture will control movement of the content within the content region. In particular, the drag operation of the gesture will pan the content within the display area when surfaced at the touchscreen interface.06-13-2013
20130147975CAPTURE DEVICE MOVEMENT COMPENSATION FOR SPEAKER INDEXING - Embodiments of the invention compensate for the movement of a meeting capture device during a live meeting when performing speaker indexing of a recorded meeting. In one example, a first position of a capture device is determined. A second position of the capture device is determined after the capture device has been moved from the first position to the second position. The movement data associated with movement of the capture device from the first position to the second position is determined. The movement data is outputted and used in speaker indexing of the recorded meeting.06-13-2013
20130148737SPATIOTEMPORAL PREDICTION FOR BIDIRECTIONALLY PREDICTIVE (B) PICTURES AND MOTION VECTOR PREDICTION FOR MULTI-PICTURE REFERENCE MOTION COMPENSATION - Several improvements for use with Bidirectionally Predictive (B) pictures within a video sequence are provided. In certain improvements Direct Mode encoding and/or Motion Vector Prediction are enhanced using spatial prediction techniques. In other improvements Motion Vector prediction includes temporal distance and subblock information, for example, for more accurate prediction. Such improvements and other presented herein significantly improve the performance of any applicable video coding system/logic.06-13-2013
20130148801VOICE SWITCHING FOR VOICE COMMUNICATION ON COMPUTERS - A voice communication end device performs quality checks to determine whether acoustic echo cancellation would be ineffective, such as due to noise or clock drift or discontinuities between incoming and outgoing voice channels. In the case where echo cancellation would prove ineffective, the device falls back on a tri-state voice switching operation that includes a bi-direction state in which both channels are on in full duplex operation, which provides a smoother transition switching between active channels. The tri-state voice switching supports both voluntary transitions where the active user voluntarily stops to yield the active channel, and forced transitions where the active user is forcedly interrupted by the other user speaking more loudly.06-13-2013
20130148889FLEXIBLE DATA ORGANIZATION FOR IMAGES - A system, a method and computer-readable media for encoding image data into a compressed bitstream. A mode selection component is configured to select a mode of operation for use in encoding image data. A spatial mode encoder is utilized when the mode selection component selects a spatial mode of operation. The spatial mode encoder is configured to encode the image data into packets by organizing the image data in accordance with a spatial partitioning. A frequency mode encoder is utilized when the mode selection component selects a frequency mode of operation. The frequency mode encoder is configured to encode the image data into packets by organizing the image data in accordance with a frequency ordering.06-13-2013
20130150071LOCATION DETERMINATION FOR WHITE SPACE UTILIZATION - A technique for a wireless device to obtain white space information from a component configured for cellular communication, such as a cellular phone. The wireless device and cellular phone may communicate using a short-range connection, such as a peer-to-peer connection, ensuring that the white space information, which is location based, generated by the cellular phone is also accurate for the location of the wireless device. With such white space information, the wireless device can comply with regulatory requirements for white space use by accessing a regulatory database identifying, by location, available white space channels. When the cellular phone is configured for accessing a wide area network, the cellular telephone may provide the white space information as a set of channels available for white space communication. Channels of the set may be prioritized based on one or more parameters, including frequency, permitted transmit power or detected noise.06-13-2013
20130150083LOCATION BASED, SOFTWARE CONTROL OF MOBILE DEVICES - Methods are disclosed for controlling mobile computing devices such as laptops, PDAs and cellular telephones, based on their location. A mobile computing device may include a software-rendered map of defined geographic regions, location handlers for defining behavior of a mobile device in a given geographic region, and a location handling engine for determining when a new geographic zone has been entered and exited, and for executing and terminating location handlers accordingly.06-13-2013
20130151258Context Based Online Advertising - A software and/or hardware facility for inferring user context and delivering advertisements, such as coupons, using natural language and/or sentiment analysis is disclosed. The facility may infer context information based on a user's emotional state, attitude, needs, or intent from the user's interaction with or through a mobile device. The facility may then determine whether it is appropriate to deliver an advertisement to the user and select an advertisement for delivery. The facility may also determine an appropriate expiration time and/or discount amount for the advertisement.06-13-2013
20130151466CONTROLLING ACCESS TO DOCUMENTS USING FILE LOCKS - Examples are related to systems and methods for controlling access to document files on a document server. One example system includes document files stored on a document server, at least one of the document files referencing a file lock, and a document access processing module. The example document access processing module includes a file sharing processing module that determines a coauthoring status of a software application of a client computer requesting access to the document file, and a file lock processing module that stores one or more file locks and that controls the setting and resetting of file locks. The example document access processing module uses the coauthoring status of the software application and the file lock status of a document file to determine whether a software application is permitted to have write access to the document file.06-13-2013
20130151480MANAGING DATABASE RECOVERY TIME - Managing database recovery time. A method includes receiving user input specifying a target recovery time for a database. The method further includes determining an amount of time to read a data page of the database from persistent storage. The method further includes determining an amount of time to process a log record of the database to apply changes specified in the log record to a data page. The method further includes determining a number of dirty pages that presently would be read in recovery if a database failure occurred. The method further includes determining a number of log records that would be processed in recovery if a database failure occurred. The method further includes adjusting at least one of the number of dirty pages that presently would be read in recovery or the number of log records that would be processed in recovery to meet the specified target recovery time.06-13-2013
20130151498Search Engine Data Structure - A search engine database may a segmented structure that preserves individual document references and allows updating as well as scalability. A set of segment managers may receive new, updated, or deleted documents and update a set of term matrices from which a published search matrix may be generated. The database may have a very large term dictionary and may use a hash function to create term identifiers without having to look up terms in the dictionary. The database may be maintained by many systems operating in parallel for high scalability.06-13-2013
20130151510CONCEPT-STRUCTURED IMAGE SEARCH - The concept-structured image search technique described herein pertains to a technique for enabling a user to indicate their semantic intention and then retrieve and rank images from a database or other image set according to this intention. The concept-structured image search technique described herein includes a new interface for image search. With this interface, a user can freely type several key textual words in arbitrary positions on a blank image, and also describe a region for each keyword that indicates its influence scope, which is called concept structure herein. The concept-structured image search technique will return and rank images that are in accordance with the concept structure indicated by the user. One embodiment of the technique can be used to create a synthesized image without actually using the synthesized image to perform a search of an image set.06-13-2013
20130151513PERSISTENT CONTEXTUAL SEARCHES - A badge may be assigned to a person, where the badge represents a characteristic or recurrent behavior of the person. A query may be associated with a badge, and the query may be continually used in a search request in combination with the person's context, thereby allowing the person to be continually provided with fresh results that may be relevant to the person's durable characteristics and current context. In one example, the person carries a handheld device, and the results are presented to the user on the user's desktop or lock screen. The act of providing the results may be triggered in various ways, such as movement of the person who carries the device, or the availability of sufficiently high-quality results.06-13-2013
20130151541Type Projection Query of an Instance Space - Technologies are described herein for applying type projection queries to instance space graphs. Through the utilization of the technologies and concepts presented herein, a type projection may be used to describe the hierarchy of instance types connected by relationships within an instance space graph. A type projection query based on the type projection may be dynamically generated to query instances and relationships within the instance store. Filter criteria for the query can be expressed using a path notation. Results from of the type projection query may be provided as graphs of instances and relationships which are subgraphs of the queried instance space graph. Programmatic traversal of the resultant subgraph can navigate to each instance node within the result space.06-13-2013
20130151644COPYING DATA ONTO AN EXPANDABLE MEMORY - This document describes a method for synchronizing files on an expandable memory card coupled to a first computing device with an application running on a second computing device, where downloading of files is performed wirelessly without user involvement.06-13-2013
20130151675AUTOMATIC NETWORK ADDRESS ASSIGNMENT IN A WIRELESS MESH - A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the mesh can automatically select routable addresses without conflicts, which allows nodes of the mesh to be accessed, even as the mesh changes through the addition or deletion of nodes. Also, nodes communicate with a protocol that supports service advertisements. These advertisements can identify mesh nodes that supply services, such as file or print servers, for which devices that have not yet connected to the network may be searching. Advertisements can also identify services to be used by nodes in the network, allowing, for example, anode to select a gateway providing a reliable connection to an external network. The mesh network can be used as a transport for communication using protocols, such as TCP/IP, that generally exhibit poor performance when using unreliable transports.06-13-2013
20130151717SUSTAINING SESSION CONNECTIONS - In an embodiment, techniques for sustaining session connections are provided. The techniques send heartbeat messages when not sending a message may cause the session connection to close because of a timeout condition. Heartbeat messages are valid transport layer messages that will be ignored by protocols at higher levels of a data communications stack. As an example, the techniques may send a TCP message containing only a carriage return and line feed (“CRLF”) in its payload. Because the TCP layer considers a message containing only a CRLF to be a valid TCP message, intermediary computing devices such as proxy servers may not interpret heartbeat messages as “keep alive” messages, and may sustain session connections.06-13-2013
20130151719DETERMINING AN EFFICIENT KEEP-ALIVE INTERVAL FOR A NETWORK CONNECTION - Systems and methods for use in communication between a client and a server, via a networking device, are provided. The method may include sending a request to establish a data connection from the client to the server via the networking device, setting a data connection keep-alive interval for the data connection to a predetermined safe value, and sending a request to establish a test connection between the client and the server. The method may further include determining an efficient keep-alive interval for communication between the client and server via the networking device, using the test connection, setting the data connection keep-alive interval to the efficient keep-alive interval determined using the test connection, and uploading the efficient keep-alive interval from the client to the server in an efficient keep-alive interval notification message, for communication to other clients connected to the server.06-13-2013
20130151874LINKED SHELL - An apparatus and method is provided for controlling a display device for displaying a user interface associated with an application. A processor for controlling peripheral devices and/or the display may be selected based on characteristics of a requested function to be performed. For example, a processor may be selected with a power characteristic corresponding to a power level needed to perform the requested function. Also, an instantiation of a user interface may be switched based on selection of the processor for controlling peripheral devices. In another example, the transition from one instantiation of the user interface to another instantiation of the user interface may be smooth such that a user may be unaware a change has been made.06-13-2013
20130151972MEDIA PROCESSING COMPARISON SYSTEM AND TECHNIQUES - A media processing comparison system (“MPCS”) and techniques facilitate concurrent, subjective quality comparisons between media presentations produced by different instances of media processing components performing the same functions (for example, instances of media processing components in the form of hardware, software, and/or firmware, such as parsers, codecs, decryptors, and/or demultiplexers, supplied by the same or different entities) in a particular media content player. The MPCS receives an ordered stream of encoded media samples from a media source, and decodes a particular encoded media sample using two or more different instances of media processing components. A single renderer renders and/or coordinates the synchronous presentation of decoded media samples from each instance of media processing component(s) as separate media presentations. The media presentations may be subjectively compared and/or selected for storage by a user in a sample-by-sample manner.06-13-2013
20130152012SCROLLING WEB PAGES USING DIRECT INTERACTION - Scrolling or dragging information on a display includes various elements. A panning tool is provided that may scroll information, such as a web page, on a display in tandem with movement of a cursor. If interactive elements are present on the page or document, an interactive element may be activated as desired. Scrolling may be accomplished with the panning tool either on non-interactive elements or interactive elements that are not required to be activated. Furthermore, inertia of movement of the information on a display is optimized and autoscrolling is provided in which a page or document may be scrolled without dragging.06-13-2013
20130152186FILTERING KERNEL-MODE NETWORK COMMUNICATIONS - Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.06-13-2013
20130155297RADIOMETRIC CALIBRATION FROM NOISE DISTRIBUTIONS - Technologies that enable correcting for the non-linear relationship between scene irradiance and digital pixel intensity values of an image of the scene produced by a camera. Imaging noise is used as a signal from which a corrective function is derived. Noise distributions from the image are evaluated to determine the radiometric response function of the camera, from which an inverse response function is computed and used for calibration.06-20-2013
20130155980ORTHOGONAL FREQUENCY DIVISION MULTIPLE ACCESS WITH CARRIER SENSE - A communication system in which an access point and one or more devices communicating through the access point adaptively apply Orthogonal Frequency Division Multiple Access (OFDMA). The access point may assign orthogonal subcarriers to devices as in conventional OFDMA, but the access point senses activity on the subcarriers and selects subcarriers without activity for assignment. In an alternative approach, a device that is configured for OFDMA communication may receive a channel assignment from a device that does not support OFDMA. The OFDMA-capable device may use only a portion of the subcarriers in the assigned channel, which may be communicated to the non-OFDMA device. During the non-OFDMA device may then ignore unused subcarriers in error detection and correction to avoid incorrectly classifying communications as erroneous. Information about OFDMA capabilities, subcarrier assignments and subcarriers in use may be communicated as information elements in network control communications, such as beacons and probe messages.06-20-2013
20130157630Content Transfer involving a Gesture - Content transfer involving a gesture is described. In an implementation, a method is implemented by a mobile communications device that includes recognizing a gesture input via a touchscreen of the mobile communications device that is indicative of a direction, the touchscreen including a display of content. One or more other mobile communications devices are located that are positioned, approximately, along the indicated direction of the gesture. A communication is formed to transfer the content to the located one or more other mobile communications devices.06-20-2013
20130159042Calendar Repair Assistant - Calendar repair may be provided. Calendar events, such as appointments and meetings, may be created and copied to a plurality of attendee calendars. A first copy of the event may be compared to a second copy of the event, and an event property of the second event may be updated to match a corresponding event property of the first event.06-20-2013
20130159344DYNAMICALLY SPLITTING MULTI-TENANT DATABASES - An online service includes managed databases that include one or more tenants (e.g. customers, users). A multi-tenant database may be split between two or more databases while the database being split continues processing requests. For example, web servers continue to request operations on the database while content is being moved. After moving the content, tenant traffic is automatically redirected to the database that contains the tenant's content.06-20-2013
20130159399ABSTRACTION LAYER FOR ONLINE/OFFLINE RESOURCE ACCESS - A resource abstraction layer for use in a media processing environment includes a configuration file and a set of computer-executable instructions. Both network-based and locally-accessible resources are indirectly accessible via the resource abstraction layer. The configuration file has at least two data structures—a first data structure storing “virtual resource identifiers,” which reference particular resource usable in connection with rendering a particular media presentation, and a second data structure storing “virtual location identifiers,” which reference one or more locations at which particular resources are stored. The set of computer-executable instructions facilitates use of the configuration file, and seamless indirect access by the media processing environment to particular resources, regardless of where such resources are located. Temporary resources may be rendered while a particular resource is being accessed via the resource abstraction layer.06-20-2013
20130159422One-Way Public Relationships - Techniques are described to establish one-way public relationships. In an implementation, a service manager module is usable to configure a webpage for output to a client over a network to provide to a user of the client an indication of others users that are part of a social network of the user and have establishes one-way public relationships, respectively, with another user corresponding to an object of a social networking service available from a service provider. In addition, a relation module is configured to establish a one-way public relationship between the user of the client and the other user corresponding to the object without establishing a mutual friend relationship between the user and the other user. In an implementation, the one-way public relationship is established in response to user selection of a control that is presented on the webpage that is output at the client in conjunction with the object.06-20-2013
20130159515Providing a Monitoring Service in a Cloud-Based Computing Environment - Technologies are described herein for providing a monitoring service in a cloud-based computing environment. A request is received from a user to subscribe to the monitoring service. The monitor workflow may correspond to the monitoring service. A first call to a finder application is executed over a communications network to retrieve data points according to the monitor workflow. A second call to an analyzer application is executed over the communications network to identify a relevant data point in the data points. A third call to a notifier application is executed over the communications network to notify the user of the relevant data point.06-20-2013
20130159729SOFTWARE-BASED TRUSTED PLATFORM MODULE - A “Firmware-Based TPM” or “fTPM” ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM® architecture's TrustZone™ extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a “firmware-based TPM” without requiring hardware modifications to existing devices.06-20-2013
20130159879Automatic Conversation Techniques - Automatic conversation techniques are described. An apparatus may comprise a computing device having an incoming message module operative to receive an incoming message, a conversation identification module communicatively coupled to the incoming message module, the conversation identification module operative to determine the incoming message is part of a conversation thread, and associate the incoming message with the conversation thread by setting a conversation identifier property of the incoming message to a conversation identifier for the conversation thread, and a conversation manager module communicatively coupled to the conversation identification module, the conversation manager module operative to determine a conversation rule is associated with the conversation thread, and apply the conversation rule to the incoming message. Other embodiments are described and claimed.06-20-2013
20130159965Interface for a Computer Platform - A programming interface for a computer platform can include various functionality. In certain embodiments, the programming interface includes one or more of a first group of services related to re-usable user interface controls, a second group of services related to user interface dialogs and user interface wizards, a third group of services related to extending the user interface functionality, and a fourth group of services related to extending functionality of a desktop of the user interface.06-20-2013
20130160027COMPOSING MESSAGE PROCESSING PIPELINES - The present invention extends to methods, systems, and computer program products for composing message processing pipelines. Embodiments utilize intra-pipeline communication links to physically and/or temporally decouple pipeline stages, configure branching message flows, and bridge protocols. The use of intra-pipeline communication links permits composition of a message processing pipeline without having to alter the pipeline components or application. Each communication link is itself an application with incoming and outgoing message processing pipelines that bridge messages across time and/or space and application logic for satisfying message processing requirements.06-20-2013
20130162653Creating Animations - Animation creation is described, for example, to enable children to create, record and play back stories. In an embodiment, one or more children are able to create animation components such as characters and backgrounds using a multi-touch panel display together with an image capture device. For example, a graphical user interface is provided at the multi-touch panel display to enable the animation components to be edited. In an example, children narrate a story whilst manipulating animation components using the multi-touch display panel and the sound and visual display is recorded. In embodiments image analysis is carried out automatically and used to autonomously modify story components during a narration. In examples, various types of handheld view-finding frames are provided for use with the image capture device. In embodiments saved stories can be restored from memory and retold from any point with different manipulations and narration.06-27-2013
20130163588METHOD OF TRANSMITTING DATA IN A COMMUNICATION SYSTEM - A method of receiving at a terminal a first signal transmitted via a communication network, said method comprising the steps of; receiving at the terminal the first signal comprising a plurality of data elements; analysing characteristics of the first signal; receiving from a user of the terminal a second signal to be transmitted from the terminal; analysing characteristics of the second signal to detect audio activity in the second signal; and applying a delay between receiving at the terminal and outputting from the terminal at least one of said plurality of data elements; and adjusting the delay based on the analysed characteristics of the first signal and on the detection of audio activity in the second signal.06-27-2013
20130163857MULTIPLE CENTROID CONDENSATION OF PROBABILITY DISTRIBUTION CLOUDS - Systems and methods are disclosed for identifying objects captured by a depth camera by condensing classified image data into centroids of probability that captured objects are correctly identified entities. Output exemplars are processed to detect spatially localized clusters of non-zero probability pixels. For each cluster, a centroid is generated, generally resulting in multiple centroids for each differentiated object. Each centroid may be assigned a confidence value, indicating the likelihood that it corresponds to a true object, based on the size and shape of the cluster, as well as the probabilities of its constituent pixels.06-27-2013
20130165225NATURAL USER INPUT FOR DRIVING INTERACTIVE STORIES - A system and method are disclosed for combining interactive gaming aspects into a linear story. A user may interact with the linear story via a NUI system to alter the story and the images that are presented to the user. In an example, a user may alter the story by performing a predefined exploration gesture. This gesture brings the user into the 06-27-2013
20130166663WORKFLOW AND IN-CONTEXT E-MAIL RECIPIENT HANDLING - Various technologies and techniques are disclosed that improve the workflow process for resolving data elements, such as email addresses. These technologies and techniques allow the user to perform such tasks in the same context as the activity or message. In addition, user can start and stop the resolution process at any point in the process of composing the activity or email. The activity cannot be finalized, such as an email message being sent, until all of the data elements are resolved.06-27-2013
20130167205CONSTRAINING A LOGIN TO A SUBSET OF ACCESS RIGHTS - This document describes tools that constrain a login to a subset of access rights. In one embodiment, the tools generate a constrained password by executing a cryptographic algorithm on a user ID, general password, and one or more desired constraints. The constrained password is used in place of the general password to gain access rights that are a subset of the access rights that would be granted if the general password were used instead.06-27-2013
20130169687Manipulation of Graphical Objects - One or more graphical objects are displayed in a fixed orientation with reference to a sensed reference direction. Manipulation is achieved by fixing the orientation or position of a displayed graphical object with reference to an apparatus, such as the display itself or a proxy device, detecting a change in orientation of that apparatus and editing the orientation of the graphical object based on the detected change.07-04-2013
20130169736Making Calls Using an Additional Terminal - A first terminal is coupled to a wide-area packet-based network and installed with first client application. One or more second terminals are coupled to the first terminal via a local wireless link, and each installed with an instance of a lightweight sub-client having reduced functionality relative to the first client. The first client establishes a call with a remote, third terminal over the network, based on a user credential identifying the first client. Each second terminal generates an audio or video stream, and each sub-client transmits the respective stream to the first client over the local wireless link for use in the call. The first client switches between a second state in which the call uses the streams from the sub-clients and a first state in which the call uses a stream generated by the first terminal without the streams from the sub-clients.07-04-2013
20130170370SYSTEMS AND METHODS FOR MAKING CHANNEL ASSIGNMENTS TO REDUCE INTERFERENCE AND INCREASE CAPACITY OF WIRELESS NETWORKS - Techniques for making channel assignments to reduce interference and increase capacity of wireless networks are described. In an implementation, a first station receives a signal from a second station. The first station measures a signal strength of the received signal, and determines that the signal strength is relatively weak compared to other signals received at the first station from other stations. A set of OFDMA subcarriers available for assignment is divided into a first subset for relatively weak signals within a first cell and a second subset for relatively strong signals within the first cell. The second station is assigned a transmit subchannel that is formed for a predetermined period of time by the first subset of subcarriers, the transmit subchannel assigned based on the determination that the signal strength of the received signal is relatively weak.07-04-2013
20130170371SYSTEMS AND METHODS FOR MAKING CHANNEL ASSIGNMENTS TO REDUCE INTERFERENCE AND INCREASE CAPACITY OF WIRELESS NETWORKS - Techniques for making channel assignments to reduce interference and increase capacity of wireless networks are described. In an implementation, a signal is received at a first station from a second station. A signal strength is measured and compared to other signal strength measurements of signals received from other stations. The signal strength is determined to be relatively weak based on the comparison, and the second station is assigned to a first subchannel that includes subcarriers reserved for stations with relatively weak signals. Subsequently, the signal strength measurement is repeated and the signal strength is determined to be relatively strong in comparison to the other signal strengths. The second station is then reassigned to a second subchannel that includes subcarriers reserved for stations with relatively strong signals.07-04-2013
20130170380ADAPTING A COMMUNICATION NETWORK TO VARYING CONDITIONS - Systems and methods are disclosed for adapting a communication system to varying conditions. Using some form of discovery protocol, the communication standards supported by at least two communicants are determined. Each communicant may then periodically monitor the quality of the channel established by the communication standard and dynamically select a set of one or more communication standards to use for communicating. Further, when communicants share common non-standard parameterized implementations of communication standards, changes to the protocols which the communication standards comprise can be used to add options for a more dynamic response to changing conditions than is possible when adhering only to an established communication standard.07-04-2013
20130173442TUNING PRODUCT POLICY USING OBSERVED EVIDENCE OF CUSTOMER BEHAVIOR - A computer adapted for pay-as-you go or other metered use has a policy for determined what measurements to take to detect fraud as well as steps to take when fraud is found. To optimize between good performance and sufficient tests to reduce the risk of fraud, a policy is developed based on observation of the users behavior, using data taken at the computer, data from a payment processor or both. After analysis, an updated policy is securely loaded at the computer to determine what, and how often to measure for suspected fraud.07-04-2013
20130173545FILE-BACKED IN-MEMORY STRUCTURED STORAGE FOR SERVICE SYNCHRONIZATION - Providing synchronization to a local system. Embodiments may include downloading a batch of changes in a heterogeneous batch. The batch of changes is correlated to an anchor affiliated with a synchronization service. The anchor is a reference point indicating time or relative order. The batch of changes and the anchor are serialized to a non-volatile storage medium as a heterogeneous set. After serializing the batch of changes to a non-volatile storage medium as a heterogeneous set, entities in the batch of changes are parsed out into entities in in-memory representations. Similarly, embodiments may receive user input modifying a plurality of data entities, store on a non-volatile storage medium a serialized heterogeneous representation of the modified data entities, and upload the serialized heterogeneous representation to a synchronization service.07-04-2013
20130173672GENERIC EDITOR FOR DATABASES - Facilitating generic database editing to allow for data to be received from a user for entry into a database without requiring the data to conform to schema constraints for the database. A method includes examining a first schema for a first database. The first schema including a first set of constraints specified in the first schema on data to be entered into the first database. The method further includes, based on the examination, constructing a second database corresponding to the first database. The second database is associated with a second schema with a second set of constraints. The second set of constraints is a relaxed version of the first set of constraints specified in the first schema.07-04-2013
20130173872Abstracting Programmatic Representation of Data Storage Systems - Providing for a paradigm shift in block-level abstraction for storage devices is described herein. At a block-level, storage is characterized as a variable size data record, rather than a fixed size sector. In some aspects, the variable size data record can comprise a variable binary key-data pair, for addressing and identifying a variable size block of data, and for dynamically specifying the size of such block in terms of data storage. By changing the key or data values, the location, identity or size of block-level storage can be modified. Data records can be passed to and from the storage device to facilitate operational commands over ranges of such records. Block-level data compression, space management and transactional operations are provided, mitigating a need of higher level systems to characterize underlying data storage for implementation of such operations.07-04-2013
20130174001TECHNIQUES FOR ELECTRONIC AGGREGATION OF INFORMATION - Techniques for an electronic montage system are described. An apparatus may comprise a logic device arranged to execute a montage application comprising an authoring component operative to provide a presentation surface having multiple presentation tiles, receive control directives to associate content files with presentation tiles, generate tile objects for the content files based on content file types for the content files, and store the presentation surface and tile objects as a montage. Other embodiments are described and claimed.07-04-2013
20130174189Media Recommendations Based on Negative Feedback - A media recommendation system gathers negative user feedback associated with media content. Based on the gathered feedback, the media recommendation system extracts a list of recommended media content from program data describing available media content.07-04-2013
20130177298System and Method to Facilitate Programming of an Associated Recording Device - A system and method are disclosed to facilitates programming of a recording device. A client system is operatively coupled with the recording device, which, for example, is programmed and/or configured to record selected audio and/or visual broadcast programming. The client system receives a message, such as in the form of electronic mail (email) or another suitable form, from a remotely located computer. One or more tokens are associated with the message for providing program criteria indicative of selected audio and/or visual programming, which may be employed to program the recording device for recording broadcast programming based on the token.07-11-2013
20130178282Real-Time HD TV/Video IP Streaming to a Game Console - Program code enabling the streaming of HD content in real-time to a game console is stored on a storage medium remote from the game console. The game console executes software that facilitates transfer of the program code from the remote storage medium to the game console. The program code ensures that sufficient bandwidth exists on a network between the game console and a HD tuner, and enables the streaming of HD content in real-time to the game console.07-11-2013
20130178287HUMAN-COMPUTER INTERFACE SYSTEM HAVING A 3D GAZE TRACKER - An apparatus for interfacing a person with a computer, the apparatus comprising a gaze tracker having a 3D camera and a picture camera that image the person and a controller that processes images acquired by the cameras to determine a gaze direction and point of regard of the person.07-11-2013
20130179257In-Text Embedded Advertising - Computer program products, devices, and methods for generating in-text embedded advertising are described. Embedded advertising is “hidden” or embedded into a message by matching an advertisement to the message and identifying a place in the message to insert the advertisement. For textual messages, statistical analysis of individual sentences is performed to determine where it would be most natural to insert an advertisement. Statistical rules of grammar derived from a language model may be used choose a natural and grammatical place in the sentence for inserting the advertisement. Insertion of the advertisement creates a modified sentence without degrading a meaning of the original sentence, yet also includes the advertisement as a part of a new sentence.07-11-2013
20130179431TOKENIZED JAVASCRIPT INDEXING SYSTEM - A client generates an index token for each of a plurality of data objects received from a server as a function of at least one of the plurality of fields of the data object. The client creates an index for the plurality of data objects based on the generated index token for each data object. The client may then utilize the index to search plurality of data objects to identify and render a subset of the data objects.07-11-2013
20130179721USING PULSES TO CONTROL WORK INGRESS - The present invention extends to methods, systems, and computer program products for using pulses to control work ingress. Generally, embodiments of the invention use a variable-speed clock for accepting work for lower-priority services. A clock rate is controlled by a load monitor. The load monitor periodically collects sensor measurements of resources available after allocations by higher-priority services. Based on the sensor measurements, the load monitor adjusts the clock speed up or down (i.e., depending on the amount of resources available after allocations by higher-priority services). At the boundary of the lower-priority service (e.g., where work enters the system), work requests are enqueued to be associated with a future pulse of the clock. Work is accepted or rejected based on a determination of whether the work request can be allocated a clock pulse within a defined period of time.07-11-2013
20130182832USER-BASED AUTHENTICATION FOR REALTIME COMMUNICATIONS - Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location.07-18-2013
20130183935EXTENSIBLE FRAMEWORK FOR WIRELESS NETWORK CONNECTIVITY - An extensible framework for offloading data traffic sent to a mobile computing device over a cellular network to a wireless network comprises software plugins, a plugin host that is typically part of the mobile device operating system, and plugin interfaces through which the plugin host communicates with the plugins. A plugin is associated with one or more mobile operators. The framework can comprise one or more plugins, but typically, only one plugin is active at a time. The framework can automatically detect and connect to wireless networks associated with a mobile operator associated with an active plugin. The plugin can automatically authenticate the mobile device or a mobile device user with the mobile operator over the connected wireless network. The plugins are not allowed access to operating system functions responsible for detecting and connecting and disconnecting to a wireless network, which can improve mobile operating system stability and battery life.07-18-2013
20130185052LANGUAGE TRANSLATION OF VISUAL AND AUDIO INPUT - The present translation system translates visual input and/or audio input from one language into another language. Some implementations incorporate a context-based translation that uses information obtained from visual input or audio input to aid in the translation of the other input. Other implementations combine the visual and audio translation. The translation system includes visual components and/or audio components. The visual components analyze visual input to identify a textual element and translate the textual element into a translated textual element. The visual image represents a captured image of a target scene. The visual components may further substitute the translated textual element for the textual element in the captured image. The audio components convert audio input into translated audio.07-18-2013
20130185154TARGETING OF CONSUMER LISTS UNDER CONSENT BY EXTERNAL PARTIES FOR PROMOTIONS AND DISCOUNTS - A consumer owns a list of items, whether goods or services, including one or more entries, with each entry indicating an item, such as a good or service. This list of items has one or more entries with associated authorizations. The authorizations indicate which entities can access information from the entry in the list, and which actions the entities can perform using the information on the list. In particular, such authorizations include one or forms of targeting of the owner of the list, typically a consumer of goods and services, with promotions, advertisements, discounts, coupons and similar information relating to the goods and services on the list. The consumer controls the content and authorizations in the list.07-18-2013
20130185178SOURCE DOCUMENT FRAMEWORK FOR ACCOUNTING SYSTEMS - A source document framework for accounting systems is described. An apparatus may comprise an accounting application arranged for execution by the processor circuit, the ERP application comprising a source document framework component arranged to create a new source document type to add to heterogeneous source document types, and a source document process component arranged to process source documents of the heterogeneous source document types, with at least one of the heterogeneous source document types including a previous source document type arranged for use with process logic specific to the previous source document type, and process one or more source documents of the new source document type with the process logic specific to the previous source document type. Other embodiments are described and claimed.07-18-2013
20130185253WEB SERVICE FOR USER AND SUBSCRIPTION DATA STORAGE - A data service that manages user and subscription data for multiple services. The data service maintains a database of the user and subscription data and provides an interface that allows the other services, that act as clients to the data service, to access that data. The data service avoids the need for the client services to implement a framework to manage the storage of user and subscription data. The data service also allows user profile data to be updated by one client service and used by all others. Further, data, such as usage history or information on policy violations, may be shared by multiple services.07-18-2013
20130185341USE OF DELETE NOTIFICATIONS BY FILE SYSTEMS AND APPLICATIONS TO RELEASE STORAGE SPACE - In accordance with one or more aspects, one or more portions of at least one file that have been freed are determined. One or more delete notifications are generated that identify the one or more portions of the at least one file. Each portion is identified as a range of data on a storage device, and each delete notification includes one or more ranges of data on the storage device. A determination is made as to when to send the generated delete notifications based on one or more threshold-based criteria. These generated delete notifications are then sent to a storage stack.07-18-2013
20130185463ASSIGNMENT OF CONTROL OF PERIPHERALS OF A COMPUTING DEVICE - Techniques for enabling software-assisted assignment of control of peripherals (e.g., assigning ownership of or assigning access to the peripherals) by a computing device. In accordance with techniques described herein, assignment of control of peripherals is aided by input from software facilities that instruct a peripheral management facility regarding assignment of peripherals. Software facilities may instruct the peripheral management facility in different ways. In some cases, a software facility may instruct the peripheral management facility how to assign control of a peripheral in a particular way, while in other cases a software facility may instruct the peripheral management facility how to assign control of a group of peripherals. In other cases, a software facility may not instruct a peripheral management facility how to assign control of peripherals, but may identify one or more groups of peripherals for which control should be assigned as a group.07-18-2013
20130187929VISUAL REPRESENTATION EXPRESSION BASED ON PLAYER EXPRESSION - Using facial recognition and gesture/body posture recognition techniques, a system can naturally convey the emotions and attitudes of a user via the user's visual representation. Techniques may comprise customizing a visual representation of a user based on detectable characteristics, deducting a user's temperament from the detectable characteristics, and applying attributes indicative of the temperament to the visual representation in real time. Techniques may also comprise processing changes to the user's characteristics in the physical space and updating the visual representation in real time. For example, the system may track a user's facial expressions and body movements to identify a temperament and then apply attributes indicative of that temperament to the visual representation. Thus, a visual representation of a user, such as an avatar or fanciful character, can reflect the user's expressions and moods in real time.07-25-2013
20130188876AUTOMATIC IMAGE STRAIGHTENING - Tilt is reduced or eliminated in captured digital images. Edges in a first image are detected. Angles corresponding to the detected edges are determined. A dominant angle is selected from the determined angles. The first image is rotated according to the selected dominant angle to generate a second image. The second image is a de-tilted version of the first image.07-25-2013
20130191449Cached and Server Views with Automatic Caching and Smooth Scrolling - On a client computer, customer relationship management software is integrated into a messaging application that includes a user interface. Customer relationship management (CRM) information is received from a server computer. An automatic determination is made as to whether the received CRM information is to be cached on the client computer. When it is determined that the CRM information is to be cached on the client computer, the CRM information is cached in a cache on the client computer. When at least some of the CRM information is cached on the client computer, the cached CRM information is displayed as a view on the client computer. The display of the CRM information is integrated into the user interface of the messaging application program.07-25-2013
20130191811DECLARTIVE COMMANDS USING WORKFLOWS - Declaratively implementing a command. A method includes declaring an input gesture in a declarative programming language. Declaring an input gesture includes declaring one or more user performed actions. A command name is declared in a declarative programming language. A workflow is declared in a declarative programming language. Declaring a workflow includes declaring schedulable activities that are to be performed without specific specifications of the low level algorithms that are used to accomplish the activities. In an alternative example, workflows may be declared by declaring a wrapper to wrap imperative programming commands. The declared input gestures are bound with the declared workflow through the declared command name.07-25-2013
20130194258REPRESENTATION OF OVERLAPPING VISUAL ENTITIES - Various embodiments present a combined visual entity that represents overlapping visual entities. The combined visual entity can include a primary visualization that represents one of the overlapping visual entities and annotations that represent others of the overlapping visual entities. For example, a map view can include multiple geographical entities that overlap. A primary visualization can be rendered that represents one of the multiple geographical entities. The primary visualization can be visually annotated (e.g., with symbols, letters, or other visual indicators) to indicate others of the multiple geographical entities. In some embodiments, a zoom operation can cause visual entities to be added and/or removed from the combined visual entity.08-01-2013
20130195375TAGGING IMAGES WITH LABELS - An image to be shared with other users based on input from a first user is received. A second user is identified from a tag of the image, and information is provided, based at least in part on the tag, to one or both of the first user and the second user. Additionally, after editing of an image a determination can be made as to whether a region of the image having an associated tag has been affected by the editing. The tag associated with the region is altered if the region has been affected by the editing, otherwise the tag associated with the region is left unaltered. Furthermore, the tag can include a first portion storing data identifying a region of the image to which the tag corresponds, and a second portion storing data identifying a person shown in the region.08-01-2013
20130196615RECOMMENDATIONS FOR REDUCING DATA CONSUMPTION BASED ON DATA USAGE PROFILES - Embodiments profile users based on data usage of installed applications and provide recommendations for reducing data usage. A computing device or cloud service determines a plurality of applications installed on the computing device. Data usage patterns associated with each of the determined plurality of applications are identified. The data usage patterns describe data usage over a network for at least one of the determined plurality of applications. One or more recommendations for reducing data usage are defined based on the identified data usage patterns. Some embodiments recommend switching applications, uninstalling applications, or disabling particular network connections.08-01-2013
20130196616DATA USAGE PROFILES FOR USERS AND APPLICATIONS - Embodiments profile users and applications based on network data usage. Data usage statistics are collected and compared for the users and applications. Profiles are assigned to the users and applications based on the comparison. In some embodiments, the applications are ranked based on data usage and presented to the users in an application marketplace.08-01-2013
20130196617PREDICTING NETWORK DATA CONSUMPTION RELATIVE TO DATA USAGE PATTERNS - Embodiments provide interactive prediction of network data consumption. Current data usage statistics are compared with a data usage plan. The current data usage statistics represent network data consumed by at least one computing device of the user. The network data is consumed during at least a portion of a pre-defined time interval of a data usage plan. For the given time interval, one of a plurality of pre-defined data usage states is assigned to the user, such as On Track, Off Track, Over Limit, and Under Track. In some embodiments, the user interacts with the data usage pattern to dynamically adjust for expected future use, which may change the currently assigned data usage state.08-01-2013
20130196618TRACKING DATA USAGE UNDER A SCHEMATIZED DATA PLAN - Embodiments provide a schema for representing data usage plans and data usage statistics. The data usage plan describes threshold values associated with network connections of computing devices of the user. A web service dynamically generates data usage statistics for the computing devices to represent data consumed by the computing devices under the data usage plan. The schema is updated with the data usage statistics and distributed to the computing devices for presentation to the user.08-01-2013
20130196621MANAGING NETWORK DATA TRANSFERS IN VIEW OF MULTIPLE DATA USAGE PLANS - Embodiments manage data transfers using a plurality of data usage plans available to a computing device. Each of the data usage plans has data usage statistics representing an amount of network data consumed under the data usage plan. For each data transfer request received from applications executing on the computing device, a service executing on the computing device or in a cloud defines a network data transfer configuration for performing the data transfer request. The network data transfer configuration is defined based on, for example, the data usage plans, the data usage statistics, and the data transfer request to reduce transfer costs and/or provide a particular quality of service (QoS).08-01-2013
20130196622UPDATING DYNAMIC DATA USAGE PLANS AND STATISTICS - Embodiments enable data usage plans and data usage statistics to be shared among user computing devices. In some embodiments, a web service receives a schema populated with data describing the data usage plan from a mobile operator. The web service distributes the populated schema to the user computing devices, and subsequently distributes updated portions of the schema as the data usage plan is updated by the mobile operator. The web service may also collect the data usage statistics from the user computing devices and the mobile operator, reconcile any differences, and send synchronization notifications to the user computing devices based on the reconciliation. In some embodiments, users are able to view bandwidth consumption by a plurality of user computing devices sharing the same data usage plan.08-01-2013
20130196626DYNAMICALLY ADJUSTING A DATA USAGE PLAN BASED ON DATA USAGE STATISTICS - Embodiments automatically adjust one or more terms of a data usage plan of a user to reduce network transfer costs for the user. Data usage statistics representing network data consumption by at least one computing device of the user are received or collected. The data usage plan is compared with the data usage statistics (e.g., to estimate any excess network transfer costs), and the data usage plan is adjusted accordingly and based on other data usage plans or adjustments that are available.08-01-2013
20130198062VALUE DETERMINATION FOR MOBILE TRANSACTIONS - Various embodiments provide techniques for determining a value share of a mobile transaction for one or more entities associated with the mobile transaction. Examples of mobile transactions include purchases of content such as applications, games, video, audio, graphics, and so on. In one or more embodiments, value share rules can be created and reconfigured. The value share rules specify a share of a transaction value (e.g., a percentage of revenue generated from a purchase of content) that an entity involved in a particular mobile transaction is credited with. In one example scenario, a user of a mobile device purchases an application for the mobile device. A value share rule can be applied to the application purchase amount to determine a share of the application purchase amount that is to be credited to a mobile operator that provides service for the mobile device.08-01-2013
20130198085APPLICATION LICENSING FOR DEVICES - A method, system, and computer-readable storage media for licensing an application for a device are provided herein. The method includes providing a license for an application from a licensing service to a number of computing devices associated with a user, wherein the license includes credentials. The method also includes associating the credentials with each computing device and periodically determining a state of a subscription corresponding to the license on each computing device. Each computing device is configured to call the licensing service at configurable time periods in order to determine the state of the subscription.08-01-2013
20130198132MINIMAL EXTENSIONS REQUIRED FOR MULTI-MASTER OFFLINE AND COLLABORATION FOR DEVICES AND WEB SERVICES - The claimed subject matter provides a system and/or a method that facilitates managing data consistency in connection with a plurality of devices. A collection of devices can be associated with a user. A web service can receive a portion of data from at least one device via an interface component, wherein the web service can host and relate the portion of data with an account for the user. A master sync component can leverage a computing resource from at least one device in order to maintain data consistency between at least one of the following: two or more devices within the collection of devices associated with the user; or the account hosted by the web service and two or more devices within the collection of devices associated with the user.08-01-2013
20130198142MIRRORING FILE DATA - High availability and disaster recovery can be achieved within a database management system by detecting which parts of a file have changed and sending the changed parts to secondary servers, without sending the entire file that has experienced the changes. A log cracker reads data from a transaction log that stores records from a database and a separately maintained file system. The log cracker sends mirror commands with some of the transaction log data to the file system to initiate mirroring of the data from the file system to secondary servers. The log data is then subsequently sent to the secondary servers as well, to enable identification of changed data without having to transfer the entire file that has been changed.08-01-2013
20130198220System Level Search User Interface - A system level search user interface that includes both a data entry portion and an application identification portion is displayed. User data input as a search term is displayed in the data entry portion, and identifiers of each of one or more applications of multiple applications on the computing device that can be searched using the search term are displayed in the application identification portion. The search term is provided to one application of the multiple applications for that one application to generate and display search results based on the search term while the display of at least the data entry portion of the system level search user interface is maintained.08-01-2013
20130198316SECURE RESOURCE NAME RESOLUTION USING A CACHE - Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user to be used during a name resolution process. In some implementations, when an identifier is obtained for a network resource, the identifier may be stored in a cache with resolution parameters that were used in obtaining the identifier. When a new name resolution request is received, the cache may be examined to determine whether a corresponding second identifier is in the cache, and whether resolution parameters used to retrieve the second identifier in the cache match the resolution parameters for the new resolution request. If so, the second identifier may be returned from the cache.08-01-2013
20130198373MANAGING DATA TRANSFERS OVER NETWORK CONNECTIONS BASED ON PRIORITY AND A DATA USAGE PLAN - Embodiments manage use of different network connections for data transfer in view of priority information and a data usage plan identifying threshold limits associated with the different network connections. A computing device receives data transfer requests from applications executing on the computing device. The data transfer requests have priority information associated therewith. The computing device compares the priority information with available network connections. One or more of the data transfer requests are selected for initiation based on the comparison and on the threshold limits.08-01-2013
20130198374ON-DEVICE ATTRIBUTION OF NETWORK DATA USAGE - Embodiments attribute network data transfers to applications executing on a computing device. A data transfer service executes on the computing device to receive and process data transfer requests. The data transfer requests, populated by the applications, have identifiers attributed thereto to enable monitoring of the network data transfers per identifier. For example, network data transfers associated with different mail accounts of a mail program or different web sites of browser are attributed separately. Data usage statistics relating to the network data transfers for each identifier may be generated and presented to the user for review.08-01-2013
20130198674SETTING CONTROL USING EDGES OF A USER INTERFACE - A setting control may be mapped to an edge of a user interface to facilitate control of various settings and access thereto. The mapping may be implemented based on a number of setting values associated with the setting control and a size of a specified edge of the user interface. Additionally, multiple edges of a user interface may be mapped to a variety of setting controls. The edge-mapped setting controls may also be automatically reconfigured according to user preferences and interaction with the interface. Indicators are also generated to provide visual indications about the setting controls and/or a current setting. The appearance of indicators may be altered to convey a variety of information such as the current setting of a control or the type of setting control.08-01-2013
20130198852APPLICATION LICENSING USING MULTIPLE FORMS OF LICENSING - A method, system, and computer-readable storage media for licensing an application using multiple forms of licensing are provided herein. The method includes providing a first form of a license to a first computing device via a licensing service and providing a second form of the license to a second computing device via the licensing service. The method also includes determining a first state of the first form of the license and a second state of the second form of the license, synchronizing the first state and the second state to form a combined license state, and adjusting conditions of the license based on the combined license state.08-01-2013
20130198856USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information.08-01-2013
20130198864LICENSING FOR SERVICES - A method, system, and computer-readable storage media for providing licensing for services are provided herein. The method includes determining, via a service partner, whether a user exists in a user provisioning cache and whether the user is provisioned to use a service provided by the service partner. The method also includes querying a licensing service to determine updates to the user provisioning cache if the user does not exist in the user provisioning cache or is not provisioned to use the service, or both. Further, the method includes determining whether the user is provisioned to use the service based on the updates to the user provisioning cache and, if the user is provisioned to use the service, allowing the user access to the service.08-01-2013
20130198866APPLICATION LICENSING USING SYNC PROVIDERS - A method, system, and computer-readable storage media for licensing an application using sync providers are provided herein. The method includes receiving a request for a license for an application from a client sync provider at a licensing service and receiving information relating to the license from a commerce partner offering the application via a commerce partner sync provider. The method also includes returning the license for the application to a client computing device, receiving information relating to a state of the license from the client sync provider, and adjusting conditions of the license according to the state of the license.08-01-2013
20130201407USER INTERFACE FOR OPERATING A COMPUTER FROM A DISTANCE - Switching between an arm's length user interface and a distance user interface is provided. A first user interface optimized to operate a computer from an arm's-length distance is presented on a display. A command is received. It is determined whether the command is from a wired device or a wirelessly-connected device. When the command is from a wired device, then the first user interface continues to be presented. When the command is from a wirelessly-connected device, then the display is toggled from the first user interface to the distance user interface. The distance user interface is optimized for operating the computer from a television-viewing distance. The television-viewing distance measured in feet is approximately half of a diagonal measure of the image displayed on the display device measured in inches.08-08-2013
20130203446PROVIDING LOCATION-BASED INFORMATION IN LOCAL WIRELESS ZONES - Mobile terminals to receive location-based information upon entering a local wireless zone established by an access point are described. The access point includes or is associated with one or more servers, which may provide the location-based information and control access. The local wireless zone is a limited area in which communications between the access point and the mobile terminal are possible. Once the mobile terminal enters into one or more local wireless zones, the presence of the mobile terminal in the local wireless zone is detected. Once detected, the mobile terminal is afforded access to a server on which the location-based information is stored. The server is associated with the local wireless zone.08-08-2013
20130204839Validating Files Using a Sliding Window to Access and Correlate Records in an Arbitrarily Large Dataset - Data records in files may be validated by sequentially accessing the data records while allowing random data access within a sliding window. The data records may also be validated by caching record values. Variable-length record lists in one or more files may be reduced to fixed length record lists while accessing arbitrary record list items.08-08-2013
20130205226Instant Messaging Activity Notification - User activity is communicated in a messaging system. Communication is performed by monitoring an input region displayed to a first user of the messaging system in a client executed at a user terminal of the first user; responsive to receiving a user activated input at the input region, analyzing the input and using the analysis to match the input to a type of user activity from a predetermined set of user activities; and transmitting a message comprising data representing the type of user activity from the user terminal of the first user to a user terminal of at least one other user of the messaging system over a communications network.08-08-2013
20130205241SEARCHING COMMAND ENHANCEMENTS - A user can access a searching component that allows the user to enter search terms to search for commands associated with a computer program. Some specific embodiments pertain to methods for supporting user access to the searching component, to methods for processing search terms submitted by the user, and to methods for guiding the user in terms of their formulation and selection queries. Methods for generating, organizing and manipulating the search results are also provided.08-08-2013
20130205291Recipe-Based Application Conversion - An installation package associated with an application is obtained. Installation of the application in a first type of system is analyzed based at least in part on the installation package. A first set of changes made to the first type of system resulting from installation of the application in the first type of system is identified. Based on the first set of changes, a second set of changes made to a second type of system resulting from installation of the application in the second type of system is identified, and a recipe identifying the second set of changes is generated. A new installation package associated with the application can also be generated. This new installation package is configured for installation of the application on the second type of system, and is based at least in part on both the recipe and the installation package08-08-2013
20130205308Interface for Displaying Content Supporting Hardware Acceleration - One or more application programming interfaces (APIs) are exposed by a host program running on a device to facilitate a control program displaying content in a window in which the host program displays content. As part of an API, a method is exposed that the control program can invoke to pass to the host program a definition of a surface presenter to be created by the host program. Additionally, the control program can store content that the control program desires to have presented in a buffer of the surface presenter, and invoke another method exposed as part of an API to pass to the host program an indication of the content that the control program desires to have displayed in the window in which the host program displays content.08-08-2013
20130205372AUTHORIZATION OF DEVICE ACCESS TO NETWORK SERVICES - The invention provides for authorization of devices entering a network. A new device entering a network sends an authorization request. Another device in the network may receive the request and display a User Interface (UI) which prompts the user to approve the device. The user can use a device identifier provided by the new device in approving the new device. Assuming the identifier provided by the new device matches an identifier accessible by the authorizing device, the user authorizes the new device. A key is then generated for the new device, which allows access to an appropriate range of network services. Authorization decisions can be synchronized among the various devices in a network, so even if an authorizing device leaves the network, the new device key can be validated. A security service can be replicated in a new device once the device is authorized to access the network.08-08-2013
20130205382Resource Access Based on Multiple Credentials - A collection of multiple user credentials each associated with one of multiple different users is obtained at a device, and one or more of the multiple user credentials are verified. A determination is made as to whether access to a resource is permitted, by at least comparing the collection of multiple user credentials to a threshold combination of user credentials to be satisfied to access the resource. An indication of whether access to the resource by a requesting user is permitted is returned or provided to another device.08-08-2013
Website © 2015 Advameg, Inc.