Generally, program modules include routines, programs, objects, components, data structures, and so forth, which perform particular tasks or implement particular abstract data types. Aspects of the subject matter described herein may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices. A computer may include any electronic device that is capable of executing an instruction.
Components of the computer may include a processing unit , a system memory , and a system bus that couples various system components including the system memory to the processing unit The system bus may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
Computer-readable media can be any available media that can be accessed by the computer and includes both volatile and nonvolatile media, and removable and non-removable media.
By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs DVDs or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer Source: US Patent Office.
Skip to content Uncategorized. Microsoft also alleges that Mullor ran programs on his laptop in an effort to wipe any evidence that would show he had downloaded the files. The software giant was able to detect which programs he ran and was able to recover some of the documents that he downloaded, according to the suit.
Also, Microsoft says it has e-mail evidence that in , before Mullor applied for a job at the software company, he was already planning to file the patent infringement suit. Filed: June 23, Aggregation-based determination of cloud computing service resiliency to chaos events. Abstract: Techniques are described herein that are capable of performing an aggregation-based determination of resiliency of a cloud computing service to chaos events.
Chaos events are executed against a cloud computing service during a time frame that includes multiple time periods. For each chaos event, service health indexes SHIs that correspond to the time periods are calculated. Each SHI indicates an extent to which indicators, which represent respective measurements of performance of the cloud computing service during the respective time period, satisfy respective criteria.
The SHIs for each chaos event are analyzed to provide a respective resiliency score. At least some of the resiliency scores of the respective chaos events are aggregated to provide an aggregated resiliency score, which represents resiliency of the cloud computing service to the chaos events.
Filed: January 8, Enhanced pivot table creation and interaction. Abstract: Systems, methods, and software are disclosed herein for enhanced pivot table creation and interaction. In an implementation, a view including a formula bar is rendered in a user interface to a spreadsheet application. In response to receiving a user initialization input, the view is rendered to hide the formula bar and display a configuration bar configured to receive at least one pivot table parameter.
A pivot table is generated based on the at least one pivot table parameter. The view is rendered to display the formula bar after generation of the pivot table. Filed: February 17, Managing data transfers over network connections based on priority and a data usage plan.
Abstract: Embodiments manage use of different network connections for data transfer in view of priority information and a data usage plan identifying threshold limits associated with the different network connections. A computing device receives data transfer requests from applications executing on the computing device. The data transfer requests have priority information associated therewith. The computing device compares the priority information with available network connections. One or more of the data transfer requests are selected for initiation based on the comparison and on the threshold limits.
Filed: January 19, Self-describing interfaces for communication with gateways. Abstract: In one aspect, a request is sent to a device for a device descriptor that describes custom interfaces. The custom interfaces may be expressed according to a defined data structure.
The device descriptor that describes the custom interfaces is received at a gateway. An interface agnostic application is executed to translate the device descriptor to the custom interfaces for consumption of the data described by the custom interfaces. Inventors: Mei L. Activity-and dependency-based service quality monitoring. Abstract: Evaluation of a plurality of activities comprising a service includes, for each of the plurality of activities, identification of a network service path of the activity from the source to the user, wherein a network service path of a first activity of the plurality of activities is different from a network service path of at least one other of the plurality of activities, measurement of a service quality metric for each respective network segment of each identified network service path, and, for each of the plurality of activities, determination of a service quality metric based on the service quality metrics measured for each of the network segments of the network service path of the activity.
Filed: June 8, Publication number: Abstract: An automated natural dialogue system provides a combination of structure and flexibility to allow for ease of annotation of dialogues as well as learning and expanding the capabilities of the dialogue system based on natural language interactions.
Type: Application. Filed: September 21, Publication date: January 6, Abstract: Methods and systems are disclosed for optimizing record placement in defragmenting a graph database. Issues with fragmented data within a graph database are addressed on the record level by placing data that is frequently accessed together contiguously within memory.
Based on statistics regarding normal query patterns, the systems and methods may identify an optimal position for certain types of edges that are often traversed with respect to particular types of nodes. Merged and actionable history feed. Abstract: Aspects of the present disclosure relate to systems and methods for merging versions and activities associated with a file into a history feed and displaying the history feed on a user interface of a client computing device.
In one aspect, a file is identified and activities associated with the file are also identified. It may be determined whether the file has at least one activity. When it is determined that the file has at least one activity, at least one actionable history element for the at least one activity is generated. Additionally, the generated history elements are merged to generate a history feed.
The history feed is displayed on a user interface. The history feed may be displayed with an application that has opened the file. Filed: January 18, Date of Patent: January 4, Filed: May 11, Inventors: Omar Carey, Rajsekhar Das.
Scoping the lifetime of personal devices connected to communal computing devices. Abstract: A communal computing device, like an interactive digital whiteboard, can detect the start and end of user sessions with the device. When a communal computing device detects the end of a user session, the it can determine if a personal device that was connected at the start of the user session or during the user session was also connected at the end of the user session. If so, the device can initiate actions based on the session start or end signals such as, but not limited to, transmitting a message to an organizer of a meeting scheduled during the time of the user session, transmitting a message to a participant of a meeting scheduled during the time of the user session, transmitting a message to an administrator, or generating a notification, such as a user interface reminding a user to take their personal device.
Filed: December 28, Inventors: John C. Device provisioning. Abstract: A facility for provisioning a device is described. The facility discerns an identifier that identifies the device, and transmits the identifier to a server computer system.
The facility receives from the server computer system provisioning measures specified for the device. In response to receiving the specified provisioning measures, the facility performs the specified provisioning measures on the device.
Filed: March 25, Document annotation based on enterprise knowledge graph. Abstract: Examples described herein generally relate to a computer system including a knowledge graph storing a plurality of entities.
The computer system generates an Aho Corasick trie including an entity name for each of the plurality of entities in the knowledge graph. The computer system compares a document viewed by a user to a plurality of templates defining potential entity names to identify extracts of the document matching at least one of the plurality of templates. The computer system applies the document to the Aho Corasick trie to determine potential entity names within the document that each match a respective one of the plurality of entities in the knowledge graph.
The computer system annotates one or more matching entity names within the document with information from the knowledge graph for the respective ones of the plurality of entities to show, for example, a topic card providing information about the respective entities. Filed: January 6, Providing automated user input to an application during a disruption. One example method involves detecting a disruption to an interactive application during interaction by a user with the interactive application, generating automated user inputs, and providing the automated user inputs to the interactive application during the disruption to the interactive application.
Filed: October 22, Computer proxy messaging bot. Abstract: A computer system can conduct corresponding natural language dialogs with multiple computer-readable profiles using a computer proxy messaging bot. For example, a first set of natural language instructions can be received via a computer messaging proxy bot from a first computer-readable profile.
The first set of natural language instructions can be analyzed via the proxy bot. The patent process. Expand All Collapse All. Patent Program teams. Patent pending. Smart Netting System This Ohio high school team invented an intelligent netting system to decrease man-made debris that enter waterways from residential storm drains, posing a threat to animals who reside in nearby creeks and rivers.
Learn more about this system. Learn more about the device. Patent granted. Learn more about this creation. Learn more about the monitor. Learn about Base Operations. Underwater Camera This high school team developed an underwater camera to study the prevalence of invasive species in the Great Lakes.
Learn about their invention. Smart Wallet This high school team developed a smart wallet that helps people who are blind or low vision sort their money into their wallet.
Learn about the smart wallet. Tactile With only hours to spare at a hackathon, these female MIT engineering students developed a text-to-Braille device. Learn more about Tactile.
0コメント