Patent application number | Description | Published |
20080307411 | SOFTWARE EXECUTION WITH MINIMAL IMPACT DEPLOYMENT - Software execution with minimal impact deployment allows software to be executed on a system without first running a conventional installation process. Techniques are used to avoid any requirement of writing settings to restricted areas of operating system maintained data stores. | 12-11-2008 |
20090106736 | Heuristics for determining source code ownership - Various technologies and techniques are disclosed for using heuristics to determine source code ownership. A request is received to identify at least one owner of a particular source code unit. Initial ownership totals are calculated for the source code unit based upon a code contribution heuristic. The code contribution heuristic counts lines of code that were added and that were modified in the totals for contributing users. The initial ownership totals of the particular source code unit are adjusted based upon at least one other heuristic. The at least one owner of the particular source code unit is then output to an output device. The at least one owner is determined by selecting a contributing user that has a highest ranking total after adjusting the initial ownership totals. For example, there can be a primary owner and a backup owner selected based on the ranking of the ownership totals. | 04-23-2009 |
20090222762 | CASCADING ITEM AND ACTION BROWSER - In one or more embodiments, a cascading item and action browser enables items and associated actions to be displayed. In at least some embodiments, items are presented in a column and can be selected by a user. Responsive to selecting a particular item or items, actions that can be performed on or relative to a selected item or items can be presented in a second adjacent column. From here, users can select one or more actions that can be performed on items presented in the first-mentioned column. Results of the action or actions being performed, at least some of which can include additional items, can then be presented in a next-adjacent column. Navigation through the items and actions displayed in their respective columns can then continue in a cascaded fashion. | 09-03-2009 |
20100070497 | Automated Criterion-Based Grouping and Presenting - Interrelated items in a complex item set (such as a set of components in a complex software architecture) may be difficult to present in a manner that facilitates an understanding and evaluation of the item set, due to the amount of information and the difficulty in automatically discerning the organization of the item set. A set of criteria may be utilized to form criterion groups to which items matching respective criteria may be automatically assigned. Further grouping assignments may be achieved by identifying an ungrouped item that is associated with a grouped item. Such techniques may be applied in many variations to yield a representation of the item set, and a presentation of the item set to a user, that aggregates similar items and interrelationships, thereby promoting an understanding and analysis of the structure and organization of the item set while reducing the user involvement in the generation of same. | 03-18-2010 |
20100077324 | PLUGGABLE PRESENTATION AND DOMAIN COUPLING - User interface functionality in a presentation layer is coupled with data and data processing functionality of an application in a domain-specific layer. A UI-element-factory-registrar supports registration of a UI-element-factory with the domain-specific layer for invoking a UI-element to create a UI-element object. The UI-element object is bound to a domain-specific data-source object. The presentation layer may be asynchronously notified of changes in the data-source object. Data-converter objects may be provided to convert between data formats, e.g., from a native code domain-specific layer format to a managed code presentation layer format. | 03-25-2010 |
20100077475 | PARTIAL INSTALLATION BASED ON AVAILABLE PRIVILEGES - Component identifications in a package identify components to be installed and/or components to be uninstalled. Each component has one or more install-uninstall-privilege requirements, namely, credentials that must be available to an installer-uninstaller in order to install-uninstall that component. Individual components and component sets are installed and/or uninstalled based on the privilege requirement(s) and the privilege(s) available to a current user of a target system. If required privilege(s) are not available, notice is given and additional privileges are requested. A user may receive partial functionality from a partially completed installation, and additional components may be installed later as more privileges become available. | 03-25-2010 |
20100242027 | IDENTIFYING GROUPS AND SUBGROUPS - Aspects of the subject matter described herein relate to automatically identifying groups and subgroups in dependency data. In aspects, a data structure that indicates dependencies between components is analyzed to create groups that are related by dependencies. The groups are further analyzed to create subgroups that depend on shared components but that do not depend on each other. Information about the components is used to generate names for the groups that are indicative of the components included in the groups. The groups, their names, and their relationships may then be displayed. | 09-23-2010 |
20100329461 | AUTOMATIC DETECTION OF WIRELESS NETWORK TYPE - A system and method for facilitating automatic detection of a type of wireless network is provided. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted net work requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled net work supporting WPA anchor an IEEE 802.1x enabled network not supporting WPA. In accordance with an aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks The detection component identities a type of an available wireless network. Identification can be based for example, upon information received in an information element and/or iterative probing of the wireless network beacon. | 12-30-2010 |
20110249002 | MANIPULATION AND MANAGEMENT OF LINKS AND NODES IN LARGE GRAPHS - Scalable architecture for managing and rendering a large graph containing a large number of nodes and edges. The user can group arbitrary nodes to encapsulate complexity without losing any of the cross-group edges dependencies. All edges of the nodes contained in the group are rolled up into roll-up links (or “arteries”) where the graphical thickness indicates relatively how many links are bundled. By collapsing groups the entire view gives the user a clearer understanding of the graph. Information related to the groups and links is retained for drill-into to obtain the details inside each group on the same canvas and for user navigation across groups. | 10-13-2011 |
20110252396 | GENERATING EXCEPTION-BASED COMPONENT MODELS FROM NON-EXCEPTION-BASED MODELS - Exception-based component models can be generated from non-exception-based models. For example, a non-exception-based interface contract (such as a non-exception-based interface contract in a header file) for a consumable software component can be parsed. Additionally, a wrapper for the consumable software component can be generated from the non-exception-based interface contract. The wrapper can have an exception-based interface contract implementation, and the exception-based interface contract implementation can be a mirror equivalent of the non-exception-based interface contract. If the non-exception-based interface contract hints at one or more arguments as being out argument(s) for a function in the consumable software component, then predefined heuristics can be used to select one of those argument(s) to be used by the exception-based interface contract implementation as a return value for the function. | 10-13-2011 |
20130036453 | SYSTEM, METHOD AND USER INTERFACE FOR NETWORK STATUS REPORTING - A method and user interface for informing a user of the status of a network connection are provided. Conventionally, the “connected” icon in the system tray only informs the user that the computer is linked to a network medium, such as an Ethernet or wireless access point. This icon does not indicate whether a routable IP address has been obtained. In this invention, an icon is used to inform the user that the network connection is disabled, connecting, connected (routable IP address obtained), or in a warning state. The warning state indicates that a non-routable IP address (e.g. auto net address) has been obtained, which will likely be unsatisfactory to the user. However, when connected to an 802.11 ad-hoc network, or when IP status checking is disabled, a non-routable IP address is deemed acceptable, and thus the “connected” icon is displayed. | 02-07-2013 |
20130298204 | Automatic Detection of Wireless Network Type - Techniques for facilitating automatic detection of a type of wireless network are described. In accordance with one or more embodiments, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. In accordance with one or more embodiments, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identifies a type of an available wireless network. Identification can be based, for example, upon information received in an information element and/or iterative probing of the wireless network beacon. | 11-07-2013 |