Patent application number | Description | Published |
20130311973 | Assisting Development Tools Through Inserted Code Statements - Aspects of the subject matter described herein relate to assisting development tools. In aspects, statements that influence runtime behavior may be inserted into code of a program. For example, a statement inserted into a function may set a property of a runtime object to indicate that a debugger is to be notified for exceptions that are encountered within the scope of the function. When a runtime environment encounters an exception, the runtime environment may determine whether the property applies to the currently-executing scope. If so, the runtime environment may notify or not notify a development tool of the exception based on the value of the property. | 11-21-2013 |
20140053142 | Imperative Attribution for Elements in Managed Runtimes - Aspects of the subject matter described herein relate to imperative attribution. In aspects, metadata of a managed runtime environment may be set by imperative statements included in code of a program executing in the managed runtime environment. The metadata may be associated with lookup data that identifies the metadata. The lookup data may be formed from an identifier supplied by an imperative statement and an identifier of a logical element which may be explicitly or implicitly supplied. The metadata may be computed at parse time, run time, or another time and may be computed based on state available to a managed runtime environment at the time the metadata is computed. | 02-20-2014 |
20140068544 | OBTAINING METADATA SET BY IMPERATIVE STATEMENT - Aspects of the subject matter described herein relate to imperative attribution. In aspects, metadata of a managed runtime environment may be set by imperative statements included in code of a program executing in the managed runtime environment. A metadata consumer may request the metadata. A metadata identifier of the metadata requested may be provided implicitly or explicitly. A parameter that indicates how to obtain the metadata may also be provided. In response, the metadata may be obtained and provided. The metadata may be computed at parse time, run time, or another time and may be computed based on state available to a managed runtime environment at the time the metadata is computed. | 03-06-2014 |
20140366007 | DEBUGGING NATIVE CODE BY TRANSITIONING FROM EXECUTION IN NATIVE MODE TO EXECUTION IN INTERPRETED MODE - A dual-mode debugger can debug native code or interpreted code. Transitioning between modes can be triggered by defined bailout conditions. A program can be debugged by attaching a debugger and compiling the program into native code under the debugger. At defined points in the program, debugging can transition from native mode to interpreted mode. Debugging the native code can stop, current state can be captured, and an interpreter can be instantiated. An interpreter stack can be created and can be populated with the captured current state. Debugging operations which involve execution control: pausing execution, continuing execution, stepping into, out of or over a section of code and so on, can occur in interpreted mode, which is typically easier to implement. Debugging operations which involve inspection and modification of variables can occur in native mode. | 12-11-2014 |
Patent application number | Description | Published |
20090013266 | Finding and Consuming Web Subscriptions in a Web Browser - A content syndication platform, such as a web content syndication platform, manages, organizes and makes available for consumption content that is acquired from the Internet. In at least some embodiments, the platform can acquire and organize web content, and make such content available for consumption by many different types of applications. These applications may or may not necessarily understand the particular syndication format. An application program interface (API) exposes an object model which allows applications and users to easily accomplish many different tasks such as creating, reading, updating, deleting feeds and the like. Further, in at least some embodiments, a user can subscribe to a particular web feed, be provided with a user interface that contains distinct indicia to identify new feeds, and can efficiently consume or read RSS feeds using both an RSS reader and a web browser. | 01-08-2009 |
20090019063 | Finding and Consuming Web Subscriptions in a Web Browser - A content syndication platform, such as a web content syndication platform, manages, organizes and makes available for consumption content that is acquired from the Internet. In at least some embodiments, the platform can acquire and organize web content, and make such content available for consumption by many different types of applications. These applications may or may not necessarily understand the particular syndication format. An application program interface (API) exposes an object model which allows applications and users to easily accomplish many different tasks such as creating, reading, updating, deleting feeds and the like. Further, in at least some embodiments, a user can subscribe to a particular web feed, be provided with a user interface that contains distinct indicia to identify new feeds, and can efficiently consume or read RSS feeds using both an RSS reader and a web browser. | 01-15-2009 |
20140081942 | Automatic Browser Search Provider Detection and Usage - Various embodiments enable a web site to expose various search providers that it promotes to browsers that navigate to that site. In at least some embodiments, the search providers are exposed using the HTML of a web page. When a browser navigates to that site, it processes the HTML of the associated web page and exposes the promoted search providers to the user. In at least some embodiments, the browser can permit use of one or more search providers without requiring the user to install the search provider. Alternately or additionally, in at least some other embodiments, the browser can enable the user to quickly and efficiently install the search provider so that the search provider can be available whenever the user uses their browser application. | 03-20-2014 |
20140115109 | Content Syndication Platform - A content syndication platform, such as a web content syndication platform, manages, organizes and makes available for consumption content that is acquired from the Internet. In at least some embodiments, the platform can acquire and organize web content, and make such content available for consumption by many different types of applications. These applications may or may not necessarily understand the particular syndication format. An application program interface (API) exposes an object model which allows applications and users to easily accomplish many different tasks such as creating, reading, updating, deleting feeds and the like. | 04-24-2014 |
20160057241 | Finding And Consuming Web Subscriptions In A Web Browser - A content syndication platform, such as a web content syndication platform, manages, organizes and makes available for consumption content that is acquired from the Internet. In at least some embodiments, the platform can acquire and organize web content, and make such content available for consumption by many different types of applications. These applications may or may not necessarily understand the particular syndication format. An application program interface (API) exposes an object model which allows applications and users to easily accomplish many different tasks such as creating, reading, updating, deleting feeds and the like. Further, in at least some embodiments, a user can subscribe to a particular web feed, be provided with a user interface that contains distinct indicia to identify new feeds, and can efficiently consume or read RSS feeds using both an RSS reader and a web browser. | 02-25-2016 |
Patent application number | Description | Published |
20120167185 | REGISTRATION AND NETWORK ACCESS CONTROL - In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client device to access a secure network utilizing extensible authentication protocol (EAP), and the request is communicated to an authentication service to authenticate a user of the client device based on user credentials. In another embodiment, a network interface device can receive a network access request from a client device to access a Web site in a public network utilizing a universal access method (UAM), and the request is redirected to the authentication service to authenticate a user of the client device based on user credentials. | 06-28-2012 |
20140237250 | Registration and Network Access Control - In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client device to access a secure network utilizing extensible authentication protocol (EAP), and the request is communicated to an authentication service to authenticate a user of the client device based on user credentials. In another embodiment, a network interface device can receive a network access request from a client device to access a Web site in a public network utilizing a universal access method (UAM), and the request is redirected to the authentication service to authenticate a user of the client device based on user credentials. | 08-21-2014 |
20150326560 | REGISTRATION AND NETWORK ACCESS CONTROL - In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client device to access a secure network utilizing extensible authentication protocol (EAP), and the request is communicated to an authentication service to authenticate a user of the client device based on user credentials. In another embodiment, a network interface device can receive a network access request from a client device to access a Web site in a public network utilizing a universal access method (UAM), and the request is redirected to the authentication service to authenticate a user of the client device based on user credentials. | 11-12-2015 |
Patent application number | Description | Published |
20120124064 | TRANSFORMATION OF REGULAR EXPRESSIONS - Techniques to transform regular expressions are described. An apparatus may comprise a processor circuit and a key terms identifying module operative on the processor circuit to generate a set of one or more regular expression key terms from enabled features of a regular expression based on a set of configuration parameters, and filter one or more electronic messages using the set of regular expression key terms. Other embodiments are described and claimed. | 05-17-2012 |
20120215853 | Managing Unwanted Communications Using Template Generation And Fingerprint Comparison Features - Unwanted communication detection and/or management features are providing, including using one or more commonality measures as part of generating templates for fingerprinting and comparison operations, but the embodiments are not so limited. An computing architecture of one embodiment includes components configured to generate templates and associated fingerprints for known unwanted communications, wherein the template fingerprints can be compared to unknown communication fingerprints as part of determining whether the unknown communications are based on similar templates and can be properly classified as unwanted or potentially unsafe communications for further analysis and/or blocking. A method of one embodiment operates to use a number of template fingerprints to detect and classify unknown communications as spam, phishing, and/or other unwanted communications. | 08-23-2012 |
20130204609 | LANGUAGE INDEPENDENT PROBABILISTIC CONTENT MATCHING - Content is received and compared against rules for identifying a type of content. Each rule has both segmented and unsegmented patterns. The content is matched against the patterns and assigned a confidence score that is higher if the content matches a segmented pattern and lower if the content matches an unsegmented pattern. | 08-08-2013 |
20130339288 | DETERMINING DOCUMENT CLASSIFICATION PROBABILISTICALLY THROUGH CLASSIFICATION RULE ANALYSIS - A classification application identifies patterns and evidences within representative documents. The application constructs a classification rule according to an entity and an affinity determined from the patterns and evidences. The application processes the representative documents with the classification rule to evaluate whether the rules meet acceptance requirements. Subsequent to a successful evaluation, the application identifies confidence levels for patterns and evidences within other documents. | 12-19-2013 |
20130339456 | TECHNIQUES TO FILTER ELECTRONIC MAIL BASED ON LANGUAGE AND COUNTRY OF ORIGIN - Techniques to detect spam using language and a country of origin of an e-mail may include receiving an e-mail message for a recipient, detecting a country of origin for the e-mail message and detecting a language of the e-mail message. A technique may further include determining a country frequency with which the recipient communicates with the country of origin by e-mail, and a language frequency with which the recipient communicates in the language by e-mail. A technique may assign a first score to the message according to the country frequency, and a second score to the message according to the language frequency. The scores may used to determine whether the e-mail message is spam. Other embodiments are described and claimed. | 12-19-2013 |
20140006522 | TECHNIQUES TO SELECT AND PRIORITIZE APPLICATION OF JUNK EMAIL FILTERING RULES | 01-02-2014 |
20150052207 | FILTERING ELECTRONIC MESSAGES BASED ON DOMAIN ATTRIBUTES WITHOUT REPUTATION - A messaging application filters electronic messages based on domain attributes without a reputation. A message with a uniform resource identifier (URI) is received and determined to not be included within a trusted or a block list. A total score is computed from weighted scores assigned to factors associated with the message. The message is evaluated for an unsolicited message determination by comparing the total score against a predetermined threshold. | 02-19-2015 |
20160072752 | FILTERING ELECTRONIC MESSAGES BASED ON DOMAIN ATTRIBUTES WITHOUT REPUTATION - A messaging application filters electronic messages based on domain attributes without a reputation. A message with a uniform resource identifier (URI) is received and determined to not be included within a trusted or a block list. A total score is computed from weighted scores assigned to factors associated with the message. The message is evaluated for an unsolicited message determination by comparing the total score against a predetermined threshold. | 03-10-2016 |
Patent application number | Description | Published |
20090327482 | RELIABLE AND ACCURATE USAGE DETECTION OF A SOFTWARE APPLICATION - Use of software applications is detected by categorizing components of applications into a usage manifest and implementing a usage detection background service on a client PC that monitors the components according to the usage manifest. The application components are categorized based on the mode of user interaction as well as the component's correlation to active use of an application. The background service tracks events and activities associated with the application components to generate usage metrics that include the frequency of unique launches of an application and the duration of each unique use. A usage manager for the background service may utilize the usage metrics for a component independently, or combine metrics for multiple components in cases where applications work in an interactive manner (such as a plug-in to a web browser) in order to compute application usage by comparing the metrics against predefined thresholds. | 12-31-2009 |
20120110003 | CONDITIONAL EXECUTION OF REGULAR EXPRESSIONS - Embodiments directed to conditionally executing regular expressions and to simplifying regular expressions by canonicalizing regular expression terms. In an embodiment, a computer system accesses identified regular expression key terms that are to appear in a selected portion of text. The regular expression key terms are identified from terms in a selected regular expression. The computer system determines whether the identified regular expression key terms appear in the selected portion of text. The computer system also, upon determining that none of the identified regular expression key terms appears in the selected portion of text, prevents execution of the regular expression. Upon determining that at least one of the identified regular expression key terms appears in the selected portion of text, the computer system executes the regular expression. | 05-03-2012 |
20120117080 | INDEXING AND QUERYING HASH SEQUENCE MATRICES - Embodiments are directed to indexing and querying a sequence of hash values in an indexing matrix. A computer system accesses a document to extract a portion of text from the document. The computer system applies a hashing algorithm to the extracted text. The hash values of the extracted text form a representative sequence of hash values. The computer system inserts each hash value of the sequence of hash values into an indexing matrix, which is configured to store multiple different hash value sequences. The computer system also queries the indexing matrix to determine how similar the plurality of hash value sequences are to the selected hash value sequence based on how many hash values of the selected hash value sequence overlap with the hash values of the plurality of stored hash value sequences. | 05-10-2012 |
20120158768 | DECOMPOSING AND MERGING REGULAR EXPRESSIONS - The present invention extends to methods, systems, and computer program products for decomposing and merging regular expressions. Embodiments of the invention decompose a regular expression into multiple simple keyword graphs, merge those keyword graphs in a compact and efficient manner, and produce a directed acyclic graph (DAG) that can execute a simplified regular expression alphabet. Several of these regular expression DAG's can then be merged together to produce a single DAG that represents an entire collection of regular expressions. DAGs along with other text processing algorithms and a heap collection can be combined in a multi-pass approach to expand the regular expression alphabet. | 06-21-2012 |
20120303624 | DYNAMIC RULE REORDERING FOR MESSAGE CLASSIFICATION - Embodiments are directed to generating a customized classification rule execution order and to identifying optimal ordering rules for previously processed data. In an embodiment, a computer system fingerprints a message received via a computer network. The fingerprinting identifies specific characteristics of the message. The computer system compares the message's fingerprint to various stored message fingerprints generated from previously received messages. The comparison determines that the fingerprint does not match the stored fingerprints. The computer system applies classification rules to the message according to a predetermined rule execution order to determine a classification for the message. The computer system then generates a customized classification rule execution order to order those classification rules that optimally identified the message's class at the top of the customized classification rule execution order. | 11-29-2012 |
Patent application number | Description | Published |
20090164535 | DISK SEEK OPTIMIZED FILE SYSTEM - A disk-seek optimized file system is provided that may be advantageously deployed in a computer system that supports simultaneous Digital Video Recorder (DVR) functionality and user interaction, such as recording several television (TV) shows while simultaneously supporting a video game played by a user. A computing device hard drive is logically divided into “chunks,”—a first chunk comprising volume metadata, and subsequent chunks comprising equal size “blocks.” A first block of a subsequent chunk comprises block bitmaps and a stream identifier table. The block bitmaps indicate subsequent blocks in the chunk that contain stream data for particular streams, which are identified in corresponding entries in the stream identifier table. | 06-25-2009 |
20120284393 | Data Transmission Between Devices Based on Bandwidth Availability - In one embodiment, in response to data to be transmitted to or from an electronic device, the electronic device determines whether the electronic device currently has a first network connection with a sufficiently high bandwidth. If the electronic device currently does not have a first network connection with a sufficiently high bandwidth, then the electronic device estimates a future time when the electronic device is likely to have a second network connection with a sufficiently high bandwidth, and schedules transmission of the data at the future time. | 11-08-2012 |
20130055072 | Multi-Threaded Graphical Display System - In one embodiment, a computer program executed by a main processor of a computing device renders a web page in a graphical user interface by generating a plurality of render object data structures for the web page, generating a raster image for each of the plurality of render object data structures, and creating a separate thread configured to be executed by a graphics processor of the computing device to composite the raster images into one image to be displayed in the graphical user interface. | 02-28-2013 |
20130117832 | Identity Verification and Authentication - In one embodiment, receiving, at a first computing device associated with a social-networking system and from a second computing device, a first request to verify an identity of a user of the social-networking system; sending, by the first computing device and to a mobile device associated with the user, a second request for information about the user; receiving, at the first computing device and from the mobile device, the information about the user; determining, by the first computing device, a confidence score indicating a probability that the identity of the user is true based on the information about the user received from the mobile device and information available to the social-networking system; and sending, by the first computing device and to the second computing device, the confidence score. | 05-09-2013 |
20130185548 | Multiple System Images for Over-The-Air Updates - In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the data is maintained by checking a hash value of the downloaded system image. | 07-18-2013 |
20130185563 | Multiple System Images for Over-The-Air Updates - In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the data is maintained by checking a hash value of the downloaded system image. | 07-18-2013 |
20130211821 | User Experience with Customized User Dictionary - In one embodiment, constructing one or more customized dictionaries for a particular user, each of the customized dictionaries comprising a different blending of one or more frequently used words collected from texts submitted by one or more users; and in response to the user inputting text to an electronic device, selecting one of the customized dictionaries and utilizing it to aid the particular user in inputting text. | 08-15-2013 |
20130211824 | Single Identity Customized User Dictionary - In one embodiment, constructing a set of customized dictionaries for a particular user, each of the customized dictionaries in the set comprising a different blending of one or more frequently used words collected from texts submitted by one or more users; and sending a copy of the set of customized dictionaries to each of a plurality of electronic devices associated with the particular user to be stored on the electronic device and to aid the particular user in inputting text to the electronic device. | 08-15-2013 |
20130211825 | Creating Customized User Dictionary - In one embodiment, collecting a plurality of words from texts submitted by one or more users; for each of a plurality of communication categories, determining a usage frequency of each of one or more of the words within the communication category based on the texts; and constructing one or more customized dictionaries that each comprise a different blending of selected words. | 08-15-2013 |
20130211915 | Advertising Based on Customized User Dictionary - In one embodiment, constructing one or more customized dictionaries for a particular user, each customized dictionary comprising a different blending of one or more frequently used words collected from texts submitted by one or more users; determining one or more customized advertisements for the particular user based on the customized dictionaries; and presenting the customized advertisements to the particular user. | 08-15-2013 |
20140095419 | Enhanced Predictive Input Utilizing a Typeahead Process - Particular embodiments may retrieve information associated with one or more nodes of a social graph from one or more data stores. A node may comprise a user node or a concept node. Each node may be connected by edges to other nodes of a social graph. A first user may be associated with a first user node of the social graph. Particular embodiments may detect that the first user is entering an input term. Predictive typeahead results may be provided as the first user enters the input term. The predictive typeahead results may be based on the input term. Each predictive typeahead result may include at least one image. Each predictive typeahead result may correspond to at least one node of the social graph. | 04-03-2014 |
20140095857 | Multiple System Images for Over-The-Air Updates - In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the data is maintained by checking a hash value of the downloaded system image. | 04-03-2014 |
20140317614 | Multiple System Images for Over-The-Air Updates - In one embodiment, a client computing device may execute software from a first portion of memory of the client computing device. The client computing device may request from a server an over-the-air (OTA) update to the software. The client computing device may receive from the server a manifest for the OTA update. The client computing device may download from the server a payload pursuant to the manifest. The client computing device may install the payload into a second portion of memory of the client computing device, and execute the software from the second portion of memory. | 10-23-2014 |
20150113625 | Identity Verification And Authentication - In one embodiment, receiving, at a first computing device associated with a social-networking system and from a second computing device, a first request to verify an identity of a user of the social-networking system; sending, by the first computing device and to a mobile device associated with the user, a second request for information about the user; receiving, at the first computing device and from the mobile device, the information about the user; determining, by the first computing device, a confidence score indicating a probability that the identity of the user is true based on the information about the user received from the mobile device and information available to the social-networking system; and sending, by the first computing device and to the second computing device, the confidence score. | 04-23-2015 |
20150261742 | ENHANCED PREDICTIVE INPUT UTILIZING A TYPEAHEAD PROCESS - Particular embodiments may retrieve information associated with one or more nodes of a social graph from one or more data stores. A node may comprise a user node or a concept node. Each node may be connected by edges to other nodes of a social graph. A first user may be associated with a first user node of the social graph. Particular embodiments may detect that the first user is entering an input term. Predictive typeahead results may be provided as the first user enters the input term. The predictive typeahead results may be based on the input term. Each predictive typeahead result may include at least one image. Each predictive typeahead result may correspond to at least one node of the social graph. | 09-17-2015 |
20150350104 | DATA TRANSMISSION BETWEEN DEVICES BASED ON BANDWIDTH AVAILABILITY - In one embodiment, in response to data to be transmitted to or from an electronic device, the electronic device determines whether the electronic device currently has a first network connection with a sufficiently high bandwidth. If the electronic device currently does not have a first network connection with a sufficiently high bandwidth, then the electronic device estimates a future time when the electronic device is likely to have a second network connection with a sufficiently high bandwidth, and schedules transmission of the data at the future time. | 12-03-2015 |