Winkler, WA
David Winkler, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100216491 | DYNAMIC ELEMENTS ON A MAP WITHIN A MOBILE DEVICE, SUCH AS ELEMENTS THAT FACILITATE COMMUNICATION BETWEEN USERS - A system and method for providing information on a map displayed by a mobile device is described. In some examples, the system facilitates user control of map elements, such as dynamically changing map elements based on events that occur at a user's mobile device or at locations associated with the map elements. In some examples, the system enables communication between users via map elements. | 08-26-2010 |
20110126095 | Router Management via Touch-Sensitive Display - A router having a touch-sensitive display and user interface configured to provide a plurality of category screens corresponding to a plurality of categories and a plurality of navigation keys is described herein. Actuation of one or more of the plurality of navigation keys allows for navigation between the plurality of categories and within screens associated with one of the categories. | 05-26-2011 |
20110291946 | TOUCHPAD INTERACTION - Techniques utilizing a rear-facing touch panel are described for implementing user interfaces in a handheld device. | 12-01-2011 |
20110291956 | HIERARCHICAL TOUCHPAD INTERACTION - Techniques utilizing a hierarchically-arranged touchpad in conjunction with different types of user interfaces are described. | 12-01-2011 |
David B. Winkler, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20100235621 | METHOD OF SECURELY PAIRING DEVICES WITH AN ACCESS POINT FOR AN IP-BASED WIRELESS NETWORK - A wireless access point and method of using a wireless access point to allow a user to use a pre-determined security key provided with the access point or a personal security key that is provided by the user. The access point is purchased with a pre-determined security key. A user of the access point may press a pairing button on the access point to automatically pair other devices with the access point using the pre-determined security key. A label with a passphrase that corresponds to the pre-determined security key is provided with the access point, allowing the user to manually enter the passphrase into devices that cannot automatically pair with the access point. The wireless access point also has a “security on/off” button. When the user presses the security on/off button, the access point may cease use of the pre-determined security key in favor of a personal security key. | 09-16-2010 |
David G. Winkler, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20080234219 | Compositions and Methods for Increasing Bone Mineralization - A novel class or family of TGF-β binding proteins is disclosed. Also disclosed are assays for selecting molecules for increasing bone mineralization and methods for utilizing such molecules. | 09-25-2008 |
20110150866 | Compositions and Methods for Increasing Bone Mineralization - A novel class or family of TGF-β binding proteins is disclosed. Also disclosed are assays for selecting molecules for increasing bone mineralization and methods for utilizing such molecules. | 06-23-2011 |
David V. Winkler, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20080304719 | Bi-directional handwriting insertion and correction - Various technologies and techniques are disclosed for providing bi-handwriting directional handwriting recognition and correction. A combined handwriting recognizer is provided that supports left-to-right and right-to-left language recognition by using a combined dictionary. The combined dictionary includes a dictionary from a language in a first direction, along with a backwards version of a dictionary from a language in a second direction. The combined recognizer is used with the combined dictionary to generate a most likely recognition result for mixed direction hand written input received from a user. Character by character correction is provided for mixed left-to-right and right-to-left text. The most likely recognition result is displayed in a visual order. The user can correct a particular character to a different character. When recognized text needs to be sent to a separate application, an inverse bi-directional process is performed to convert the ext from the visual order to the logical order. | 12-11-2008 |
20090157211 | PRODUCING A LOCALLY OPTIMAL PATH THROUGH A LATTICE BY OVERLAPPING SEARCH - A system and computer-implemented method for the creation of a structure using Lego building blocks is disclosed. Aspects of the methods are equally appropriate for numerous structures, including but not limited to, studs-up and studs-out configurations or a ‘wall’ style mosaic or a ‘floor’ style mosaic. Given the systems and methods disclosed, aspects of the invention are applicable to three-dimensional sculpture structures too. The system and method may use a recursive overlapping divide-and-conquer breadth-first search feature to improve the quality of the structures while only slightly, if at all, increasing the time and memory required. Furthermore, the system and method may use dithering algorithms and/or cost analysis to determine which building block can be used and placed to achieve high-quality structures. In another example, aspects of the invention may be used to more optimally schedule delivery trucks. In yet another example, aspects of the invention may be used to enhance handwriting recognition and speech recognition. | 06-18-2009 |
20120109635 | BI-DIRECTIONAL HANDWRITING INSERTION AND CORRECTION - Various technologies and techniques are disclosed for providing bi-directional handwriting recognition and correction. A combined handwriting recognizer is provided that supports left-to-right and right-to-left language recognition by using a combined dictionary. The combined dictionary includes a dictionary from a language in a first direction, along with a backwards version of a dictionary from a language in a second direction. The combined recognizer is used with the combined dictionary to generate a most likely recognition result for mixed direction hand written input received from a user. Character by character correction is provided for mixed left-to-right and right-to-left text. The most likely recognition result is displayed in a visual order. The user can correct a particular character to a different character. When recognized text needs to be sent to a separate application, an inverse bi-directional process is performed to convert the text from the visual order to the logical order. | 05-03-2012 |
David Vaughn Winkler, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130007371 | Browser Storage Management - Browser storage management techniques are described. In one or more implementations, inputs are received at a computing device that specify maximum aggregate sizes of application and database caches, respectively, of browser storage to be used to locally store data at the computing device. For example, the inputs may be provided using a policy, by an administrator of the computing device, and so on. The maximum aggregate sizes are set of application and database caches, respectively, of browser storage at the computing device to the sizes specified by the inputs. | 01-03-2013 |
20130219383 | Using an Application Cache to Update Resources of Installed Applications - Various embodiments enable installable applications that are to be used on a local client machine to utilize an application cache manifest file that resides remotely, on the web, to define various resources that are to be updated and available offline after the installable application has been deployed on the local client machine Whenever the content of the manifest file is updated on the web, the installed application automatically updates its local application cache resources and allows the installed application to use those resources offline. This is done without having to install a new update of the application or burden the user with having to navigate to a location to obtain the updated content. | 08-22-2013 |
Matthew R. Winkler, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20110107306 | MULTI-VIEW DEBUGGING - Debugging an executing process. A method includes accessing a unique key that is common to two or more different representations of a same function in the process. A runtime for the executing process is annotated with the unique key. The method further includes detecting that the function is executing. The unique key is used to provide an indication in one or more of the two or more different representations that the function is executing. | 05-05-2011 |
20110302555 | ASSIGNING TYPE PARAMETERS - The present invention extends to methods, systems, and computer program products for assigning type parameters. Embodiments of the invention permit using a visual editor to edit arbitrary object instances in a graphical fashion. Instances of generic types can be manipulated to change the type parameters for that generic (to be able to change a List | 12-08-2011 |
20120174058 | PLATFORM FOR DISTRIBUTED APPLICATIONS - Embodiments are directed to providing an application model to deploy and manage composite applications and to providing model-driven software coding assistance. In an embodiment, a computer system instantiates an application design interface that is configured to display composite application components and relationships between the components. Each component includes information specifying how communication is to be conducted with the component. The computer system accesses an application manifest that includes the components and component relationships of the application. The computer system displays the composite application's components and component relationships in the instantiated visual application design interface according to the application manifest. | 07-05-2012 |
Matthew R. Winkler, Kenmore, WA US
Patent application number | Description | Published |
---|---|---|
20100161674 | VISUALLY MANIPULATING INSTANCE COLLECTIONS - The present invention extends to methods, systems, and computer program products for visually manipulating instance collections. Items presenters present data collections along with custom designers for each data element in the data collections. The customer designers also permit data elements in the collection to be edited in situ. Items presenters maintain data elements in a position aware fashion. Thus, data elements can be inserted into (potentially at a specified location) and deleted from an items presenter to corresponding add and delete the data elements from a data collection. Data elements can be visually moved from an items presenter in one root user interface to an items presenter in another root user interface to corresponding move the data elements between corresponding data collections | 06-24-2010 |
20100162146 | VISUALLY PROCESSING INSTANCE DATA - The present invention extends to methods, systems, and computer program products for visually processing instance data. A visual placeholder for a data instance is provided as part of the design experience. A runtime configurable metadata store is provided to maintain the mappings between types and designers. Thus, configurations can be altered at the runtime of the control, rather than a fixed set of potential templates being provided at design time. Item presenters render contained data instances of a type using a designer specified in the metadata store. Item presenters can be used when a data instance is exposed as a property on the containing type. As such, property values can be visually moved to and from other properties, potentially within multiple owning objects. | 06-24-2010 |
Pat Winkler, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20080250018 | Binary function database system - A binary function database system is provided in which binary functions are extracted from compiled and linked program files and stored in a database as robust abstractions which can be matched with others using one or more function matching heuristics. Such abstraction allows for minor variations in function implementation while still enabling matching with an identical stored function in the database, or with a stored function with a given level of confidence. Metadata associated with each function is also typically generated and stored in the database. In an illustrative example, a structured query language database is utilized that runs on a central database server, and that tracks function names, the program file from which the function is extracted, comments and other associated information as metadata during an analyst's live analysis session to enable known function information that is stored in the database to be applied to binary functions of interest that are disassembled from the program file. | 10-09-2008 |
Patrick Winkler, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20120260343 | AUTOMATED MALWARE SIGNATURE GENERATION - Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature. | 10-11-2012 |
Scott Winkler, Washougal, WA US
Patent application number | Description | Published |
---|---|---|
20080300900 | Systems and methods for distributed sequestration in electronic evidence management - Systems and methods are provided for managing sequestration of electronic evidentiary objects in an organization with distributed systems. The systems and methods include capturing in a central evidence management system objects from sources in the distributed systems. The objects are stored in a repository. Selected objects are selectively sequestered, which includes sequestering the selected objects at the sources. In certain embodiments, the sequestering of the selected objects at the sources is achieved by agents provided at the sources by the central evidence management system. | 12-04-2008 |
20080301084 | Systems and methods for dynamically creating metadata in electronic evidence management - Systems and methods for creating metadata are provided in which electronic evidence is captured, the electronic evidence comprising a binary large object, extrinsic metadata, and intrinsic metadata. The extrinsic metadata and the intrinsic metadata are extracted from the captured electronic evidence. The extrinsic metadata, intrinsic metadata, or user-defined metadata, or any combination thereof are dynamically associated with the binary large object. At least one operation is performed on the binary large object, wherein the operation is determined by the associated extrinsic metadata, associated intrinsic metadata, or associated user-defined metadata. | 12-04-2008 |
20080301172 | Systems and methods in electronic evidence management for autonomic metadata scaling - Systems and methods are provided for electronic evidence management for autonomic metadata scaling. The exemplary systems and methods comprise capturing electronic evidence from at least one source, and storing the captured electronic evidence in a repository. Classification metadata is dynamically created to identify one or more classes. The stored electronic evidence is dynamically classified into the one or more classes with the dynamically created classification metadata. | 12-04-2008 |
20080301207 | Systems and methods for cascading destruction of electronic data in electronic evidence management - Systems and methods are provided for managing the destruction of documents in an organization that includes a cascaded destruction of the documents in distributed systems. The systems and methods include capturing electronic evidence in a central evidence management system as objects from sources in the distributed systems. The objects are stored in a repository. When documents are eligible to be deleted, the central evidence management system destroys the objects representing the documents in the repository. A delete command is sent to agents at the sources in the distributed system that causes the agents to delete and destroy the documents from the file systems in the distributed systems. | 12-04-2008 |
20080301756 | Systems and methods for placing holds on enforcement of policies of electronic evidence management on captured electronic - Systems and methods for placing a hold on captured electronic evidence are provided, the captured electronic evidence having one or more associated policies that are applied to the captured electronic evidence. The captured electronic evidence is stored in a repository. The exemplary systems and methods determine whether to place a hold on the captured electronic evidence, and indicate the captured electronic evidence as being on hold. The exemplary systems and methods place the one or more policies of electronic evidence management associated with the captured electronic evidence indicated as being on hold in a pending state. | 12-04-2008 |
20080301757 | Systems and methods for policy enforcement in electronic evidence management - Systems and methods are provided for policy enforcement on electronic evidence captured from at least one source. The contents of the captured electronic evidence are indexed, and the captured electronic evidence is classified based on the indexed contents by associating the electronic evidence with one or more classes. It is determined whether one or more policies apply to the classified captured electronic evidence. When two or more policies apply to the classified captured electronic evidence, a conflict between the two or more policies is resolved to select the one or more policies to enforce. The systems and methods also enforce the selected one or more policies on the classified captured evidence. | 12-04-2008 |