Abstract: Camera and sensor augmented reality techniques are described. In one or more implementations, an optical basis is obtained that was generated from data obtained by a camera of a computing device and a sensor basis is obtained that was generated from data obtained from one or more sensors that are not a camera. The optical basis and the sensor basis describe a likely orientation or position of the camera and the one or more sensors, respectively, in a physical environment. The optical basis and the sensor basis are compared to verify the orientation or the position of the computing device in the physical environment.
Abstract: A secondary location of a network acts as a recovery network for a primary location of the service. The secondary location is maintained in a warm state that is configured to replace the primary location in a case of a failover. During normal operation, the primary location actively services user load and performs backups that include full backups, incremental backups and transaction logs that are automatically replicated to the secondary location. Information is stored (e.g. time, retry count) that may be used to assist in determining when the backups are restored correctly at the secondary location. The backups are restored and the transaction logs are replayed at the secondary location to reflect changes (content and administrative) that are made to the primary location. After failover to the secondary location, the secondary location becomes the primary location and begins to actively service the user load.
Type:
Grant
Filed:
June 6, 2011
Date of Patent:
January 20, 2015
Assignee:
Microsoft Corporation
Inventors:
Viktoriya Taranov, Alexander Hopmann, Antonio Marcos Da Silva, Jr., Nikita Voronkov, Kai Yiu Luk, Ramanathan Somasundaram, Artsiom Kokhan, Siddharth Rajendra Shah, Daniel Blood, Bhavesh Doshi
Abstract: Method and computer storage media for sharing resources between a plurality of computing devices associated with a common non-enterprise network. A common set of credentials is stored on at least two or more of a plurality of computing devices that reside behind a routing device and are associated through a common non-enterprise network. Upon storing the common set of credentials, each of the two or more of a plurality of computing devices create a local account that contains, at least, the common set of credentials. The common set of credentials allow for the sharing, among the two or more of the plurality of computing devices, of resource that reside on or are associated with the computing devices.
Type:
Grant
Filed:
July 9, 2013
Date of Patent:
January 20, 2015
Assignee:
Microsoft Corporation
Inventors:
Brian L. McNeil, Michael G. Sheldon, Steve Seixeiro, Ramkumar Ramasubramanian, Jerry K. Koh, Anshul Rawat, Andrew V. Davidson, Daniel Oliver, Michael D. McCormack
Abstract: There is provided a robot that includes a processor executing instructions that determine a desired image to be displayed. The processor issues control signals corresponding to the desired image to be displayed. The robot also comprises a display assembly including a visual projector, a mirror, and a display surface. The visual projector and mirror are disposed within the robot. The visual projector projects light corresponding to the desired image onto the mirror. The mirror receives the light from the projector, and reflects the light onto the display surface. The display surface receives the light. The image is visible on the display surface from outside the robot.
Type:
Grant
Filed:
June 17, 2011
Date of Patent:
January 20, 2015
Assignee:
Microsoft Corporation
Inventors:
Efstathios Papaefstathiou, Russell Sanchez, Nathaniel T. Clinton
Abstract: The subject disclosure is directed towards a technology by which the accuracy of context-based information provided by at least one data source for received context data is increased. Correctness information received in association with usage of looked up context-based information is logged. The correctness information may be processed to increase the overall accuracy by correcting a data source, and/or by creating a blended data source that includes the most likely accurate portions (segments) from among multiple data sources as determined via the correctness information.
Type:
Grant
Filed:
December 14, 2011
Date of Patent:
January 20, 2015
Assignee:
Microsoft Corporation
Inventors:
Yutaka Suzue, Johnson T. Apacible, Mark J. Encarnación, Jamie Huynh, Simon D. Bernstein
Abstract: Described herein are techniques and systems that allow modification of functionalities based on distances between a shared device (e.g., a shared display, etc.) and an individual device (e.g., a mobile computing device, etc.). The shared device and the individual device may establish a communication to enable exchange of data. In some embodiments, the shared device or the individual device may measure a distance between the shared device and the individual device. Based on the distance, the individual device may operate in a different mode. In some instances, the shared device may then instruct the individual device to modify a functionality corresponding to the mode.
Type:
Grant
Filed:
March 14, 2013
Date of Patent:
January 20, 2015
Assignee:
Microsoft Corporation
Inventors:
Michel Pahud, Kenneth P. Hinckley, William A. S. Buxton, Gina D. Venolia
Abstract: A dynamic exponential, feature-based, language model is continually adjusted per utterance by a user, based on the user's usage history. This adjustment of the model is done incrementally per user, over a large number of users, each with a unique history. The user history can include previously recognized utterances, text queries, and other user inputs. The history data for a user is processed to derive features. These features are then added into the language model dynamically for that user.
Abstract: A security language expresses assertions and authorization queries in a manner that facilitates logic resolution. In an example implementation, assertion syntax and authorization query syntax are described. In another example implementation, checks on the safety of assertions and authorization queries are described. In yet another example implementation, semantics rules are described.
Type:
Grant
Filed:
September 11, 2006
Date of Patent:
January 20, 2015
Assignee:
Microsoft Corporation
Inventors:
Moritz Y. Becker, Blair B. Dillaway, Cedric Fournet, Andrew D. Gordon
Abstract: A simplified hardware management communication protocol comprises defined request packets, which are utilized to transmit requests to lower layers of management functionality or to managed resources, and it also comprises defined response packets, which are utilized to transmit responses back to the source of the request. A request packet comprises an identification of a type of device, an identifier of that device, an address of the sending entity, a session identifier, a sequence number, a function identifier, and a payload that comprises encapsulated communications or data directed to the request target. A response packet can comprise an identification of the sender of the request, a session identifier, a sequence number, a completion code identifying whether and how the request was completed, and a payload. Managed asset type specific drivers translate into communications utilizing communicational protocols that are specific to the managed assets.
Type:
Grant
Filed:
June 25, 2013
Date of Patent:
January 20, 2015
Assignee:
Microsoft Corporation
Inventors:
Badriddine Khessib, Sriram Sankar, Woongki Baek, Sriram Govindan, Bryan David Kelly
Abstract: Techniques for monitoring web application performance are provided. A request for a web application is received at an application server. A response pipeline at the application server generates client application code corresponding to the requested web application. The client application code is intercepted in the response pipeline. Instrumentation code is inserted into the intercepted client application code to generate an instrumented client application code. The instrumentation code is configured to be executed when the instrumented client application code is rendered at the client to capture performance information at the client, and is configured to transmit the captured performance information from the client.
Type:
Grant
Filed:
July 21, 2010
Date of Patent:
January 20, 2015
Assignee:
Microsoft Corporation
Inventors:
Ilarie Letca, Alexandre Coelho, Venkata Seshu Kumar Kurapati, Rajeev Sudhakar, Daniel Savage, Ashvinkumar Sanghvi, Jin Soon Lim
Abstract: Various technologies described herein pertain to providing spectrum utilization feedback from a whitespace device. A database query for a set of available channels in a spectrum (e.g., broadcast spectrum, etc.) during a time period can be transmitted from the whitespace device to a regulatory authorized database system. The database query includes data that specifies a set of channels used by the whitespace device during a previous time period prior to the time period. Responsive to the database query, a response can be received at the whitespace device from the regulatory authorized database. The response indicates the set of available channels in the spectrum during the time period, where the available channels are unassigned to licensees at a location of the whitespace device during the time period. Moreover, the whitespace device is configured to opportunistically communicate in the spectrum over one or more of the available channels.
Abstract: Technologies are described herein for implementing shared locks for controlling synchronized access to a shared resource. In one method, in a user mode of an operating system, a notification is received indicating that a first process begins execution. The first process is adapted to acquire the shared lock during execution of the first process. Upon receiving the notification, it is determined whether the first process terminates execution without releasing the shared lock. Upon determining that the first process terminates execution without releasing the shared lock, the shared lock is released for access by a second process.
Abstract: A method for preventing the unauthorized modification of a software or unauthorized modification of runtime data. According to this method, a converter, which is capable of converting the software into a generalized machine code is provided. The converter is designed such that it cannot he reverse engineered, by using a conversion process that causes data loss. An interpreter, which the knowledge of its process method is kept restricted, is also provided. The interpreter interprets the general machine code into a specific machine code, while reconstructing the lost data during the interpretation process.
Abstract: A system, method and data structures for transmitting batched data over a network in asynchronous, non-blocking operations, with acknowledgements returned to the senders. Each machine includes a sender subsystem and a receiver subsystem. Transmission items corresponding to data to be sent are buffered until a send is triggered, at which time the transmission items are sorted according to their destinations and sent as a GUID-identified batch to each destination by a send thread. At each receiver, a receiving thread adds descriptions of the data to a receive list, which a transfer thread processes when triggered. The transfer thread sends the corresponding data to a recipient program, and sends GUID-identified acknowledgements corresponding to each GUID back to the originating senders. An acknowledge thread at each originating sender buffers the acknowledgements, and when triggered, a cleanup thread uses the GUID to identify which batched transmissions were received.
Abstract: Embodiments are directed to dynamically delivering virtual software applications and to allocating application data between local and network data stores. In one scenario, a computer system establishes a data input/output (I/O) filter configured to intercept data file requests being sent from a virtual software application to an operating system's file system. The data I/O filter intercepts a data file read request that is configured to retrieve a specified data file from the file system. The data I/O filter forwards the intercepted read request to a network-accessible data store that is configured to return the specific data file. Then, upon receiving the specified data file from the network data store, the I/O filter sends the specified data file to the virtual software application. In this manner, the specified data file is usable by the virtual application.
Abstract: One or more techniques and/or systems are disclosed for predicting propagation of a message on a social network. A predictive model is trained to determine a probability of propagation of information on the social network using both positive and negative information propagation feedback, which may be collected while monitoring the social network over a desired period of time for information propagation. A particular message can be input to the predictive model, which can determine a probability of propagation of the message on the social network, such as how many connections may receive at least a portion of the message and/or a likelihood of at least a portion of the message reaching respective connections in the social network.
Type:
Grant
Filed:
June 17, 2013
Date of Patent:
January 20, 2015
Assignee:
Microsoft Corporation
Inventors:
Tauhid Rashed Zaman, Jurgen Anne Francois Marie Van Gael, David Stern, Ralf Herbrich, Gilad Lotan