Patents Assigned to Microsoft Corporation
-
Publication number: 20090183155Abstract: Isolation of extension code by processes in an application is described. In an implementation, execution of one or more processes is managed that contain content received via a network by another process of a single application that includes the one or more processes. The management includes terminating the one or more processes when not responsive. Execution of the one or more processes is isolated from the other process such that when the one or more processes are not responsive the other process remains responsive. The content in the terminated one or more processes is then recovered.Type: ApplicationFiled: January 15, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Edward J. Praitis, Shawn M. Woods, David M. Ruzyski
-
Publication number: 20090180555Abstract: Techniques and tools are presented for controlling artifacts such as banding artifacts, ringing artifacts and film scan artifacts in video. For example, before encoding, a pre-processor performs combined filtering and dithering on video such that the weight of dithering at a location depends on the results of filtering at the location. For the combined filtering and dithering, the pre-processor can determine a lowpass signal and highpass residual, weight dithering based on local characteristics of the highpass residual, and then combine the lowpass signal with the weighted dithering. Or, to determine the relative weight, the pre-processor can use a filter whose normalization factor varies depending on how many sample values around a location are within a threshold of similarity to a current sample value at the location. The filtering and dithering can use different strengths for luma and chroma channels.Type: ApplicationFiled: January 10, 2008Publication date: July 16, 2009Applicant: Microsoft CorporationInventors: Shijun Sun, Cheng Chang, Stacey Spears
-
Publication number: 20090180602Abstract: Context-based call routing is provided in a unified communication system by enabling subscribers to define a routing document, which is published by the communication system to callers who subscribe to a presence of the called party. Through publication of the context-based routing information, callers are enabled to make selections between call destination options as defined by the caller and provide a subject for the requested call. The call is then routed by the system according to the caller selection allowing efficient facilitation of the communication between the caller and the called party or their designees.Type: ApplicationFiled: January 16, 2008Publication date: July 16, 2009Applicant: Microsoft CorporationInventors: Rajesh Ramanathan, Eran Shtiegman, Amritansh Raghav, Dena Osherovich
-
Publication number: 20090182819Abstract: Techniques to selectively share messages are described. An apparatus may comprise a trusted delegate server having a message sharing module. The message sharing module may be operative to selectively retrieve messages for a primary message recipient from a unified messaging server based on a message type defined by a message sharing policy. The messaging sharing module may send the messages to a secondary message recipient for the message type as defined by the message sharing policy over a packet-switched network. Other embodiments are described and claimed.Type: ApplicationFiled: January 14, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Anton W. Krantz, Niraj Khanchandani
-
Publication number: 20090183074Abstract: The disclosure relates to presenting sound. In some embodiments, this is a visual presentation. One embodiment provides a presentation of sound built over time, which may be displayed in layers similar to strata in a sedimentary rock formation. In another embodiment, the visual presentation is an animated presentation which reflects a characteristic, for example the volume, of the sound at that instant.Type: ApplicationFiled: January 10, 2008Publication date: July 16, 2009Applicant: Microsoft CorporationInventors: Sian Lindley, Lorna Brown, Abigail Durrant, David Frohlich, Gerard Oleksik, Dominic Robson, Francis Rumsey, Abigail Sellen, John Williamson
-
Publication number: 20090182746Abstract: Described is a technology by which a database management system more efficiently processes read requests than write requests for a read-mostly database table, which is a database table that is generally read far more often than written. A lock partitioning mechanism may be implemented to provide a read lock for each CPU of a plurality of CPUs, in which only one read lock is acquired to process a read request. A database table state changing mechanism may be implemented that more efficiently processes read requests relative to write requests by maintaining the database table in a read-only state until a write request is processed. When a write request is received, the database table is changed to a read-write state to process the write request. The database table is then reset back to a read-only state, such as by running a background thread.Type: ApplicationFiled: January 15, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Pravin Mittal, Hanumantha Rao Kodavalla
-
Publication number: 20090182608Abstract: Managing recurrent schedules based on events and conditions. Schedules from a plurality of applications are identified based on an activation time for the schedules and a determination of whether or not conditions defined for the schedules are met. The identified schedules are activated by performing actions associated with each of the identified schedules. In an embodiment, the schedules are grouped based on functionality and prioritized to avoid conflicts within each group.Type: ApplicationFiled: March 20, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Anh P. Tran, Lloyd Alfred Moore, Christopher Todd Guillory, Gary Jason Waliczek, Poonam Ganesh Hattangady, Adam Sapek, Albert Liu, Kishore Kumar Prakash, Jane Van-nha Ly
-
Publication number: 20090182615Abstract: Technologies are described herein for providing a self-serve direct-to-consumer mail marketing service. A unified mail marketing service is provided through which a user can generate a postal or e-mail mailing without the need to consult multiple independent service providers. The mail marketing service provides a single point of contact for creating demographics, identifying potential customers that satisfy the demographics, creating the mailing, creating and monitoring points of contact to measure the success of the mailing, and for printing and sending the mailing.Type: ApplicationFiled: January 14, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventor: Samarth Sharath Pai
-
Publication number: 20090182783Abstract: Systems and methods for facilitating more efficient timestamping in a lazy timestamping transaction time database environment are described herein. A recovery log component can store timestamp information of a transaction in a commit record of the transaction, wherein the commit record of the transaction is included in a recovery log. A volatile reference count component can update reference count data of the transaction in a volatile timestamp table to reflect a number of records of the transaction that do not persistently include timestamp information. Further, a checkpoint component can update timestamp information for a batch of transactions, wherein the timestamp information is updated in a record of the persistent timestamp table to ensure that the timestamp information persists in the record of the persistent timestamp table before the commit record of the transaction that contains the transaction's timestamp information is deleted from the recovery log.Type: ApplicationFiled: January 11, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventor: David B. Lomet
-
Publication number: 20090183080Abstract: Techniques to automatically manage overlapping objects are described. An apparatus may include a context module operative to receive context information for a multimedia event, and determine various context parameters and control parameters for the multimedia event. The apparatus may further comprise a blending module communicatively coupled to the context module, the blending module operative to receive multiple media content streams for multiple media content views for the multimedia event, and blend the media content streams for the multiple media content views based on one or more control parameters to form a blended media content stream. Other embodiments are described and claimed.Type: ApplicationFiled: January 14, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Pulin Thakkar, Noor- E-Gagan Singh, Stuti Jain, Ix, Quinn Hawkins, Kapil Sharma, Avronil Bhattacharjee
-
Publication number: 20090183257Abstract: Secure data is prevented from leaving the perimeter of a network such as an enterprise network or corporate network (“corpnet”) by an arrangement in which a hash of the secure data is periodically computed, and the hashes are pushed out to an edge device on the network such as a firewall where they are stored for later access. The edge device is configured so that it has access to all traffic that flows between the enterprise network and an external network, such as the Internet, that is located outside the enterprise network perimeter. Whenever a user attempts to send data to the external network, a process running on the edge device computes a hash for the outbound data and compares it against the stored hashes associated with the secure data. If a match is made between the hash for the outbound data and a stored hash for secure data, then the edge device blocks the outbound data from leaving the network perimeter.Type: ApplicationFiled: January 15, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventor: Prashanth Prahalad
-
Publication number: 20090183225Abstract: Embodiments that facilitate the use of pluggable policy modules and authentication modules for access to a Terminal Services (TS) server are disclosed. In accordance with various embodiments, a method includes accessing one or more pluggable modules at a Terminal Services Gateway (TSG) server or a Terminal Services (TS) server. The method further includes processing a TS server access request from a TS client at the TSG server or the TS server. The TS server access request is processed in part based on the one or more pluggable modules. In one particular embodiment, the one or more pluggable modules include at least one of a connection authorization policy (CAP) module, a resource authorization policy (RAP) module, and an authentication module.Type: ApplicationFiled: January 10, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Meher P. Malakapalli, Ashwin Palekar
-
Publication number: 20090183249Abstract: A storage token has a display and a keyboard, or other input device, that allows a user to view a request to access a memory location and enter a response to the request. The display allows presentation of details of the request, such as a pathname to a requested memory location, metadata describing a cryptographic key for use in a transaction confirmation, and/or transaction details which are awaiting verification by a credential stored on the token. The storage token may also include a cryptographic engine and a secure memory allowing signing data returned in response to the request.Type: ApplicationFiled: January 11, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: David Steeves, Todd L. Carpenter, David Abzarian, Gregory Hartrell, Mark Myers
-
Publication number: 20090182760Abstract: Determining compatibility of data structures. A method may be practiced in a computing environment. The method includes accessing a first type defined in a mark-up object. The first type includes a first structure including a first plurality of fields. A second type defined in a mark-up object is accessed. The second type includes a second structure including a second plurality of fields. The first structure and the second structure are compared. Based on the comparison, a determination is made that the first type is compatible with the second type.Type: ApplicationFiled: January 14, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Donald F. Box, Brian F. Chapman, Martin J. Gudgin, Michael J. Hillberg, Charles P. Jazdzewski, Natasha H. Jethanandani, Geoffrey M. Kizer, Robert A. Relyea, Jeffrey C. Schlimmer, Joel West
-
Publication number: 20090182662Abstract: This document describes tools capable of managing digital content from multiple content providers based on a user's identity. By so doing, the tools may free people from the limitations of their storage media and devices. The tools may perform these and other actions through an indirect relationship with users, such as when third-party content providers use the tools but provide their own direct interface with users.Type: ApplicationFiled: January 10, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: James M. Alkove, Chadd B. Knowlton
-
Publication number: 20090181702Abstract: A method for operating a communications system is provided. The method includes receiving a text communication from a first user destined for a second user. One of a number of user communication points on which to connect the text communication to the second user is selected, and a suitable communication type capable of displaying the text on the selected communication point is determined. The text communication is then forwarded the second user using the communication type.Type: ApplicationFiled: January 14, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Sandra Irene Vargas, Keith Rowe
-
Publication number: 20090182710Abstract: Embodiments are provided to calculate and provide information based in part on a defined expression. In an embodiment, a database system can be configured to include a number of calculated columns as part of a database table structure. The database system can be configured to present a calculated result based in part on a determined result type. In one embodiment, a database system can be configured to enable calculated columns to be defined on a table of a database, wherein a component can be used to evaluate an expression associated with a column calculation to determine a proper result type. The proper result type can be stored and used when presenting a result of the calculation. Other embodiments are available.Type: ApplicationFiled: October 26, 2007Publication date: July 16, 2009Applicant: Microsoft CorporationInventors: Abigail Elisabeth Short, Daniel J. Cole, Matthew Pohle, Michael Allen Brotherton, Vitore Selca, Sumit Chauhan
-
Publication number: 20090182703Abstract: Mapping XML elements to complex relational database structures. One method includes acts for storing mark-up language representations of data in a complex relational database structure. The method includes receiving an XSD document. The XSD document defines at least one type that should be mapped to a complex relational database type. The XSD document is mapped to a relational database structure. An XML document is received. The XML document is interpreted according to the XSD document. One or more elements of the XML document are mapped to complex relational database elements based on mapping of the XSD document to the relational database structure.Type: ApplicationFiled: January 16, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Arunpriyaa Nachimuthu, Anil K. Prasad, Mustansir K. Doctor, Jayanthi Sampathkumar, Tapas K. Nayak
-
Publication number: 20090182723Abstract: Architecture that extracts author information from general documents and uses the author information for search results ranking. The architecture performs automatic author value extraction and makes the extracted value available at index time for subsequent use at query processing and results ranking. Machine learning (e.g., a perceptron algorithm) is employed and a set of input features for the perceptron algorithm utilized for author value extraction. The extracted author value is converted into a feature for input a ranking function for generating a ranking score for each document. The input features can also be weighted according to weighting criteria.Type: ApplicationFiled: January 10, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Yauhen Shnitko, Dmitriy Meyerzon, Hang Li, Yunhua Hu
-
Publication number: 20090183010Abstract: This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing device in a cryptographically secure manner without requiring the movable component to perform a complex cryptographic function. By so doing the mobile computing device may request access to content and receive permission to use the content quickly and in a cryptographically robust way.Type: ApplicationFiled: January 14, 2008Publication date: July 16, 2009Applicant: Microsoft CorporationInventors: Patrik Schnell, Alexandre V. Grigorovitch, Kedarnath A. Dubhashi