Abstract: Technologies for switching a set of nodes in an overlay network from one relay tree configuration to another without duplicate packets or packet loss at any of the nodes. A commander node calculates a new relay tree as well as a media stream set configuration for each node in the overlay network, each media stream set corresponding to the new relay tree. Media stream sets include a unique version number or the like that identifies the specific relay tree configuration of which they are a part. Also provided are technologies for associating a media stream with a particular relay tree configuration and the corresponding media stream set of each node in the overlay network.
Abstract: Generally described, a method, software system, and computer-readable medium are provided for efficiently collecting data this useful in developing software systems to identify and protect against malware. In accordance with one embodiment, a method for collecting data to determine whether a malware is propagating in a networking environment is provided. More specifically, the method includes receiving preliminary data sets at a server computer from a plurality of client computers that describes attributes of a potential malware. Then a determination is made regarding whether secondary data is needed to implement systems for protecting against the potential malware. If secondary data is needed, the method causes the secondary data to be collected when an additional preliminary data set is received from a client computer.
Type:
Application
Filed:
January 6, 2006
Publication date:
July 12, 2007
Applicant:
Microssoft Corporation
Inventors:
Adam Overton, Alexey Polyakov, Andrew Newman, Jason Garms, Ronald Franczyk, Scott Field, Sterling Reasor
Abstract: The present invention is directed generally toward computer-implemented methods for targeting objects in a gaming system. One aspect of the invention is directed toward a method for targeting an object in a gaming system that includes receiving a soft lock command and applying a soft lock to an object in the game. The soft lock designates an action site on a portion of the object that was proximate to an aiming reference when the soft lock was commanded. The action site is proximate to a location where a selected game action will occur if the game action is commanded. Once the soft lock is applied, the aiming reference can be moved away from the action site. Another aspect of the invention is directed toward a method of targeting an object in a gaming system that includes receiving a command to hard lock a portion of an object, applying the hard lock, and displaying at least one selectable sub-target associated with the object.
Type:
Application
Filed:
October 15, 2004
Publication date:
April 20, 2006
Applicant:
Microssoft Corporation
Inventors:
Christopher Novak, Alistair Baxter, Billy Thomson, David Jones, Peter Wong