438 patents
Page 13 of 22
Utility
rclr4o660r245zfvfe8am7m7b2klrykohk88cjzz0ops
MSFT
5 Mar 24
A method of recommending an unplayed game application to a user includes obtaining a game history associated with a user profile, wherein the game history includes at least one game record of a game application the user profile has been used to play, and evaluating the game history to obtain a plurality of game events associated with a game application of the game history.
Gershom Payzer, Bridgette Marie Kuehn, Christopher Ian Charla, Kathryn Stone Perez, Madeline Jaye Whisenant, Lily Wang, Jennifer Rose Guriel
Filed: 31 May 22
Utility
igtohjzmhwfh531oj2o4jo5m132n41y908cpfiqjc2
MSFT
12 Mar 24
Example solutions are disclosed for performing a distributed data query for a connected data set, such as a property graph or a relational database, distributed across a plurality of regions (e.g., different geographic regions) under data flow limitations.
Anders Tungeland Gjerdrum, Tor Kreutzer, Jan-Ove Karlberg
Filed: 31 May 22
Utility
5k5fg2hpjtl1q24hradnxnit7
MSFT
23 Jan 24
The disclosure herein enables tracking of multiple objects in a real-time video stream.
Ishani Chakraborty, Yi-Ling Chen, Lu Yuan
Filed: 28 May 22
Utility
fi695us50ronus1b8l w5dhx1ydixz5rxp32fuswo6j
MSFT
13 Feb 24
The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution.
Sunay Vaishnav, Merwan Vishnu Hade, Stephen Christopher Siciliano, David Nissimoff, Fnu Anubhav
Filed: 26 May 22
Utility
xlkxckf7r65d0d o3f3i1x5dvrof7pbkrb8gi
MSFT
30 Jan 24
Generally discussed herein are devices, systems, and methods for transparency and control in a user data migration process.
Steven J. Ball, Maya Neelakandhan
Filed: 26 May 22
Utility
hfcg8mr 87ttrapl2sj7fnv57nwfqyxe60j48ll60j4m
MSFT
23 Jan 24
In non-limiting examples of the present disclosure, systems, methods, and devices for intelligent advertising with optimization.
Shrey Shah
Filed: 25 May 22
Utility
eijprxlwj1u7u0ua95vmy927xoz5q64 lua59rshmvu9oalz50mx0hpx7m
MSFT
6 Feb 24
The techniques disclosed herein provide controlled user interface transitions for private breakout communication sessions.
Jaron Lanier
Filed: 23 May 22
Utility
02dt0rwdn1j92ld8m5p8xet8hz55j1gd5j efhols
MSFT
12 Mar 24
A client application is specified by a target tenant and represented in an OAuth provider, along with a corresponding secret.
Anshul Dube, Parul Manek, Steven Mark Silverberg, Shankaranand Arunachalam, Jason Craig Nelson, Andrew Burke Ryan, Robert A. Lowe, Ganesh Pandey
Filed: 20 May 22
Utility
xjo82s12fonxi34m7w10d0f8wv nwck2kjs9wu32jmssomf8o31a1ng7
MSFT
5 Mar 24
A method of operating a computing device in support of improved accessibility includes displaying a user interface to an application on a display screen of the computing device, wherein the computing device includes an accessibility assistant that reads an audible description of an element of the user interface; initiating, on the computing device, a virtual assistant that conducts an audible conversation between a user and the virtual assistant through at least a microphone and a speaker associated with the computing device, wherein the virtual assistant is not integrated with an operating system of the computing device; inhibiting an ability of the accessibility assistant to read the audible description of the element of the user interface; and upon transition of the virtual assistant from an active state, enabling the ability of the accessibility assistant.
Jaclyn Carley Knapp, Lisa Stifelman, André Roberto Lima Tapajós, Jin Xu, Steven DiCarlo, Kaichun Wu, Yuhua Guan
Filed: 19 May 22
Utility
3f08dh30cei3prezhvle46q 7y31eik3sqr1
MSFT
5 Mar 24
Systems and methods for data anomaly detection include recommending one or more algorithms from a set of algorithms to process received time series data, wherein the one or more algorithms are recommended based at least in part on a type of workload for processing the received time series data.
Roman Batoukov, Richard Wydrowski, Sai Sankalp Arrabolu, Zeqiang Wang, Lech Gudalewicz, Keiji Kanazawa, Benjamin J. Lofton, Thomas W. Potthast, Suren Aghajanyan, Khoa Tran, Jian Zhang
Filed: 13 May 22
Utility
hfdr1n19mcf7dzzetf5pxpo1znefafskka9
MSFT
5 Mar 24
The present disclosure provides a technical solution related to establishing a characterized chatbot with personality.
Pingping Lin, Ruihua Song, Min Zeng, Yan Chen, Yue Liu
Filed: 11 May 22
Utility
deim71ne9hv1ib1jeahus3kqqci356hirxxcxuxbb613z 3ojhawfmh1z
MSFT
12 Mar 24
Described are examples for providing intent based network slice management using a management data analytics function (MDAF) to predict deficiencies.
Ronald Mark Parker, Michael Anthony Brown, Bahareh Sadeghi, Mark Gordon Libby
Filed: 10 May 22
Utility
cma30aexniyr9f9junqpc4 yp3nps21w8rjkaaospn6x2fqn
MSFT
13 Feb 24
A method may include accessing, from a data store, telemetry data for an application, the telemetry data identifying actions executed by the application for a set of users of the application; retrieving an engagement index for the application using the telemetry data based on an engagement index profile, the engagement index profile identifying a selection of actions and a set of calculation dimensions; and presenting a user interface, the user interface including: a first portion identifying the selection of actions; a second portion identifying the set of calculation dimensions; a third portion identifying an original value of an action of the selection of actions with respect to a dimension in the set of calculation dimensions; and a fourth portion identifying a weighted composite value of the action with respect to set of calculation dimensions.
Hongwei Liang, Muskan Kukreja, Sandipan Ganguly
Filed: 29 Apr 22
Utility
3ygds3uzzmslijwtju 8r
MSFT
27 Feb 24
The techniques disclosed herein enable a system to perform a robust evaluation of resource requirement recommendations through a simulated computing environment that closely resembles current conditions of a live computing environment.
Hagit Grushka, Rachel Lemberg, Jeremy Samama, Eliya Habba, Mohammad Salama
Filed: 29 Apr 22
Utility
odt7pf5iunex4c 2g01x
MSFT
27 Feb 24
Computing resources are managed in a computing network comprising a computing service provider and an edge computing network.
Rahul Bose, Mark Gordon Libby, Anand Muthurajan, Ronald Mark Parker, Michael Anthony Brown, Leland Douglas Benson
Filed: 29 Apr 22
Utility
gg1tlmjjm0zsdp14ex5c81ycx0mqvvg sqc7c1vn
MSFT
5 Mar 24
A computer system is configured to manage a value of a variable via firmware.
Neeraj Ladkani, Kuo-Shu Huang, James George Cavalaris
Filed: 29 Apr 22
Utility
s7w0qony0kybbjsza46lsdi61o9qb12
MSFT
13 Feb 24
The automatic detection of inconsistencies in a database system is described.
Mathieu Baptiste Demarne, Timothy Underwood Johnson, Miso Cilimdzic
Filed: 27 Apr 22
Utility
9jbxze3k8sew04 ivdta1dt
MSFT
5 Mar 24
Described herein are mechanisms to allow users to access functionality of applications in a suite of applications.
Madeline Schuster Kleiner, Nathaniel George Freier, Bernhard Kohlmeier, Amod Anil Agashe, Jignesh Shah, Tomasz Lukasz Religa
Filed: 27 Apr 22
Utility
xar9y06ykwg7lmhdwb8 f61g70jvpi9u6c
MSFT
5 Mar 24
A data processing system is implemented for detecting changes to infrastructure components, and extracting metadata associated with the changes.
Nidhi Verma, Rahul Nigam, Sudharsan Ganesan
Filed: 26 Apr 22
Utility
y7amrtutkt4z0gmhsgcyqocs46o5u6wjw5
MSFT
12 Mar 24
A technique is described herein for assisting a user in editing a file.
Christian Alexander Cosgrove, Saurabh Kumar Tiwary
Filed: 15 Apr 22