438 patents
Page 19 of 22
Utility
cj9n8dh2zq6d3lcje1j3vcadi2m52k2wg7zum629ir j9q5np8mh4o3l66j
MSFT
12 Mar 24
The disclosure is directed towards the real-time detection and mitigation of security threats to a domain name system (DNS) for a communication network.
Zheng Dong, Jack Wilson Stokes, III, Jie Li, Jinyuan Jia
Filed: 11 May 21
Utility
4ja54wfcu4rjfra 53swsbmhy
MSFT
23 Jan 24
According to examples, an apparatus may include a processor that may determine that an application was accessed through a portal.
Jeevan Suresh Desarda, Mayukh Ray
Filed: 11 May 21
Utility
5c4f2lq5l4qkr09tdyf0jq66gb0eyr6pgx1uvn6aht8x02z4k2p25zud2
MSFT
30 Jan 24
A wearable computing device, including a device body configured to be affixed to a body of a user.
Evan Gregory Levine, Salim Sirtkaya
Filed: 6 May 21
Utility
b7m44lpx6coi60vl7uw9wlsxhkyjrqngdqozf2ob4y
MSFT
5 Mar 24
The disclosed techniques assist in diagnosing performance problems of a software application.
Neil Evan Lydick
Filed: 3 May 21
Utility
y4rbrdbnc5hjaket1m1x iky9
MSFT
23 Jan 24
A system for adding persistence to SPAD imagery is configurable to capture, using a SPAD array, a plurality of image frames.
Raymond Kirk Price, Michael Bleyer, Christopher Douglas Edmonds
Filed: 30 Apr 21
Utility
brwb5aismxkzinabtlukpi17q
MSFT
6 Feb 24
In one method, device data including an orientation of a targeting device is received in a computing system.
Raymond Kirk Price, Michael Bleyer, Christopher Douglas Edmonds
Filed: 27 Apr 21
Utility
sozw2m3e9xvosuab zet0lvqj9gqa2k3lytwtslic64
MSFT
5 Mar 24
One example provides a computing device configured to capture, via the camera, first image data imaging a first physical world location, create a first spatial representation of the first physical world location based on the first image data, receive a user input defining a pose of a first virtual spatial anchor point relative to a feature imaged in the first image data, track user movement to a second physical world location, capture second image data imaging the second physical world location, receive a user input defining a pose of a second virtual spatial anchor point relative to a feature imaged in the second image data, and send, to a remote computing device, data representing the first spatial representation, the pose of first spatial anchor point, the second spatial representation, the pose of second spatial anchor point, and a positional relationship between first and second spatial anchor points.
Ali Reza Emami, Gabriel Takacs, Gavin Dean Lazarow, Skyler Mark Goodell
Filed: 26 Apr 21
Utility
zbj6qaz9njkobnv3q0i sivdjud5nw
MSFT
5 Mar 24
Disclosed herein is a system for minimizing the amount of time it takes to process and understand an unstructured, text-heavy document that includes important security-related information.
Bugra Karabey, Muhammad Ali Siddiqui, Jing Han Shiau, Meenal Srivastva, Subramanian Nagarajan
Filed: 21 Apr 21
Utility
c1vd3cw5otpsx5ieioz2m01an2k5 ar7muwhf90hl10iy30dkj1qh4loe
MSFT
6 Feb 24
The description relates to hinged devices, such as hinged computing devices.
Daniel C. Park
Filed: 19 Apr 21
Utility
2wn7eql2eznjogkwb4joyhj2xfk6t4wsi
MSFT
13 Feb 24
A method and system for predicting an intended time interval for a content segment may include receiving a request for natural language processing (NLP) of the content segment, the content segment including one or more temporal expressions, accessing contextual data associated with each of the one or more temporal expressions, decoding the content segment into a program that describes a temporal logic of the content segment based on the one or more temporal expressions, evaluating the program using the contextual data to predict an intended time interval for the content segment, and providing the intended time interval as an output.
Pamela Bhattacharya, Christopher Alan Meek, Oleksandr Polozov, Alex James Boyd
Filed: 14 Apr 21
Utility
pjqdpm477uahsg9ja5dqp3fyeylskvvqba5mi3d4e4hanbbcqje0czotsbt
MSFT
5 Mar 24
Some embodiments support embedding of a notebooks software component in a surrounding host application, thereby promoting consistency of notebook user interfaces and user experiences between different kinds of applications.
John Francis Lam, Safia Abdalla, Shibani Raj Basava, Dinesh Chandnani, Zhu Chen, Kwangje Cho, Ram Kumar Donthula, Katherine Kampf, Daniel Moth, Andrew Christopher Neil, Vaishnavi Sannidhanam, Barry Manh Tu, Vijaya Krishna Upadya, Dileep Yavanmandha
Filed: 7 Apr 21
Utility
23d6j01ezhz7hzunksxvh3jfinl8tr8x0 u7u49jhzxu
MSFT
23 Jan 24
An automated tuning service is used to automatically tune, or modify, the operational parameters of a large-scale cloud infrastructure.
Yiwen Zhu, Subramaniam Venkatraman Krishnan, Konstantinos Karanasos, Carlo Curino, Isha Tarte, Sudhir Darbha
Filed: 2 Apr 21
Utility
b376na835v wij9xtzme71aujm7cc
MSFT
27 Feb 24
Methods for data visibility in nested transactions in distributed systems are performed by systems and devices.
Sarvesh Singh, Alan Dale Halverson, Sandeep Lingam, Srikumar Rangarajan
Filed: 31 Mar 21
Utility
w4tlu4jityjnvdru33096h
MSFT
30 Jan 24
One example provides an integrated computing device, comprising one or more computing clusters, and one or more network controllers, each network controller comprising a local data notification queue to queue send message notifications originating from the computing clusters on the integrated computing device, a remote data notification queue to queue receive message notifications originating from network controllers on remote integrated computing devices, a local no-data notification queue to queue receive message notifications originating from computing clusters on the integrated computing device, and a connection scheduler configured to schedule sending of data from memory on the integrated computing device when a send message notification in the local data notification queue is matched with a receive message notification in the remote data notification queue, and to schedule sending of receive message notifications from the local no-data notification queue.
Deepak Goel, Mattheus C Heddes, Torsten Hoefler, Xiaoling Xu
Filed: 11 Mar 21
Utility
kg1cenrk0bwe2we1sps34hh9 w60ufkhsxlix40ezvcmwm
MSFT
23 Jan 24
Technologies relating to model interpretation are described herein.
Xinjian Xue, Adeel Jamil Siddiqui, Ryan Wang Gao, Jong-Chin Lin, Bin Pan, Naveen Duddi Haribabu, Balaji Ramasubramaniam
Filed: 22 Feb 21
Utility
yyz2mqxdp59el74s9mxqy49pjyv74j8o2dhgvxm qypgb4
MSFT
6 Feb 24
A holographic data storage system comprises an emitter system, a holographic recording medium, and an input waveguide network formed of one or more multimode optical waveguides.
Douglas James Kelly, Benn Charles Thomsen, Dushyanth Narayanan, Antony Ian Taylor Rowstron, Andreas Georgiou
Filed: 22 Feb 21
Utility
9q57nakpy4 mfca8uorg76tr0ohjyd2k44po66dohpuy
MSFT
30 Jan 24
In examples, a schema augmentation system for exploratory research leverages intelligence from a machine learning model to augment such tasks by leveraging intelligence derived from machine learning capabilities.
Gonzalo A. Ramos, Jin A Suh, Christopher Alan Meek, Shiqian Rachel Ng, Napol Rachatasumrit
Filed: 8 Feb 21
Utility
fdx9l4puq2bc9u6884be9882ok8n06gfnuv7xmgvxi8zn2v2
MSFT
13 Feb 24
A cloud computing capacity management system can include a fine-grained admission control layer, a policy engine, and an enforcement layer.
Gurpreet Virdi, Fernando Gonzalez Todisco, Karthikeyan Subramanian, Sanjay Ramanujan, Sorin Iftimie, Xing wen Wang, Thomas Moscibroda, Yunus Mohammed, Vi Lam Nguyen, Rostislav Sudakov
Filed: 2 Feb 21
Utility
zl8zsevhx74 v0n5a4g4srctq1r6eaqu2moass
MSFT
5 Mar 24
Aspects of the present disclosure relate to systems and methods for performing targeted searching based on a user profile.
Junaid Ahmed, Waleed Malik, Arnold Overwijk
Filed: 29 Jan 21
Utility
0u1mafcz0bi0drof97e9c3y9wy5s0fvk955pjh smo53
MSFT
27 Feb 24
Jordi Mola
Filed: 22 Jan 21