Mechanically attached edge shield
The edge shields disclosed herein utilize a plated edge surface of a pcb to form one or more sides of an electronic shield to reduce the amount of top surface area of the pcb occupied by the electronic shield. More specifically, an edge shield lid is mechanically attached to the plated edge surface to remove a need for solder overprint at the edge of the pcb. ... Microsoft Corporation
Geographic information for wireless networks
Techniques for geographic information for wireless networks are described. According to various embodiments, a connectivity module on a mobile device receives geographic position information for a mobile device from another functionality of the mobile device and independent of a query by the connectivity module for the information. ... Microsoft Corporation
Geographic information for wireless networks
Techniques for geographic information for wireless networks are described. According to various embodiments, a connectivity module on a mobile device receives geographic position information for a mobile device from another functionality of the mobile device and independent of a query by the connectivity module for the information. ... Microsoft Corporation
Geographic information for wireless networks
Techniques for geographic information for wireless networks are described. According to various embodiments, a connectivity module on a mobile device receives geographic position information for a mobile device from another functionality of the mobile device and independent of a query by the connectivity module for the information. ... Microsoft Corporation
Geographic information for wireless networks
Techniques for geographic information for wireless networks are described. According to various embodiments, a connectivity module on a mobile device receives geographic position information for a mobile device from another functionality of the mobile device and independent of a query by the connectivity module for the information. ... Microsoft Corporation
Electronic device including directional mems microphone assembly
An electronic device with directional mems microphone assembly is provided, including a mems microphone capsule with a pcb affixed thereto, and a housing affixed to the pcb. The microphone assembly includes a first internal port and a second internal port through the pcb, wherein the first and second internal ports fluidically communicate with the mems microphone capsule. ... Microsoft Corporation
Selective rendering of sparse peripheral displays based on user movements
Peripheral visualizations are based on user movements and/or interactions with elements in a scene. Various user movements are detected while a scene is being rendered. ... Microsoft Corporation
Correction of multipath interference in time of flight camera depth imaging measurements
A system for determining distances to features in a scene is disclosed. The system includes, among other features, a target portion identifier module, a target surface generator, a reflector selection module, a light transport simulation module, a depth measurement correction generation module, and a distance calculation module. ... Microsoft Corporation
Smart device pairing and configuration for meeting spaces
Pairing and configuring a computing device for use in a meeting space is provided. An appliance may communicate a broadcast to a computing device which announces the availability of a meeting space for a meeting. ... Microsoft Corporation
Message forwarding and retrieval with a single messaging service
Embodiments described herein generally relate to a method and system of integrating a user's voice mail onto a single voice messaging service, e.g., a unified messaging (um) service, such that a client may access this single source for voice mail retrieval, even where such voice mails are from a variety of sources, e.g., work, mobile phone, etc. A user, or the user's mobile operator, need only agree to accept the service, and the registration and configuration requirements for providing the service and forwarding calls to the service are automatically configured. ... Microsoft Corporation
Insight based routing for help desk service
Non-limiting examples of the present disclosure describe insight-based routing that is used to improve processing of a service request through a help desk service. A request for support (e.g. ... Microsoft Corporation
Routing during communication of help desk service
Non-limiting examples of the present disclosure describe insight-based routing that is used to improve processing during a communication of a help desk service. Real-time signal data is collected from a communication between a customer and a first support agent. ... Microsoft Corporation
Various systems and methods for request distribution are described herein. In an example, a system for request distribution includes a storage to store instructions and a processor. ... Microsoft Corporation
Desktop assistant for multiple information types
A method and system for providing an aggregate view of information that a user may need is provided. A desktop assistant system collects information items that a user may need such as scheduling information and recently received messages. ... Microsoft Corporation
There is provided a method of controlling a rate at which content data is received at a receiver over a network, wherein the receiver has caused a first strew of real-time communication event data to be received at the receiver, and a second stream of content data to be received at the receiver, the method comprising steps of: dynamically measuring network conditions of the network based on the real-time communication event data; and limiting the rate at which the content data is received at the receiver based on the dynamically measured network conditions.. . ... Microsoft Corporation
Described technologies automatically detect computing system security attacks. Departure of occurrence distributions, which are based on leading digit(s) of digital item occurrence data, from model distributions that correspond to particular data sources, indicates a presence likelihood for particular attack types. ... Microsoft Corporation
A system to detect domain name server tunneling includes a processor and machine readable instructions stored on a tangible machine readable medium, which when executed by the processor, configure the processor to collect, during a predetermined time period, responses received from a domain name server to queries sent to the domain name server by a computing device, the responses including internet protocol (ip) addresses; collect ip addresses accessed by the computing device during the predetermined time period; compare the ip addresses received by the computing device in the responses from the domain name server to the ip addresses accessed by the computing device; and detect domain name server tunneling based on the comparison.. . ... Microsoft Corporation
Computing systems, devices, and associated methods of managing secure communication using hardware accelerators are disclosed herein. In one embodiment, a method includes receiving messages from a peer computing device via a computer network at a fpga of a hardware accelerator and examining each of the received messages to determine whether the received messages contain application data. ... Microsoft Corporation
In an example, a method includes receiving a data package, the data package including a contact identification and a message payload; in response to determining that a key for the contact identification does not exist in a contact table: generating a key for the contact identification; and updating the contact table with the generated key to indicate an association between the key and the contact identification; calculating a hashed identification based on the generated key and contact identification; and associating the message payload with the hashed identification in a message table.. . ... Microsoft Corporation
Computing systems, devices, and associated methods of managing secure communication using hardware accelerators are disclosed herein. In one embodiment, a method includes receiving a data request from a user kernel requesting to read a message stored in a buffer. ... Microsoft Corporation
Variety of approaches to provide an autonomous governor in a distributed system for preserving a shared resource are described. A hosted service initiates operations to provide the autonomous governor upon determining the shared resource to be managed. ... Microsoft Corporation
Aspects extend to methods, systems, and computer program products for automatically commissioning an electrical system in industrial/commercial settings (e.g., a data center) to increase the likelihood that the electrical system functions as intended when released into production. Automated data collection devices can collect commissioning data related to electrical and other characteristics of electrical equipment. ... Microsoft Corporation
Described are examples of an input device having a wheel with a plurality of teeth, where at least the plurality of teeth are composed of a ferrous or magnetic material. A magnet is disposed to provide a first magnetic field that attracts the ferrous or magnetic material of the plurality of teeth to provide a detent action when moving the wheel from a first position to a second position. ... Microsoft Corporation
Various embodiments relating to management of game data of a video game by a game service and service triggered delivery of game data to various subscribers are provided. In one embodiment, game data of a video game is received at a game service computing machine as the video game is being executed on a user gaming machine. ... Microsoft Corporation
Systems, devices, media, and methods are presented for identifying unread elements and presentation context to generate real-time indicators for the unread elements. The systems and methods receive an indication identifying a member and identify content for presentation to the member. ... Microsoft Corporation
Digital ink is generated to represent a visual component, such as a letter, number, character, and/or other symbol. The digital ink is generated by obtaining multiple different curves that combine to generate the visual component. ... Microsoft Corporation
Optimizations are provided for late stage reprojection processing for a multi-layered scene. A scene is generated, which is based on a predicted pose of a portion of a computer system. ... Microsoft Corporation
Non-limiting examples of the present disclosure describe insight-based routing that is used to improve transparency and communication between customers and support agents of a help desk service. An unresolved case may be identified through a help desk service. ... Microsoft Corporation
A calendar sharing invitation is received, and a receiver of the information is identified. The calendar sharing information is sent to the receiver, and the sharer's calendar data is synchronized to a computing system corresponding to the receiver. ... Microsoft Corporation
A risk factor that software written by a developer includes bugs can be calculated for the developer. The risk factor can be used to determine the quality of the developer's code. ... Microsoft Corporation
Generally discussed herein are devices, systems, and methods for machine-learning. A method may include projecting an input feature vector of a first dimensional space into a second dimensional space to create a lower dimensional feature vector, the second dimensional space smaller than the first dimensional space, determining a first prediction vector for an internal node of the tree, determining whether to pass the first prediction vector to a first child or a second child of the internal node based on a sparse vector and the lower dimensional feature vector, determining a second prediction vector at a leaf node of the tree, and determining an overall prediction by combining the first and second prediction vectors.. ... Microsoft Corporation
A machine learning model can be trained to infer the probability of the presence of categories of a software bug in a source code file. A bug tracker can provide information concerning the category to which a software bug belongs. ... Microsoft Corporation
Generally discussed herein are devices, systems, and methods for encoding input-output examples. A method of generating a program using an encoding of input-output examples, may include processing an input example of the input-output examples, using a first long short term memory (lstm) neural network, one character at a time to produce an input feature vector, processing an output example associated with the input example in the input-output examples, using the lstm neural network, one character at a time to produce an output feature vector, determining (a) a cross-correlation between the input feature vector and the output feature vector or (b) previously computed feature vectors for a different input-output example that are sufficiently close to the input feature vector and the output feature vector, respectively, and using the determined cross-correlation or previously computed vector, generating a program consistent with the input example and the output example.. ... Microsoft Corporation
Systems, methods, and computer-readable storage media are provided for automating personalized out-of-the-box and ongoing in-application settings. A triggering event is detected for an exchange of information between an information service and one or more application or service. ... Microsoft Corporation
Systems, methods, and software for sensitive data handling frameworks for user applications are provided herein. An exemplary method includes receiving subsets of structured user content consolidated into associated flattened representations, the associated flattened representations having a mapping to the structured user content and accompanied by at least lengths and offset information relating to the mapping. ... Microsoft Corporation
Systems, methods, and software for data privacy annotation frameworks for user applications are provided herein. An exemplary method includes identifying at least a first threshold quantity, an elasticity factor for modifying the first threshold quantity to a second threshold quantity, and an indication of a threshold resiliency property indicating when the second threshold quantity overrides the first threshold quantity. ... Microsoft Corporation
Systems, methods, and software for data obfuscation frameworks for user applications are provided herein. An exemplary method includes providing user content to a classification service configured to process the user content to classify portions of the user content as comprising sensitive content, and receiving from the classification service indications of the user content that contains the sensitive content. ... Microsoft Corporation
To measure usage of computing resources on a computer, a logging service running on the computer generates event data. The computer transmits the event data to an event processing system. ... Microsoft Corporation
To measure usage of computing resources on a computer, a logging service running on the computer generates event data. The computer transmits the event data to an event processing system. ... Microsoft Corporation
Enhanced administrative tools for a unified file retention management system to enable selective activation of a data retention policy with respect to subsets of files across multiple productivity platforms. The system enables a user to selectively activate file management labels and/or file retention rules of a unified retention policy with respect to files that correspond to user defined filter parameters indicating subsets of files across user selected productivity platforms. ... Microsoft Corporation
A unified document retention management system exposes a retention policy management portal to enable a user to selectively prescribe a unified retention policy to multiple productivity platforms to deploy the unified retention policy across the user selected productivity platforms. Data retention rules of the unified retention policy may define actions to be performed with respect to files that satisfy certain predefined conditions. ... Microsoft Corporation
An example system for formatting digital ink includes a processor configured to receive digital ink. The processor is to also detect a context in which the digital ink is received. ... Microsoft Corporation
Devices, systems, and methods for automatically creating a document. In one example, the system and method perform or include capturing, with a web-extension associated with a word-processing application, implicitly-tagged-content and an explicitly-tagged-content displayed on a web browser along with tags associated with the implicitly-tagged-content and the explicitly-tagged-content; receiving, with a speech-to-text interface, natural-language audio instruction associated with generating a document; generating, with a natural-language processor, a plain-text command associated with the natural-language audio instruction; retrieving personalized-content based on the plain-text command; and organizing, with a content-organizer, the personalized-content based on one or more criteria selected from a group consisting of page rank of a content displayed on the web browser, a source of the content, an authoring-style, and a document template. ... Microsoft Corporation
A method of manual memory management is described. In response to detecting an access violation triggered by the use of an invalid reference to an object in a manual heap, a source of the access in a register or stack is identified. ... Microsoft Corporation
Systems and methods for sending in-product notifications to individual users of a software product or a specifically identified subset of users of the software product selected via their previously observed interactions with the software product. In addition, targeted notifications of bug fixes can be sent to specific users who have encountered an error condition or performance issue that a particular bug fix is designed to correct.. ... Microsoft Corporation
For each detected bug, historical code with similar characteristics and bug corrections from a historical bug dataset can be displayed in a source code editor. Relevant training and/or testing data can be found by comparing an internal representation of the code under development with an internal representation of the original buggy code in the historical bug dataset. ... Microsoft Corporation
Application service configuration of a timeframe for performing dataloss failover (failover that does not attempt full data replication to the secondary data store) from a primary data store to the secondary data store. A data-tier service, such as perhaps a database as a service (or dbaas), could receive that configuration from the application service and automatically perform the any dataloss failover as configured by the application service. ... Microsoft Corporation
Systems and methods for sending in-product notifications to individual users of a software product or a specifically identified subset of users of the software product selected via their previously observed interactions with the software product.. . ... Microsoft Corporation
A system includes a processor and machine readable instructions stored on a tangible machine readable medium, which when executed by the processor, configure the processor to collect data regarding resource use within a computing system, the data being collected periodically, without running a diagnostic program, and before occurrence of a diagnosis worthy event; and provide the collected data to the diagnostic program executed after the occurrence of the diagnosis worthy event so that the diagnostic program has data from before the occurrence of the diagnosis worthy event to enable determination of a cause of the diagnosis worthy event.. . ... Microsoft Corporation
This application concerns methods, apparatus, and systems for performing quantum circuit synthesis and/or for implementing the synthesis results in a quantum computer system. In certain example embodiments: a universal gate set, a target unitary described by a target angle, and target precision is received (input); a corresponding quaternion approximation of the target unitary is determined; and a quantum circuit corresponding to the quaternion approximation is synthesized, the quantum circuit being over a single qubit gate set, the single qubit gate set being realizable by the given universal gate set for the target quantum computer architecture.. ... Microsoft Corporation
User action data, quantifying the actions of the user in a physical establishment, can be obtained through various forms of tracking and monitoring that can be implemented by software or hardware infrastructure supported by physical establishment, and agreed to by the user. Such user action data is obtained from multiple physical establishments, which, in combination with tracking of user actions in an online environment, provides a more accurate basis on which to determine a user's intent to act upon an item, a user's affinity for items associated with a specific entity, or combinations thereof. ... Microsoft Corporation
Workflow definitions are broken into a set of components. Each workflow component has an instance-specific workflow definition that it operates from. ... Microsoft Corporation
Variety of approaches to optimize a feature deployment based on an usage pattern are described. A hosted service initiates operations to optimize the feature deployment upon detecting a feature update associated with an application. ... Microsoft Corporation
Information concerning software bugs including bug detection, bug prediction data and/or historical bug data can be used to determine whether it is safe to commit, integrate, deploy and/or deliver a software change. If the change is deemed unsafe, the change can be rejected automatically. ... Microsoft Corporation
Examples of the disclosure enable the recalculation of device chaining in a user interface. In some examples, a first element representing a first hardware device is received at a design surface of a computing device user interface. ... Microsoft Corporation
Described are systems, methods, and computer-readable media for program generation in a domain-specific language based on input-output examples. In accordance with various embodiments, a neural-network-based program generation model conditioned on an encoded set of input-output examples is used to generate a program tree by iteratively expanding a partial program tree, beginning with a root node and ending when all leaf nodes are terminal.. ... Microsoft Corporation
A method of creating an application definition for a distributed application is disclosed. Constructs corresponding with a schema of the distributed application are defined in a declarative and technology agnostic manner. ... Microsoft Corporation
An append-only streams capability may be implemented that allows the host (e.g., the file system) to determine an optimal stream size based on the data to be stored in that stream. The storage device may expose to the host one or more characteristics of the available streams on the device, including but not limited to the maximum number of inactive and active streams on the device, the erase block size, the maximum number of erase blocks that can be written in parallel, and an optimal write size of the data. ... Microsoft Corporation
Systems and methods are disclosed for the index, search, and retrieval of user interface content. In one implementation, an image of a user interface as presented to a user via a display device can be captured. ... Microsoft Corporation
Optimizations are provided for late stage reprojection processing for a multi-layered scene. A multi-layered scene is generated. ... Microsoft Corporation
Peripheral visualizations are based on various attributes associated with a scene. Characteristics of elements in a scene are determined. ... Microsoft Corporation
Reversible connector orientation detection circuitry, reversibly connectible devices having multiple device portions, and methods for determining a connection orientation of multiple device portions of a hardware device are provided herein. A hardware device can include a first device portion and a second device portion. ... Microsoft Corporation
There is provided a device comprising a key request module and a key receive module. The key request module is configured to transmit a key request to a provisioning server, and the key receive module is configured to receive a device root key associated with the device from the provisioning server. ... Microsoft Corporation
Examples disclosed herein relate to efficient hierarchical radio frequency (rf) spectrum assigning across both licensed and unlicensed frequencies in a given area. Wireless devices in the area are detected by a spectrum manager, which also detects all available rf frequencies that are available. ... Microsoft Corporation
Systems and methods for hrtf personalization are provided. More specifically, the systems and methods provide hrtf personalization utilizing non-parametric processing of three-dimensional head scans. ... Microsoft Corporation
An electronic device in accordance with a particular embodiment of the present technology includes a rigid covering substrate, an acoustic port extending through the covering substrate, an acoustic transducer carried by the covering substrate, and another electronic component (e.g., a touch sensor or an antenna) also carried by the covering substrate. The electronic device can also include processing circuitry and an array of electrodes through which the acoustic transducer and the other electronic component are electrically connected to the processing circuitry. ... Microsoft Corporation
A technique is described herein for decoupling the playback of media content streams that compose a media item. In one implementation, the technique involves: in a synchronized state, presenting a stream of first media content (such as audio content) in synchronization with a stream of second media content (such as video content); detecting a desynchronization event; in response to the desynchronization event, transitioning from the synchronized state to a desynchronized state by changing (e.g., slowing) a rate at which the stream of second media content is presented, relative to the stream of first media content; detecting a resynchronization-initiation event; and, in response to the resynchronization-initiation event, returning to the synchronized state by providing a compressed presentation of the stream of second media content. ... Microsoft Corporation
In this disclosure, a hybrid digital-analog video coding scheme is described. For a video including at least two associated sequences of frames such as a stereo video, some of the frames are digitally encoded, while the others are encoded in an analog way with reference to the digital frames. ... Microsoft Corporation
Methods and devices for presenting a virtual reality image may include rendering at least one image frame received from an application for a virtual reality image for display on a display device. The methods and devices may include receiving a selection of one of a plurality of tear thresholds that define conditions for tearing in a displayed image. ... Microsoft Corporation
Techniques for managing a plurality of mobile communications devices by an enterprise server are described. The mobile communications devices may be configured to communicate on a mobile communications network operated by a mobile network operator. ... Microsoft Corporation
Techniques are described herein that are capable of dynamically activating web applications. For instance, such applications may not be configured on a machine until requests for those applications are received by the machine. ... Microsoft Corporation
A network configuration management system can determine configuration settings for network devices and detect configuration setting errors in the configuration settings that can cause security vulnerabilities. The configuration setting errors can include a configuration setting value error or a supplemental access setting error. ... Microsoft Corporation
Disclosed herein are example embodiments of protocols to distill magic states for t-gates. Particular examples have low space overhead and use an asymptotically optimal number of input magic states to achieve a given target error. ... Microsoft Corporation
Techniques for controlling a voice activated feature of a voice activated device are described. Data from one or more sensors and data indicative of a status of a user are received. ... Microsoft Corporation
Examples described herein generally relate to rendering graphics using a graphics processing unit (gpu) in a computing device. A synchronization object associated with a wait event can be created, wherein the wait event indicates a time offset before a timed event associated with a display device of the computing device. ... Microsoft Corporation
Examples described herein generally relate to rendering virtual reality images on a computer device including an integrated first graphics processing unit (gpu) and a discrete second gpu. The second gpu can receive first pose information of a head mounted display (hmd) connected to a video port associated with the first gpu. ... Microsoft Corporation
Systems and methods are disclosed for meeting completion. In one implementation, a message generated in relation to a meeting is received. ... Microsoft Corporation
In some implementations, a first set of user activity data is received from a plurality of sensors where the first set of user activity data corresponds to a plurality of users. A task list of an objective is extracted from the received first set of user activity data based on patterns formed in the first set of user activity data in association with the plurality of users pursuing the objective. ... Microsoft Corporation
The disclosed technology is generally directed to data corroboration, e.g., in iot systems. In one example of the technology, receiving a first set of data over time from a first external device. ... Microsoft Corporation
Techniques for using different data sources for a predictive model are described. According to various implementations, techniques described herein enable different data sets to be used to generate a predictive model, while minimizing the risk that individual data points of the data sets will be exposed by the predictive model. ... Microsoft Corporation
Techniques for using data sets for a predictive model are described. According to various implementations, techniques described herein enable different data sets to be used to generate a predictive model, while minimizing the risk that individual data points of the data sets will be exposed by the predictive model. ... Microsoft Corporation
Various embodiments herein each include at least one of systems, methods, and software for feature flow for video recognition. Such embodiments generally include a fast and accurate framework for video recognition. ... Microsoft Corporation
An electronic device includes a cover glass having a display surface, a pixelated photoemitting element array, and a pixelated photodetecting element array. The pixelated photoemitting element array emits a light signal through the cover glass to the display surface. ... Microsoft Corporation
Biases in search and retrieval (i.e., situations where searchers seek or are presented with information that significantly deviates from the truth) may be detected by comparison to one or more authoritative sources. Once bias or potential bias is detected, techniques may be applied to indicate and/or compensate for the bias. ... Microsoft Corporation
A playlist engine is provided that selects content items for a partial playlist. The content items may include audio content items (i.e., tracks or songs). ... Microsoft Corporation
Representative embodiments disclose mechanisms for data and identity migration, such as from an on-premises environment to a cloud environment. The system comprises multiple data collectors, each tailored to collect data from a data source. ... Microsoft Corporation
Examples of the present disclosure describe systems and methods relating to context rules in a graph or isolated collection. In an example, information in an isolated collection may be associated with one or more contexts. ... Microsoft Corporation
Examples of the present disclosure describe systems and methods relating to rule hierarchies for graphs or isolated collections. In an example, information in an isolated collection may relate to one of multiple levels in a hierarchy. ... Microsoft Corporation
A data input system is described which has a user interface which receives one or more context text items in a sequence of text items input by a user. A processor of the data input system uses a plurality of language models to predict, from each language model, a next item in the sequence of text items. ... Microsoft Corporation
Enabling breakpoints on entire data structures include methods, systems, and computer program products for setting breakpoints on a plurality of memory addresses covered by a data structure. One embodiment includes receiving a reference to a data structure for which breakpoints are requested and then, based on this reference, identifying a data structure layout of the data structure. ... Microsoft Corporation
Various techniques for deferred server recovery are disclosed herein. In one embodiment, a method includes receiving a notification of a fault from a host in the computing system. ... Microsoft Corporation
When an activity agent desires to perform a particular task on a device, the activity agent communicates a request to a resource control system of the device. The request has an associated amount of energy that is expected to be used by the activity agent to perform the task. ... Microsoft Corporation
Systems and methods are disclosed for supporting debugging of programs in block-based processor architectures. In one example of the disclosed technology, a processor includes an exception event handler, a memory interface, at least one block-based processor core coupled to the memory interface and configured to responsive to receiving an exception event signal while executing an instruction block, store state data for the core generated by executing the instruction block, transfer control of the core to a second instruction block, and resume execution of the first instruction by restoring state for the processor core from the stored state data.. ... Microsoft Corporation
Techniques for initiating update operations are described. In implementations, updates are gathered for a computing device, and grouped based on whether the updates involve a device restart and/or shutdown operation to be installed. ... Microsoft Corporation
Aspects of the present disclosure relate to systems and methods for deploying payloads in a cloud service. In one aspect, one or more payloads may be deployed to a plurality of sample servers. ... Microsoft Corporation
Universal platform applications, while advantageous and efficient, have inherent limitations,, including an. Inability to manage multiple views on multiple display devices. ... Microsoft Corporation
Universal platform applications, while advantageous and efficient, have inherent limitations, including an inability to manage multiple views on multiple display devices. According to embodiments, such management may be facilitated by packaging a universal platform application with a desktop application to launch a universal platform application secondary view on a designated display device. ... Microsoft Corporation
Semantic zoom techniques are described. In one or more implementations, techniques are described that may be utilized by a user to navigate to content of interest. ... Microsoft Corporation
Signals from a plurality of sensing lines of a grid based digitizer sensor based is combined based on matrix multiplication with a hadamard matrix. The combining provides a plurality of signal combinations. ... Microsoft Corporation
An electronic device has a sensor panel and a display upon which content is rendered in use. A control module controlling the sensor panel enters a whiteboard-style erase mode when specified conditions are met. ... Microsoft Corporation
Techniques for providing backup power to distributed computing systems are disclosed herein. In one embodiment, a method includes receiving, via the computer network, data indicating a power failure of the main power source configured to provide electrical power to the servers. ... Microsoft Corporation
The disclosed technology includes a thermal management hinge connecting at least two hinged components of a computing device. The thermal management hinge has at least two different thermal orientations for managing thermal conditions within each of the hinged components. ... Microsoft Corporation
A wearable image display system includes a headpiece, a first and a second light engine, and a first and a second optical component. The first and second light engines generate a first and a second set of beams respectively, each beam substantially collimated so that the first and second set form a first and a second virtual image respectively. ... Microsoft Corporation
Implementations described herein are directed to depositing a magnetic ink onto a substrate. The magnetic ink is deposited on a portion of a substrate such that the amount of magnetic ink is divided into a plurality of sections where individual sections of the plurality of sections can be spaced at substantially regular intervals. ... Microsoft Corporation
Described herein is a system and method for detecting and compensating for an anomaly in three-dimensional object fabrication. A wall thickness computation component computes a wall thickness of a three-dimensional object to be fabricated. ... Microsoft Corporation
Example apparatus and methods concern establishing, maintaining, managing, or terminating communications between an access point and a client in a wireless network used by a shared, wireless gaming system. An example apparatus may include a first logic configured to control timing for the protocol and a second logic configured to control message exchange for the protocol. ... Microsoft Corporation
A cooled electronics module (cem) includes a cooling device and a server blade or other electronic device that is operationally enclosed in a container of the cooling device by a closure secured to a connection block. Each cem is pluggable for electronic communication and coolant fluid flow. ... Microsoft Corporation
One disclosed example comprises an ink formulated for printing an electrically conductive trace on a flexible fabric substrate. The ink includes an elastomer and a liquid vehicle capable of swelling the elastomer, the liquid vehicle having a boiling point of 150° c. ... Microsoft Corporation
Examples are disclosed that related to scanning image display systems. In one example, a scanning display system comprises a laser light source comprising two or more offset lasers, a scanning mirror system configured to scan light from the laser light source in a first direction at a higher frequency, and in a second direction at a lower frequency to form an image, and a controller configured to control the scanning mirror system to scan the laser light an interlaced pattern to form the image, and to adjust one or more of a scan rate in the second direction and a phase offset between a first frame and a second frame of the interlaced image.. ... Microsoft Corporation
An eye movement tracking device includes an illumination source configured to transmit energy from a location proximate to an eye of a person such that a portion of transmitted energy is reflected off the eye of the person, a filter configured to generate filtered reflections, and an image sensor and shutter configured to detect the filtered reflections and to distinguish the filtered reflections of the portion of the transmitted energy from other energy detected by the image sensor and shutter based on times of flight and the frequency band of the filtered reflections of the portion of the transmitted energy and the other energy. The eye tracking device further includes a processor configured to determine a position of the eye of the person.. ... Microsoft Corporation
A method includes obtaining data representing multiple characters, determining a code for each character wherein each code corresponds to a different audio frequency, and transmitting the codes at the corresponding audio frequencies.. . ... Microsoft Corporation
A method includes acts for establishing a subscription for an entity. The method includes receiving, at a cloud service provider, a request from an entity to establish a subscription. ... Microsoft Corporation
A system may identify resources such as applications or network locations that are not adequately covered by an enterprise's security policy to notify a network administrator of such deficiencies. An exemplary security policy may allow or deny access to individual functional resources (e.g. ... Microsoft Corporation
A system may delegate authority to manage aspects of a security policy developed by administrative personnel to standard users (e.g. Non-administrative personnel) corresponding to managed accounts within an administrative hierarchy. ... Microsoft Corporation
Correlated signals associated with one or more of stored content, content metadata, and activities associated with the stored content of a tenant may be analyzed and alert(s) determined based on alert threshold(s) or broader “abnormal” pattern detection. Different recipients for different alerts or alert levels may be designated and the alert(s) transmitted to the designated recipients. ... Microsoft Corporation
Aspects of an abuse detection system for a web service include an abuse detection engine executing on a server. The abuse detection engine includes a pre-processing module for aggregating a data set for processing and analysis; a suspiciousness test module for identifying suspicious content owners and suspicious users; a graphing module for finding connections between suspicious content owners and suspicious users; an analysis module for determining which groups are constituted of fraudulent or abusive accounts; and a notification generation and output module for generating a list of abusive entities and a notification for output to at least one of: the abusive entity, a digital content distribution company associated with the abusive entity, and a legal department or other entity for further investigation or action. ... Microsoft Corporation
Techniques are described herein that are capable of providing security for code between a code generator and a compiler. The code generator generates source code. ... Microsoft Corporation
Systems and methods are disclosed for personalized communications using semantic memory. In one implementation, a first communication is received from a user and processed to identify a first content element within the communication. ... Microsoft Corporation
A plurality of forwarding servers is communicatively coupled to a plurality of sending systems via a network. A first forwarding server associated with a first geographical region includes an interface that receives a first request for a resource from a first sending system via the network. ... Microsoft Corporation
A method and proxy device for on-demand generation of cryptographic certificates. The method includes receiving, by a proxy device, a request to access a cloud application; identifying a domain name designated in the received request; determining if the identified domain name is signed by a valid cryptographic certificate saved locally in the proxy device; and sending, to a certificate generator system, a certification request to issue a new cryptographic certificate to sign the identified domain name, when the identified domain name is not a signed domain name.. ... Microsoft Corporation
Examples are disclosed that relate to flexible electrical interconnects in electronic devices. One example provides a device including a flexible substrate, a conductive trace disposed on the flexible substrate, an electronic component mounted to the flexible substrate, a liquid metal interconnect bridging between a pad on the component and the trace on the flexible substrate, and an encapsulant covering the interconnect.. ... Microsoft Corporation
A computing device having an interface surface and one or more attachment features oriented on the interface surface is described. A removable support device with an interface surface and one or more attachment features oriented on the interface surface is described. ... Microsoft Corporation
A system is provided that employs a statistical approach to semi-supervised speech enhancement with a low-order non-negative matrix factorization (“nmf”). The system enhances noisy speech based on multiple dictionaries with dictionary atoms derived from the same clean speech samples and generates an enhanced speech representation of the noisy speech by combining, for each dictionary, a clean speech representation of the noisy speech generated based on a nmf using the dictionary atoms of the dictionary. ... Microsoft Corporation
Various systems and methods for multi-talker speech separation and recognition are disclosed herein. In one example, a system includes a memory and a processor to process mixed speech audio received from a microphone. ... Microsoft Corporation
Automatic speech recognition systems can benefit from cues in user voice such as hyperarticulation. Traditional approaches typically attempt to define and detect an absolute state of hyperarticulation, which is very difficult, especially on short voice queries. ... Microsoft Corporation
Examples are disclosed that relate to attributing touch events on a touch-sensitive computing device to a user who performed the touch event. One example provides a computing system, comprising a touch sensor, a communication subsystem comprising a first communication mechanism integrated with the touch sensor, the first communication mechanism configured to communicate with a portable device over a first communication channel via a body-transmissible signal upon detection of a touch input, and also comprising a second communication mechanism configured to communicate with the portable device via a second communication channel. ... Microsoft Corporation
Aspects of the present disclosure relate to systems and methods that aid users with hearing and/or speech impediments to have a conversation with a remote phone number without human assistance. In one aspect, an application residing on a user's device, such as a smartphone, tablet computer, laptop, etc., may be used to initiate a phone call to a recipient. ... Microsoft Corporation
Methods and devices for animating variable fonts may include receiving a request to animate one or more glyphs of a variable font in a design space based on one or more animation parameters. The methods and devices may also include determining an animation path in the design space for the one or more glyphs based on the animation parameters and calculating a set of keyframes having respective keyframe positions along the animation path. ... Microsoft Corporation
A device and method use multiple light emitters with a single, multi-spectrum imaging sensor to perform multi-modal infrared light based depth sensing and visible light based simultaneous localization and mapping (slam). The multi-modal infrared based depth sensing may include, for example, any combination of infrared-based spatial mapping, infrared based hand tracking and/or infrared based semantic labeling. ... Microsoft Corporation
Techniques are provided for building a unified model for selecting content items of different types in response to receiving electronic content requests transmitted over a network. In one technique, in response to a request, multiple content items are identified. ... Microsoft Corporation
A communication application creates a team mailbox integrating messages from an email repository and documents from a content management store (cms). The application enables an administrator to define and manage members of the team mailbox with varying privilege status for accessing the team mailbox. ... Microsoft Corporation
Methods and computer program products for establishing communication events between an initiator user and a recipient user over a first communication system. The initiator and recipient users are contacts within a second communication system but are not contacts within the first communication system. ... Microsoft Corporation
A computing system for monitoring a terrestrial logistics network includes an event monitoring module, a logistics module, and a mapping module. The event monitoring module is configured to extract event classifications and event spatial locations from messages broadcast from a curated plurality of independent third party broadcasting entities. ... Microsoft Corporation
Sometimes meetings are scheduled on short notice, and finding an available meeting space in which to hold them may be difficult. Embodiments are directed to automatic reservation of a meeting space through a communal meeting device located therein allowing users to efficiently initiate meetings without the concern of being later disrupted and kicked out of the meeting space. ... Microsoft Corporation
A system, a machine-readable storage medium storing instructions, and a computer-implemented method are described herein are directed to a key feature engine receives a request for a desired number of key features to be identified from a data set in at least a portion of a database. The key feature engine executes instances of multiple types of machine learning data models on the data set to calculate respective regression coefficients, in each machine learning data model instance, for each feature in a plurality of features defined by a plurality of data categories of a social network service. ... Microsoft Corporation
A method to predict churn includes obtaining static features representative of a customer of a service, obtaining time series features representative of the customers interaction with the service, using a deep neural network to process the static features, using a recurrent neural network to process the time series features; and combining outputs from the deep neural network and the recurrent neural network to predict likelihood of customer churn.. . ... Microsoft Corporation
Artificial polynucleotides may have different characteristics than natural polynucleotides so conventional base-calling algorithms may make incorrect base calls. However, because artificial polynucleotides are typically designed to have certain characteristics, the known characteristics of the artificial polynucleotide can be used to modify the base-calling algorithm. ... Microsoft Corporation
A computer-navigable trie structure used in order to represent predicates for matching foreign keys to primary rows in a primary table. The predicates may be wide ranging, and each may be represented by a corresponding descendant path of the trie structure, and defines which foreign keys are to be mapped to the particular row. ... Microsoft Corporation
Implementing a database system using a plurality of sequentially ordered drives to store sequential portions of columns of the database, but where the database system is usable by a system configured for use with in-memory database systems. The method includes loading one or more columns of a database into main memory of a computing system as a table based database. ... Microsoft Corporation
Systems and methods are provided for optimizing data storage and improving the speed of data retrieval in a data store, such as a storage server connected to a large network through the use of bucketing techniques to create efficient data structures for storing received key-value datasets at one or more storage servers. Fast key-value read requests and key-value retrievals may be accomplished through the use of multiphase lookup operations on the one or more storage servers. ... Microsoft Corporation
A system, a computer-readable medium comprising instructions, and a computer-implemented method are directed to a forecasting engine, as described herein. The forecasting engine receives a ranked list of content portions that are ranked based on relevance score values of the content portions. ... Microsoft Corporation
Systems and methods are disclosed for cross-device task registration and resumption. In one implementation, a task can be received from a task registration service of a first device associated with a user. ... Microsoft Corporation
Techniques are described for improving the boot performance of an operating system (os) used to launch a virtual machine. In embodiments, a request is received that identifies an os image and that includes information indicative of when a boot-up process of the os is complete. ... Microsoft Corporation
A method of manual memory management is described which comprises enabling one or more threads to access an object created in a manual heap by storing a reference to the object in thread-local state and subsequently deleting the stored reference after accessing the object. In response to abandonment of the object, an identifier for the object and a current value of either a local counter of a thread or a global counter are stored in a delete queue and all threads are prevented from storing any further references to the object in thread-local state. ... Microsoft Corporation
Technology is disclosed for providing user control over content presented on personal computing devices (i.e., user devices). A current context associated with a user device is determined, and a set of personalized metadata characterizing content items is received. ... Microsoft Corporation
Embodiments of a method for creating a methodology implementation that supplements a business application are described. In one embodiment, a comprehensive customer engagement methodology is maintained on a server and defines processes and disciplines related to the business application. ... Microsoft Corporation
An electronic device is described which has a sensor panel comprising a plurality of receive electrodes configured to measure signals received from one or more transmit electrodes. The device has a sensor panel control module configured to: receive signals from the plurality of receive electrodes in the presence of at least one tone interferer. ... Microsoft Corporation
An electronic device is described which has a sensor panel comprising a plurality of receive electrodes configured to measure signals received from one or more transmit electrodes; and a sensor panel control module. The module is configured to receive signals from the plurality of receive electrodes; and for an individual one of the received signals, compute a difference between the received signal and an expected signal which is expected to be received in the absence of impulse noise. ... Microsoft Corporation
An electronic device is described which has a sensor panel comprising a plurality of transmit electrodes configured to form an electric field when driven and a plurality of receive electrodes configured to measure signals received from the transmit electrodes. The electronic device has a sensor panel control module configured to apply a driving signal to each of the transmit electrodes, and to compute the driving signals using orthogonal frequency division multiplexing to obtain a plurality of orthogonal subcarrier signals, and configured to apply a hadamard matrix transform to the orthogonal subcarrier signals to compute final signals for driving the transmit electrodes.. ... Microsoft Corporation
A method includes transmitting a continuous wave frequency modulated (cwfm) signal on a first drive line of a grid based capacitive sensor and transmitting the cwfm signal with an imposed delay on a second drive line of grid based capacitive sensor simultaneously with transmission of the cwfm signal on the first drive line. Output on a receive line is correlated with the cwfm signal, fourier transformation is performed on the correlation of the output and coordinates of an object interacting with the grid based capacitive sensor is identified based on frequency and phase information determined from the fourier transformation.. ... Microsoft Corporation