Patent application number | Description | Published |
20100229022 | COMMON TROUBLESHOOTING FRAMEWORK - Techniques for improving a troubleshooting experience by providing a common troubleshooting framework. Such a framework may enable use of common elements between troubleshooters and lead to similarities between troubleshooting packages, which may improve the user experience. Further, a framework may reduce the amount of knowledge and time necessary to create troubleshooting packages, and thus encourage increased development of these troubleshooting packages. In some implementations of the framework, a troubleshooting package may be implemented in a declarative manner that outlines/describes the problems it solves and the potential solutions to those problems. The declarative troubleshooting packages may then be provided to the troubleshooting framework and may provide direction to the framework, in that the framework may execute functions as directed by the troubleshooter. | 09-09-2010 |
20120102407 | DISPLAYING BATTERY LIFE RESULTING FROM SETTING CHANGES - An indication of a remaining battery life currently available based on a current resource setting for a resource of a computing device is displayed. A user input to change the resource to a new resource setting is received, and in response to the user input an indication of the remaining battery life currently available based on the new resource setting is identified and an indication of the remaining battery life currently available based on the new resource setting is displayed. In situations where the resource is a screen of the computing device, the new resource setting can be a new screen brightness setting, and the screen brightness can be changed concurrently with displaying the remaining battery life currently available based on the new screen brightness setting. | 04-26-2012 |
20120124144 | COOPERATIVE SESSION-BASED FILTERING - Various embodiments provide session-based filtering to filter messages in a cooperative manner between a client and a service provider. In at least some embodiments, a service provider can establish a messaging session with a client and deliver messages to the client. The client can implement various client-side techniques to filter some of the messages based on various client designated criteria. The service provider can obtain feedback from the client indicative of one or more of the delivered messages that have been filtered. The service provider can dynamically create a session-based list based on the feedback and use the list during the session to block messages on the server-side according to the client designated criteria. When the session concludes, the session-based list can be discarded. In this manner, message filtering can occur without persistent storage of state data for the filtering at the service provider. | 05-17-2012 |
20120131652 | HARDWARE-BASED CREDENTIAL DISTRIBUTION - This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile. | 05-24-2012 |
20120304116 | Application Notifications - Application notification techniques are described. Implementations are described in which a representation of an application may include notifications that pertain to the application. Techniques are further described which may be used to manage the notifications, including replacement of notifications, use of queues, overrides, selection of notifications based on execution state of an application, cycling a display of a plurality of notifications, cycling a display of different subsets of notifications, examination of a manifest of an application to determine criteria to be used to display the notifications, display priority of the notifications, and so on. | 11-29-2012 |
20120304117 | Application Notification Tags - Application notification tag techniques are described. Implementations are described in which a representation of an application may include notifications that pertain to the application. Techniques are further described which may be used to manage the notifications, including replacement of notifications, use of queues, overrides, selection of notifications based on execution state of an application, cycling a display of a plurality of notifications, cycling a display of different subsets of notifications, examination of a manifest of an application to determine criteria to be used to display the notifications, display priority of the notifications, and so on. | 11-29-2012 |
20130061046 | Stateless Application Notifications - Stateless application notifications are described that enable third parties to provide messages to client applications. A communication channel can be established between a notification service and an application. Upon request, the notification service can generate obfuscated routing data for the channel, which can be in the form of a channel handle or token. The routing data can be encrypted and digitally signed to obscure the content and format of the routing data from third parties. An application service possessing the obfuscated routing data can package a notification with the data and send the package to the notification service for delivery. The application service does so without knowing the channel particulars encoded by the obfuscated routing data. The notification service that produces the obfuscated routing data can decrypt and interpret the data, and deliver the notification on the channel to an appropriate endpoint application on behalf of the application service. | 03-07-2013 |
20130067288 | Cooperative Client and Server Logging - Various embodiments enable automatic cooperative logging of information associated with a connection between at least two computing devices. In some cases, a first computing device can automatically trigger logging on a second computing device upon detection of at least one scenario. Alternately or additionally, the second computing device can respond to the first computing device with additional and/or supplemental logging requests. | 03-14-2013 |
20130219155 | Pre-installed Application Activation - Pre-installed application activation techniques are described in which live content for applications is activated before user interaction with the applications. Input indicative of an initial log-in of a user to access an operating system is detected. In response, configuration of an account for the user with the operating system may be initiated to set-up a device for first use by the user. During the configuration, notifications are activated through a notification system of the operating system to obtain live content for one or more pre-installed applications on the computing device. The activation occurs before interaction of the user with the pre-installed applications. Live content may then be incorporated with representations of the applications within a user interface for the operating system, such as displaying application tiles having corresponding live content in a start screen presented to the user after completion of the initial set-up. | 08-22-2013 |
20130219332 | POWER EFFICIENT APPLICATION NOTIFICATION SYSTEM - Applications on a computing device provide notifications associated with the application to a notification system. A notification includes an identification of content to be presented for the notification and an indication of when the content is to be presented. The notification system presents the notification content at the appropriate time regardless of whether the application is executing and without resuming execution of the application if the application is not running. Various power efficiency techniques are also used to determine which notifications are presented and when a user interface is updated to reflect those notifications in order to avoid updating the user interface to reflect notifications that would not be observable (e.g., due to a power mode of the computing device). | 08-22-2013 |
20130219409 | POWER EFFICIENT BROKERED COMMUNICATION SUPPORTING NOTIFICATION BLOCKING - A notification service receives messages including various data from application services, and provides notifications including that data to the appropriate computing devices. Each computing device includes a notification system that receives notifications from the notification service and provides those notifications to the appropriate applications on the computing device. If an application is not allowed to run on a computing device, the notification system on the computing device provides an indication to the notification service to block notifications for the application on the computing device. The notification service ceases providing notifications to a computing device targeting applications for which notifications are blocked on the computing device until an indication is received from the computing device to unblock notifications for the application. | 08-22-2013 |
20140059664 | Hardware-Based Credential Distribution - This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile. | 02-27-2014 |
20140207855 | Cooperative Client And Server Logging - Various embodiments enable automatic cooperative logging of information associated with a connection between at least two computing devices. In some cases, a first computing device can automatically trigger logging on a second computing device upon detection of at least one scenario. Alternately or additionally, the second computing device can respond to the first computing device with additional and/or supplemental logging requests. | 07-24-2014 |
20150046829 | Application Notifications - Application notification techniques are described. Implementations are described in which a representation of an application may include notifications that pertain to the application. Techniques are further described which may be used to manage the notifications, including replacement of notifications, use of queues, overrides, selection of notifications based on execution state of an application, cycling a display of a plurality of notifications, cycling a display of different subsets of notifications, examination of a manifest of an application to determine criteria to be used to display the notifications, display priority of the notifications, and so on. | 02-12-2015 |