-
公开(公告)号:US11694254B2
公开(公告)日:2023-07-04
申请号:US15624692
申请日:2017-06-15
Applicant: Microsoft Technology Licensing, LLC
Inventor: Andreas Balzer , David Mowatt , Alan Noel Mulhall , Muiris Woulfe
IPC: G06Q30/06 , G06Q30/0601 , G06F3/01 , G06F3/0482 , G06F3/04842 , G06V40/18 , G06F18/24
CPC classification number: G06Q30/0643 , G06F3/013 , G06F3/0482 , G06F3/04842 , G06V40/18 , G06F18/24
Abstract: The description relates to an interactive physical product browsing experience. One example includes a display system for displaying objects. The display system comprises a plurality of object displays each comprising an object store, a robot for moving objects to and from a repository, a user input receiving means, and a processing means. The processing means is configured to cause the object displays to display some of the objects, monitor user behaviour using the user input receiving means, and cause the robot to move an object from the repository to one of the object stores based on the user behaviour.
-
公开(公告)号:US20180046656A1
公开(公告)日:2018-02-15
申请号:US15236370
申请日:2016-08-12
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Muiris Woulfe , Poornima Muthukumar , Yuanyuan Dong
IPC: G06F17/30
CPC classification number: G06F16/2264 , G06F16/2255 , G06F16/24544 , G06F16/282 , G06F16/9027 , G06F16/9535
Abstract: Multidimensional key based construction of a filterable hierarchy is provided. A data service initiates operations to construct the hierarchy by joining current node-key elements with an element delimiter into a current node string. Child node elements are also joined with the element delimiter into child node string(s). The child node string(s) are further encapsulated with nesting delimiter(s) and the resulting string is concatenated to the current node string. Next, parent node elements are joined with the element delimiter. The current node-key is generated by concatenating the parent node string to the current node string (that includes the child node string(s)) with a parent delimiter. The current node-key is inserted into a representation for the current node within a data structure.
-
3.
公开(公告)号:US10885225B2
公开(公告)日:2021-01-05
申请号:US16003739
申请日:2018-06-08
Applicant: Microsoft Technology Licensing, LLC
Inventor: Andreas Balzer , David Mowatt , Muiris Woulfe
Abstract: A system includes an electronic processor configured to store records in a client database. The records included personally identifiable information associated with entities and a client identifier reference associated with each of the individuals, the personally identifiable information is accessible based on an authorization level associated with a user. The electronic processor is also configured to receive a document containing both non-personally identifiable information and personally identifiable information, parse the document to determine the presence personally identifiable information in the document, verify the access rights of the reader of the document, match the personally identifiable information included in the document with records stored in the client database, substitute the personally identifiable information included in the document with the corresponding client identifier reference referring to the client database, and generate a human-legible view of the document containing the corresponding client identifier reference.
-
公开(公告)号:US10585780B2
公开(公告)日:2020-03-10
申请号:US15469396
申请日:2017-03-24
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Muiris Woulfe , Poornima Muthukumar , Yuanyuan Dong
Abstract: For each detected bug, historical code with similar characteristics and bug corrections from a historical bug dataset can be displayed in a source code editor. Relevant training and/or testing data can be found by comparing an internal representation of the code under development with an internal representation of the original buggy code in the historical bug dataset. Training and/or testing data that is relevant to the current code can be distinguished from irrelevant training and/or testing data by determining that the code syntax tokens from the current and historical data overlap to at least a specified percentage. Code can be devolved into a set of metrics. The degree of overlap between the metric sets can be determined. If a computed risk factor for the bug correction meets or exceeds a specified threshold, the bug correction can be automatically applied. Additional testing can be automatically performed on and/or added to the corrected code.
-
公开(公告)号:US11386112B2
公开(公告)日:2022-07-12
申请号:US16058154
申请日:2018-08-08
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: David Mowatt , Rolando Jimenez Salgado , Johnny S. Campbell , Venkat Pradeep Chilakamarri , Andreas Balzer , Muiris Woulfe , Stephen O'Driscoll
IPC: G06F9/54 , G06F16/26 , G06F16/176 , G06F40/166 , G06F3/0482 , G06F21/10 , G06F21/62
Abstract: Techniques for rendering shared data include receiving, from a data store by a computing device, data indicative of a persistent data object. The persistent data object is associated with a class indicative of a data type for information contained in the persistent data object. The persistent data object is operable to be inserted in a file generated by an application executing on the computing device. The visualization logic associated with the class may be received by the computing device. The information in the persistent data object is rendered using the selected method of visualization, and other information in the document is rendered using native rendering capabilities of the application.
-
公开(公告)号:US10812343B2
公开(公告)日:2020-10-20
申请号:US15668340
申请日:2017-08-03
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Andreas Balzer , Alan Mulhall , Stephen O'Driscoll , Muiris Woulfe
Abstract: An increasing number of bots become available each day that perform automated tasks over the Internet to help facilitate a variety of service requests for a user. Thus, embodiments are directed to an orchestration service configured to perform bot network orchestration in order to provide enriched responses to service requests and/or in order to find one accurate answer among large numbers of bot responses to a specific query. For example, a service request for a user that involves at least one service provider may be received. A plurality of bots to orchestrate a processing of the service request may be determined. Instructions may be provided to the bots associated with aspects of the service request, where each bot is selected based on an aspect of the service request. Responses received from the bots may be integrated into a service response and provided to a requestor of the service request.
-
公开(公告)号:US10754640B2
公开(公告)日:2020-08-25
申请号:US15469423
申请日:2017-03-24
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Muiris Woulfe , Poornima Muthukumar , Yuanyuan Dong
Abstract: Information concerning software bugs including bug detection, bug prediction data and/or historical bug data can be used to determine whether it is safe to commit, integrate, deploy and/or deliver a software change. If the change is deemed unsafe, the change can be rejected automatically. Alternatively, the change can proceed following approval by an administrator, supervisor, implementer, manager and/or other designated approval mechanism. Actions taken to override a block can be recorded along with information concerning failed deployments and/or deliveries, a higher than normal customer failure rate after deployment and/or delivery or through manual data entry.
-
公开(公告)号:US10698680B2
公开(公告)日:2020-06-30
申请号:US15469423
申请日:2017-03-24
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Muiris Woulfe , Poornima Muthukumar , Yuanyuan Dong
Abstract: Information concerning software bugs including bug detection, bug prediction data and/or historical bug data can be used to determine whether it is safe to commit, integrate, deploy and/or deliver a software change. If the change is deemed unsafe, the change can be rejected automatically. Alternatively, the change can proceed following approval by an administrator, supervisor, implementer, manager and/or other designated approval mechanism. Actions taken to override a block can be recorded along with information concerning failed deployments and/or deliveries, a higher than normal customer failure rate after deployment and/or delivery or through manual data entry.
-
公开(公告)号:US20180276103A1
公开(公告)日:2018-09-27
申请号:US15469396
申请日:2017-03-24
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Muiris Woulfe , Poornima Muthukumar , Yuanyuan Dong
Abstract: For each detected bug, historical code with similar characteristics and bug corrections from a historical bug dataset can be displayed in a source code editor. Relevant training and/or testing data can be found by comparing an internal representation of the code under development with an internal representation of the original buggy code in the historical bug dataset. Training and/or testing data that is relevant to the current code can be distinguished from irrelevant training and/or testing data by determining that the code syntax tokens from the current and historical data overlap to at least a specified percentage. Code can be devolved into a set of metrics. The degree of overlap between the metric sets can be determined. If a computed risk factor for the bug correction meets or exceeds a specified threshold, the bug correction can be automatically applied. Additional testing can be automatically performed on and/or added to the corrected code.
-
公开(公告)号:US11288592B2
公开(公告)日:2022-03-29
申请号:US15469414
申请日:2017-03-24
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Muiris Woulfe , Poornima Muthukumar , Yuanyuan Dong
Abstract: A machine learning model can be trained to infer the probability of the presence of categories of a software bug in a source code file. A bug tracker can provide information concerning the category to which a software bug belongs. The bug data supplied to a machine learning model for inferring the presence of particular categories of bugs can be filtered to exclude a specified category or categories of bugs. Information including but not limited to organizational boundaries can be inferred from the category of bugs present in a body of source code. The inferred organization boundaries can be used to generate team-specific machine learning models.
-
-
-
-
-
-
-
-
-