-
公开(公告)号:US20230236859A1
公开(公告)日:2023-07-27
申请号:US18190805
申请日:2023-03-27
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ajoy Nandi , Jason T. Creighton
IPC: G06F9/451 , G06F16/28 , G06F16/2455 , G06F16/332 , G06F16/9535 , G06F16/9032
CPC classification number: G06F9/453 , G06F16/287 , G06F16/24565 , G06F16/3322 , G06F16/9535 , G06F16/90324
Abstract: A computer-implemented technique is described herein for facilitating a user's repeated execution of the same computer-implemented actions. The technique performs this task by determining patterns in the manner in which the user repeats requests associated with certain computer-implemented actions. For example, the technique determines context-dependent patterns in the manner in which the user submits search requests to a search system. The technique then leverages those patterns by proactively providing a request-assistance tool to the user in those context-specific circumstances in which the user is likely to perform the repetitive computer-implemented actions. The digital action-assistance tool provides various kinds of assistance to the user in performing the repetitive computer-implemented actions.
-
公开(公告)号:US10579503B2
公开(公告)日:2020-03-03
申请号:US15595175
申请日:2017-05-15
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ian S. Petersen , Jeffrey J. Wall , Marius C. Constantin , Kent C. Mai , Ping Zhang , Somanath Krishnaswamy , Jeremy Littel , Jason T. Creighton , Joyce Kuo , Vallabh Patade
Abstract: Systems and methods for controlling an intentional crash of a software application. One system includes a computing device including an electronic processor. The electronic processor is configured to receive a crash setting for the software application from a configuration server. The crash setting has a first value or a second value. The electronic processor is also configured to detect an unexpected use of the software application during execution. The electronic processor is configured to, in response to detecting the unexpected use and the crash setting having the first value, intentionally crash the software application causing a generation of a crash report describing a state of the software application when the unexpected use occurred. The electronic processor is configured to, in response detecting the unexpected use and the crash setting having the second value, not intentionally crash the software application.
-
公开(公告)号:US20170372253A1
公开(公告)日:2017-12-28
申请号:US15192434
申请日:2016-06-24
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ajoy Nandi , Jason T. Creighton , Nikrouz Ghotbi , Ryen W. White
CPC classification number: G06Q10/063114 , G06Q10/06 , G06Q10/063112 , G06Q10/10 , G06Q10/109 , G10L15/26 , G10L25/57 , H04L51/18
Abstract: Task assignments are identified. A dataset that includes one or more electronic messages is received. Then, one or more pending tasks in the dataset are identified, and each of a plurality of people who are mentioned in the dataset is also identified. Then, for each of the pending tasks, one or more of the identified people are identified as potentially being people who are assigned to complete the pending task, and the pending task is associated with these identified one or more of the identified people. For each of the pending tasks, one or more of the identified people are also identified as potentially being people for whom the pending task is to be completed, and the pending task is also associated with these identified one or more of the identified people.
-
公开(公告)号:US11568337B2
公开(公告)日:2023-01-31
申请号:US15192434
申请日:2016-06-24
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ajoy Nandi , Jason T. Creighton , Nikrouz Ghotbi , Ryen W. White
Abstract: Task assignments are identified. A dataset that includes one or more electronic messages is received. Then, one or more pending tasks in the dataset are identified, and each of a plurality of people who are mentioned in the dataset is also identified. Then, for each of the pending tasks, one or more of the identified people are identified as potentially being people who are assigned to complete the pending task, and the pending task is associated with these identified one or more of the identified people. For each of the pending tasks, one or more of the identified people are also identified as potentially being people for whom the pending task is to be completed, and the pending task is also associated with these identified one or more of the identified people.
-
公开(公告)号:US20180006977A1
公开(公告)日:2018-01-04
申请号:US15199233
申请日:2016-06-30
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ajoy Nandi , Jason T. Creighton , Nikrouz Ghotbi , Ryen W. White , Jonathan E. Hamaker , Zain Aziz
CPC classification number: H04L51/046 , G06Q10/107 , G10L15/26 , H04L51/22 , H04L51/26 , H04L67/18 , H04L67/20
Abstract: Task information is exposed to providers of online services. A dataset that includes one or more electronic messages is received. Then, one or more task intents in the dataset are identified, where each of the identified task intents is a specific task that is to be completed. Then, for each of the identified task intents, one or more service providers each of whom offers one or more online services that are capable of assisting in the fulfillment of the identified task intent are identified, and information associated with the identified task intent is exposed to each of the identified service providers.
-
公开(公告)号:US20170364371A1
公开(公告)日:2017-12-21
申请号:US15183675
申请日:2016-06-15
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ajoy Nandi , Jason T. Creighton
CPC classification number: G06F9/453 , G06F16/24565 , G06F16/287 , G06F16/3322 , G06F16/90324 , G06F16/9535
Abstract: A computer-implemented technique is described herein for facilitating a user's repeated execution of the same computer-implemented actions. The technique performs this task by determining patterns in the manner in which the user repeats requests associated with certain computer-implemented actions. For example, the technique determines context-dependent patterns in the manner in which the user submits search requests to a search system. The technique then leverages those patterns by proactively providing a request-assistance tool to the user in those context-specific circumstances in which the user is likely to perform the repetitive computer-implemented actions. The digital action-assistance tool provides various kinds of assistance to the user in performing the repetitive computer-implemented actions.
-
-
-
-
-