File editors are used to create new files and to edit existing files. There are various types of file editors to edit various file types. For example, text editors are used to edit text files, which may consist of a string of characters. Other types of editors may be used to edit more complex file types. As examples, a document editor such as WORD from Microsoft Corporation of Redmond, Wash. is used to edit document files; a presentation editor such as POWERPOINT®, also from Microsoft Corporation, is used to edit presentation files; and a spreadsheet editor such as EXCEL®, also from Microsoft Corporation, is used to edit spreadsheet files. These more complex files types may include a plurality of portions comprising character data, including markup information, and binary data. For example, the markup information may include extensible markup language (XML) tags and data or other markup language data. The binary data may include graphic, image, video, sound, animation, and other types of data. The above are, of course, just examples, and many other types of file editors are used to edit other file types as well. Some of the more complex files may be structured as container files. A container file may include one or more sub-components, such as component files. Examples of container file formats include archive file formats such as zip files (.ZIP) and Java Archive files (.JAR).
Files that are edited with a file editor may be transmitted to a remote computing device such as a server. For example, the remote computing device may be available over a network such as a local area network, a virtual private network, or a wide area network, including the Internet. Transmitting files may require transmission of a large amount of data over the network, which may be problematic. For example, the transmission may be time consuming, especially when the file editor is running on a computing device that is subject to network bandwidth restrictions such as a mobile computing device. The transmission of a larger file may also consume a significant amount of power, thus depleting a battery in a mobile device. Additionally, transmission of larger file may increase security and data corruption risks.
It is with respect to these and other general considerations that aspects have been made. Also, although relatively specific problems have been discussed, it should be understood that the aspects should not be limited to solving the specific problems identified in the background.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Aspects of the present disclosure provide a method and system for transferring files. In an example, a container file is transferred in a manner that reduces the amount of data that must be transmitted over the network. A non-limiting example method is a method for transferring a container file over a network to a remote device. The method includes the step of accessing a container file, the container file comprising a plurality of components. The method also includes the step of transmitting metadata information for the plurality of components to the remote device. The method further includes the step of determining components from the plurality of components to transmit to the remote device. The method additionally includes the step of transmitting component data items for the determined components to the remote device.
Aspects may be implemented as a computer process, a computing system or as an article of manufacture such as a computer program product or computer readable media. The computer program product may be computer storage media readable by a computer system and encoding a computer program of instructions for executing a computer process.
Various aspects are described more fully below with reference to the accompanying drawings, which form a part hereof, and which show specific exemplary aspects. However, aspects may be implemented in many different forms and should not be construed as limited to the aspects set forth herein; rather, these aspects are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the aspects to those skilled in the art. Aspects may be practiced as methods, systems, or devices. Accordingly, aspects may take the form of a hardware implementation, an entirely software implementation or an implementation combining software and hardware aspects. The following detailed description is, therefore, not to be taken in a limiting sense.
The present disclosure describes transferring files between computing devices. In some examples, the transferring is performed in a manner that minimizes the amount of data that must be transmitted to transfer the file. For example, in some aspects, a container file is transferred from a client computing device to a server computing device without transmitting all of the data associated with the components within the container file. For example, the client computing device may transmit to the server computing device metadata associated with all of the components within the container file and data associated with only a portion of the components in the container file. The client computing device may then determine which portion of the component data should be transferred based on determining which components the server computing device needs data. By transmitting the metadata associated with all of the components, the server computing device can determine the structure and contents of the container file that is being transferred. The metadata is typically small and can be transmitted relatively quickly. The data may be much larger than the metadata and by avoiding transmission of all of the data, the container file can be transferred more quickly.
The client computing device uses multiple techniques to determine which component data is needed by the server computing device. For example, in some aspects, the client computing device maintains a list of components that are cached on the server computing device and determines to send components that are not included in the list. The list may be indexed using a hash value that is calculated at least in part based on the content of the component data (e.g., a cyclic redundancy code), and thus when a component is modified, its hash value would change and the component would no longer be found in the list using the modified hash value. The list may include components that are common across many container files. The list may also include components that are specific to a particular container file and that have been previously transmitted to the server computing device by the client computing device. In some aspects, the client computing device maintains the list by adding components that have been transmitted to the server device to the list. Additionally, in some aspects, the client computing device maintains the list by adding components that have been transmitted to the server device after receiving a response from the server computing device indicating that the components have been added to a cache.
As another example, in some aspects, the client computing device determines that the server computing device needs component data based on a request for the component data sent by the server computing device. For example, the client computing device may transmit the metadata associated with all of the components to the server computing device. The server computing device may then determine which of the components are cached and which are not. Alternatively, the server computing device may begin to perform operations (e.g., loading the container file, analyzing or otherwise using the container file) without verifying that all components are available until the operations cannot proceed because a component is missing. Upon determining that at least some of the components are not cached, the server computing device may send a request for the components that are not cached to the client computing device. In response, the client computing device determines that the server computing device needs the requested components and transmits those requested components to the server computing device.
Although the examples herein typically relate to transferring container files from a client computing device to a server computing device, the technology disclosed is equally applicable to transferring container files from a server computing device to the client computing device. For example, a server computing device may transfer a modified version of a received container file to the client computing device that first sent the container file. Additionally, the disclosed technology can also be used for transferring container files from a client computing device to another client computing device such as for co-authoring and collaboration. Further, the disclosed technology can also be used for transferring container files from one server to another server.
The user computing device 102 includes a container file editor 106, a client container file exchange engine 108, and a client data store 110. Although
In some aspects, the container file editor 106 is an application running on the user computing device 102 that is operable to create or edit container files such as a container file 112. Additionally, in some aspects, the container file editor 106 interacts with the server computing device 104. In some examples, the container file editor 106 is a browser application operable to generate interactive graphical user interfaces based on content served by a remote computing device such as the server computing device 104 or another computing device. According to an example, an extension is installed on the user computing device 102 as a plug-in or add-on to the browser application (i.e., container file editor 106) or is embedded in the browser application.
In an example, the container file editor 106 is a presentation editor that operates to generate, edit, and display presentations. The POWERPOINT® presentation graphics program from Microsoft Corporation of Redmond, Wash. is an example of a presentation editor. Other example presentation editors include the KEYNOTE® application program from Apple Inc. of Cupertino, Calif.; GOOGLE SLIDES from Google Inc. of Mountain View, Calif.; HAIKU DECK from Giant Thinkwell, Inc. of Seattle, Wash.; PREZI from Prezi, Inc. of San Francisco, Calif.; and EMAZE from Visual Software Systems Ltd. of Tel-Aviv, Israel. In these examples, the container file 112 may be a presentation file comprising one or more presentation spaces such as slides. The presentation spaces may include various elements such as images, media, text, charts, and graphics. In other examples, the container file editor 106 is a document editor such as the WORD document editor from Microsoft Corporation of Redmond, Wash. or a spreadsheet editor such as the EXCEL® spreadsheet editor, also from Microsoft Corporation.
The client container file exchange engine 108 operates to exchange (e.g., transmit or receive) container files with another computing device such as the server computing device 104. The client container file exchange engine 108 may interact with the container file editor 106 to receive requests to transmit or receive various container files. The client container file exchange engine 108 is illustrated and further described with respect to at least
The client data store 110 operates to store container files, components of container files, and other data usable by the client container file exchange engine 108. The client data store 110 is illustrated and further described with respect to at least
The server computing device 104 includes a container file service 114, a server container file exchange engine 116, and a server data store 118. Although
In some aspects, the container file service 114 operates to provide a service to client computing device such as the user computing device 102. The container file service 114 may comprise one or more applications that are run by the server computing device 104. Example services provided by aspects of the container file service 114 include file versioning and storage services such as those provided by ONEDRIVE® cloud storage service from Microsoft Corporation of Redmond, Wash., collaboration and co-authoring services such as those provided by SHAREPOINT® team collaboration services also from Microsoft Corporation, and document design suggestion services.
For example, in some aspects, the container file service 114 operates to receive a presentation file from the user computing device 102. The container file service 114 then analyzes at least part of the presentation file and transmits to the user computing device 102 suggestions for the layout or design of portions of the container file 112. For example, the container file editor 106 may trigger a transmission of the container file 112 to the container file service 114 when an image is added to a slide in a presentation file. The container file service 114 may then analyze the image and the slide to provide design suggestions. Upon receiving the design suggestions, the client container file editor 106 may generate and present to the user U thumbnails based on the suggestions. The user U can make a selection and indicate to the container file editor 106 to apply the selected suggestion to the container file 112.
The server container file exchange engine 116 operates to exchange (e.g., transmit or receive) container files 112 with another computing device such as the user computing device 102. The server container file exchange engine 116 may interact with the container file service 114 to receive requests to transmit or receive various container files 112. The server container file exchange engine 116 may be similar to the client container file exchange engine 108 and is illustrated and further described with respect to at least
The server data store 118 operates to store container files, components of container files, and other data usable by the server container file exchange engine 116. The server data store 118 may be similar to the client data store 110, and is illustrated and further described with respect to at least
The container file 112 may be a zipped file format. For example, the container file 112 may include a compressed directory that contains multiple individual component files. The individual component files may be of multiple different types, including but not limited to extensible markup language (XML) files, image files, and font files. These individual component files in a zipped file format container file 112 are examples of components of a container file 112. In some examples, the container file 112 is formatted with an Office Open XML File format, such as the Office Open XML Document format, (which will often have a .DOCX extension) the Office Open XML Presentation format (which will often have a .PPTX extension), or Office Open XML Workbook format (which will often have a .XLSX extension).
The extraction engine 302 operates to extract components from a container file 112. For example, the extraction engine 302 may consult a directory of components that is stored in the container file 112 to determine the names of the components and the location (e.g., an offset into the container file 112) of data for the components within the container file 112. This directory may then be used to create separate files for the components. The directory may include path location information (e.g., a directory) that can be used to determine where the extracted component should be placed relative to other extracted components. The extracted components may be stored as separate files within one or more directories on a file system. Alternatively, the separate files may be generated within memory without necessarily being written to a file system. In some aspects, the extraction engine 302 may decompress the components as well.
The metadata generation engine 304 operates to generate metadata for a container file, including for the component files within the container file. In some aspects, the generated metadata includes individual metadata information files for the components. For example, the individual metadata information files may include a component name, an uncompressed size for the component, a compressed size for the component, and a fingerprint value for the compressed component. The fingerprint value comprises a relatively short data value (e.g., a bit string) for the comparatively large compressed component data that is likely to uniquely identify the compressed component data (i.e., the fingerprint is different for different or changed components). In some aspects, the fingerprint value is generated using a hash function such as a cyclic redundancy code. In some aspects, some or all of the components are not compressed and accordingly the metadata information files may not include a compressed size for the components.
The compression engine 306 operates to compress the components. Additionally, in some aspects, the compression engine 306 operates to compress the container file 112 as a whole. In at least some aspects, the compression engine 306 applies a reversible compression algorithm that removes data redundancy or otherwise allows a component to be represented using less data than was originally used to represent the component.
In some aspects, the cache engine 308 operates to manage a cache of components. For example, in some aspects, the cache engine 308 manages a cache for a computing device that includes the container file exchange engine 300. Additionally, in some aspects, the cache engine 308 operates to manage at least one remote cache index. For example, the remote cache index may include an index of the components that are stored in a cache of another computing device. For example, using the remote cache index, the cache engine 308 can determine whether a particular component is currently stored in the remote cache and thus whether it is necessary to transmit that component to the remote computing device. In some aspects, the cache engine 308 uses a hash value to index the components. For example, the hash value may be generated using a fingerprint of the component as well as other values, such as an uncompressed size and a compressed size of the component. The hash value may then be used to determine whether a particular component is available in the local cache or in a remote cache.
The communication engine 310 operates to transmit and receive data related to container files 112 and components over the network. In some aspects, the communication engine 310 operates to transmit to a remote computing device the component metadata generated by the metadata generation engine 304 and component data for the components that are not determined to be cached by the remote computing device. Further, some aspects of the communication engine 310 operate to receive from a remote computing device component metadata and potentially at least some component data. Additionally, in some aspects, the communication engine 310 is configured to send and receive requests for component data (e.g., for components that have not been sent and cannot be retrieved from the cache).
The reconstruction engine 312 operates to reconstruct a container file 112 that has been received by the communication engine 310. In some aspects, the reconstruction engine 312 uses the received component metadata to reconstruct a container file 112. Based on the component metadata, the reconstruction engine 312 may operate to combine component data that have been received from a remote computing device and component data that has been retrieved from the cache. In some aspects, the container file 112 is reconstructed and written into a storage drive. Additionally or alternatively, the contents of the container file 112 are loaded and used within an application such as the container file editor 106 or a service such as the container file service 114.
In some aspects, the container file data 402 includes container files 112 that are being received or that have been reconstructed using received data. For example, when a container file 112 is being received, the container file data 402 may comprise a plurality of component metadata and component data. Additionally, the container file data 402 may comprise references to cached component data.
The remote cache index 404 comprises one or more cache indexes corresponding to components that are cached at a remote computing device. For example, the client data store 110 may include an index of at least some of the data cached in the server data store 118, while the server data store 118 may include an index of at least some of the data cached in the client data store 110. Additionally, the remote cache index 404 may include multiple cache indexes if the data store 400 is being used for communication with multiple remote computing devices such as is often the case for at least the server computing device 104. In some aspects, the remote cache index 404 may comprise a table containing at least two columns. One column includes an identifier of a remote computing device and the other column includes a hash value of a component data item. To determine whether a component data item appears in the remote cache index for a particular remote computing device, the table is queried for records that match both the identifier of the remote computing device and the hash value for the component data item. If a matching record is found, it is determined that the component data item is cached for a particular remote computing device and consequently that the component data item need not be transmitted to the remote computing device.
The common component cache 406 operates to cache components that are commonly used across many container files 112. For example, in presentation files, the common component cache 406 may operate to cache commonly used fonts and background images. In some aspects, the common component cache 406 includes component metadata 410 and component data 412. The component metadata 410 may include component metadata records comprising component metadata for each of the cached common components. The component metadata records may include rows in a table in a relational database and/or files. The component metadata records may include various metadata relating to each component such as a name, an uncompressed size, a compressed size, and a fingerprint value. Additionally, in some aspects, the component metadata 410 also includes a hash value that is separate from the fingerprint for the component, which may be calculated using at least some of the information from the metadata information files. Each component metadata record may also include a reference to a component data item in the component data 412. The component data items may comprise records in a table in a database and/or files stored in a file system.
The specific component cache 408 operates to cache components that have been received from other computing devices. The specific component cache 408 may be similar to the common component cache 406. In some aspects, the common component cache includes component metadata 414 and component data 416, which may be similar to the previously described component metadata 410 and component data 412, respectively. Additionally, in some aspects, the specific component cache 408 may include information that associates records in the component metadata 414 or component data 416 with a particular remote machine or session. For example, using this additional information, records may be removed from the specific component cache 408 upon termination of a session.
At operation 502, container file components are retrieved. For example, in some aspects, the extraction engine 302 accesses a stored container file and extracts the components from the container file. Alternatively, the extraction engine 302 may access a container file 112 that has been loaded by an application or service such as the container file editor 106 or the container file service 114. In some aspects, some or all of the components have been previously extracted from the container file 112 and loaded into an application/service such as the container file editor 106 or the container file service 114. In this case, the components may be retrieved from a memory space or temporary storage of the application/service.
At operation 504, component metadata is generated for the retrieved components. For example, component metadata information files may be generated for each of the components. The component metadata may include various information such as a component name, component uncompressed size, component compressed size, and component fingerprint. The data included in the component metadata may be extracted from the container file 112, such as from header data associated with the components. Alternatively, the data may be generated while preparing component data items for possible transmission.
At operation 506, the component metadata is transmitted. For example, the component metadata may be transmitted to a remote computing device. In some aspects, the component metadata is transmitted as a plurality of component metadata information files in which each file corresponds to a single component. Additionally or alternatively, the component metadata is transmitted in one or more aggregated groups in which the aggregated groups may contain the metadata for multiple components.
At operation 508, it is determined which components to transmit. In some aspects, this determination of which components to transmit is based on whether the components appear to be cached by the remote computing device. In some aspects, a hash value associated with the component metadata is used to query a remote cache index 404 to determine whether the remote computing device has cached the component. Additionally, in some aspects, the common component cache 406 is stored locally and is queried to determine whether a component is likely to be stored in a separate common component cache 406 on the remote computing device. Additionally or alternatively, the determination of which components to transmit can be made based on requests from the remote computing device. These requests can serve as a failsafe if it is incorrectly determined that a component need not be sent to a remote computing device. Additionally, in some aspects, it is initially determined that none of the components should be transmitted. Then, the subsequent requests from the remote computing device are used to determine which components to transmit.
At operation 510, component data items for the determined components are transmitted to the remote computing device. In some aspects, the component data items are transmitted individually (e.g., as individual component data files containing a component data item for a single component). In other aspects, the component data items are aggregated into one or more groups for transmission. Additionally, in some aspects, the component data items are compressed before being transmitted.
In at least some aspects, operations 508 and 510 may be performed multiple times in the transmission of a single container file 112. For example, operation 508 may make an initial determination of which components need to be transmitted. Then operation 510 may transmit those determined components. Thereafter, operation 508 may be repeated to determine additional components to transmit based on, for example, requests received from the remote computing device. Then operation 510 may be performed again to transmit these determined additional components.
At operation 512, the remote cache index 404 is updated. In some aspects, the remote cache index 404 is updated to include all of the components that were transmitted to the remote computing device. In other aspects, a list is received from the remote computing device that identifies the components that have been added to the cache on the remote computing device. In these aspects, the remote cache index is updated to include the components the remote computing device has acknowledged adding to its cache.
Additionally, in some aspects of the method 500, at least some of the components are cached. For example, the components that are not currently in the common component cache 406 or the specific component cache 408 may be added to the specific component cache 408. In this manner, these components will be cached for use in reassembly of a container file that is later transferred to the computing device that is performing the method 500. For example, in some aspects, the remote computing device that receives the container file 112 will modify and return the container file 112. In this case, the returned container file 112 is likely to have many components that are identical to the components of the container file 112 that was initially transferred.
Additionally, in some aspects, the container file exchange engine 300 determines whether to perform the method 500 based on properties of the remote computing device. For example, the method 500 may only be performed if it can be determined that the remote computing device supports a method of receiving container files 112 that is compatible with the method 500. Additionally, in some aspects, other properties of the remote computing device are evaluated to determine whether to perform the method 500, such as the location of the remote computing device, the identity of the hosting entity, and the services to which the client is subscribed.
At operation 602, component metadata is received for a container file 112. The component metadata may be retrieved, for example, from a remote computing device. In some aspects, the received component metadata may comprise component metadata information files for a plurality of components within a container file 112.
At operation 604, component data items are received for the components of the container file 112. In some aspects, component data items for all, some, or none of the components of the container file 112 are received.
At operation 606, cached component data items are retrieved based on the received component metadata. The cached component data items may be retrieved from the common component cache 406 and the specific component cache 408. In some aspects, it is determined whether the component data items are available in either the common component cache 406 or the specific component cache 408 using a hash value generated from the component metadata for the components. For example, some aspects, query tables in the common component cache 406 and the specific component cache 408 for records that match a hash value calculated from the component metadata. If the query returns a matching record, it is determined that component data item for the component is cached and the component data item is retrieved. In at least some aspects, if a component data item was received in operation 604 for a component, it is not determined whether the component data item has been cached.
At operation 608, a request is transmitted to the remote computing device for the component data items, if any, that were not received in operation 604 and that were also not retrieved from the cache in operation 606. In some aspects, the request may comprise a plurality of component metadata items or a hash value calculated from the component metadata for the components that are still needed. Thereafter, at operation 610, the requested component data items, if any, are received.
At operation 612, the container file 112 is assembled based on the received component metadata, the received component data items, and the retrieved cached component data items. In some aspects, the assembly may comprise uncompressing any compressed component data items and associating the uncompressed component data items with a name and/or path information from the component metadata. Additionally, the components may be written to a file according to the particulars of the container file format. Additionally or alternatively, the components may be loaded by, for example, the container file editor 106 or the container file service 114.
At operation 614, the received component data items are cached. In some aspects, any of the received component data items that were not already cached are added to the specific component cache 408. Additionally, in some aspects, a list of component data items that have been added to the cache is transmitted to the remote computing device so that the remote computing device can maintain/update a remote cache index.
At operation 616, the remote cache index 404 is updated. In some aspects, the remote cache index 404 is updated to include all of the component data items that were received from the remote computing device.
As stated above, a number of program modules and data files may be stored in the system memory 704. While executing on the processing unit 702, the program modules 706 (e.g., the container file exchange engine 300) may perform processes including, but not limited to, one or more of the stages of the methods 500-600 illustrated in
Furthermore, aspects of the invention may be practiced in an electrical circuit comprising discrete electronic elements, packaged or integrated electronic chips containing logic gates, a circuit utilizing a microprocessor, or on a single chip containing electronic elements or microprocessors. For example, aspects of the invention may be practiced via a system-on-a-chip (SOC) where each or many of the components illustrated in
The computing device 700 may also have one or more input device(s) 712 such as a keyboard, a mouse, a pen, a sound input device, a touch input device, etc. The output device(s) 714 such as a display, speakers, a printer, etc. may also be included. The aforementioned devices are examples and others may be used. The computing device 700 may include one or more communication connections 716 allowing communications with other computing devices 718. Examples of suitable communication connections 716 include, but are not limited to, radio frequency (RF) transmitter, receiver, and/or transceiver circuitry; universal serial bus (USB), parallel, and/or serial ports.
The term computer readable media as used herein may include computer storage media. Computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, or program modules. The system memory 704, the removable storage device 709, and the non-removable storage device 710 are all computer storage media examples (i.e., memory storage.) Computer storage media may include RAM, ROM, electrically erasable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other article of manufacture which can be used to store information and which can be accessed by the computing device 700. Any such computer storage media may be part of the computing device 700. Computer storage media does not include a carrier wave or other propagated or modulated data signal.
Communication media may be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” may describe a signal that has one or more characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), infrared, and other wireless media.
The system includes a processor 860. One or more application programs 866 may be loaded into the memory 862 and run on or in association with the operating system 864 using the processor 860. Examples of the application programs include phone dialer programs, e-mail programs, personal information management (PIM) programs, word processing programs, spreadsheet programs, Internet browser programs, messaging programs, and so forth. The system 802 also includes a non-volatile storage area 868 within the memory 862. The non-volatile storage area 868 may be used to store persistent information that should not be lost if the system 802 is powered down. The application programs 866 may use and store information in the non-volatile storage area 868, such as e-mail or other messages used by an e-mail application, and the like. As should be appreciated, other applications may be loaded into the memory 862 and run on the mobile computing device 800, including the container file editor 106 and the container file exchange engine 300 described herein.
The system 802 has a power supply 870, which may be implemented as one or more batteries. The power supply 870 might further include an external power source, such as an AC adapter or a powered docking cradle that supplements or recharges the batteries.
The system 802 may also include a radio 872 that performs the function of transmitting and receiving radio frequency communications. The radio 872 facilitates wireless connectivity between the system 802 and the “outside world,” via a communications carrier or service provider. Transmissions to and from the radio 872 are conducted under control of the operating system 864. In other words, communications received by the radio 872 may be disseminated to the application programs 866 via the operating system 864, and vice versa.
The audio interface 874 is used to provide audible signals to and receive audible signals from the user. For example, in addition to being coupled to the audio transducer 825, the audio interface 874 may also be coupled to a microphone to receive audible input, such as to facilitate a telephone conversation. The system 802 may further include a video interface 876 that enables an operation of an on-board camera 830 to record still images, video streams, and the like.
A mobile computing device 800 implementing the system 802 may have additional features or functionality. For example, the mobile computing device 800 may also include additional data storage devices (removable and/or non-removable) such as, magnetic disks, optical disks, or tape. Such additional storage is illustrated in
Data/information generated or captured by the mobile computing device 800 and stored via the system 802 may be stored locally on the mobile computing device 800, as described above, or the data may be stored on any number of storage media that may be accessed by the device via the radio 872 or via a wired connection between the mobile computing device 800 and a separate computing device associated with the mobile computing device 800, for example, a server computer in a distributed computing network, such as the Internet. As should be appreciated such data/information may be accessed via the mobile computing device 800 via the radio 872 or via a distributed computing network. Similarly, such data/information may be readily transferred between computing devices for storage and use according to well-known data/information transfer and storage means, including electronic mail and collaborative data/information sharing systems.
Aspects of the present invention, for example, are described above with reference to block diagrams and/or operational illustrations of methods, systems, and computer program products according to aspects of the invention. The functions/acts noted in the blocks may occur out of the order as shown in any flowchart. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
The description and illustration of one or more aspects provided in this application are not intended to limit or restrict the scope of the invention as claimed in any way. The aspects, examples, and details provided in this application are considered sufficient to convey possession and enable others to make and use the best mode of claimed invention. The claimed invention should not be construed as being limited to any aspect, example, or detail provided in this application. Regardless of whether shown and described in combination or separately, the various features (both structural and methodological) are intended to be selectively included or omitted to produce an aspect with a particular set of features. Having been provided with the description and illustration of the present application, one skilled in the art may envision variations, modifications, and alternate aspects falling within the spirit of the broader aspects of the general inventive concept embodied in this application that do not depart from the broader scope of the claimed invention.
This application claims priority to U.S. Provisional Application Ser. No. 62/254,989, entitled “TRANSFERRING FILES,” filed on Nov. 13, 2015, the entire disclosure of which is hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5499366 | Rosenberg et al. | Mar 1996 | A |
5909689 | Ryzin | Jun 1999 | A |
6035323 | Narayen et al. | Mar 2000 | A |
6081262 | Gill et al. | Jun 2000 | A |
6192518 | Neal | Feb 2001 | B1 |
6983068 | Prabhakar et al. | Jan 2006 | B2 |
7039229 | Lin et al. | May 2006 | B2 |
7171042 | Hartmann et al. | Jan 2007 | B2 |
7194134 | Bradshaw | Mar 2007 | B2 |
7346627 | Ramanathan | Mar 2008 | B2 |
7383509 | Foote et al. | Jun 2008 | B2 |
7386791 | Jacobson | Jun 2008 | B2 |
7500194 | Collins et al. | Mar 2009 | B2 |
7577905 | Collins et al. | Aug 2009 | B2 |
7620665 | George | Nov 2009 | B1 |
7716332 | Topfl | May 2010 | B1 |
7860305 | Wang et al. | Dec 2010 | B2 |
8024658 | Fagans et al. | Sep 2011 | B1 |
8214742 | Pratt | Jul 2012 | B2 |
8416255 | Gilra | Apr 2013 | B1 |
8418059 | Kitada | Apr 2013 | B2 |
8478799 | Beaverson | Jul 2013 | B2 |
8560952 | Collins et al. | Oct 2013 | B2 |
8655111 | Berger et al. | Feb 2014 | B2 |
8745158 | Claman | Jun 2014 | B2 |
8775918 | Livshin et al. | Jul 2014 | B2 |
8799829 | Grosz et al. | Aug 2014 | B2 |
8890886 | Kriese et al. | Nov 2014 | B2 |
8924376 | Lee | Dec 2014 | B1 |
9177225 | Cordova | Nov 2015 | B1 |
9280613 | Smith | Mar 2016 | B2 |
9330437 | Berglund et al. | May 2016 | B2 |
9400610 | Wallace | Jul 2016 | B1 |
9400801 | Aplemakh | Jul 2016 | B1 |
9715485 | Roth et al. | Jul 2017 | B2 |
9824291 | Maloney et al. | Nov 2017 | B2 |
20020102018 | Lin et al. | Aug 2002 | A1 |
20020186236 | Brown et al. | Dec 2002 | A1 |
20020194227 | Day et al. | Dec 2002 | A1 |
20030037010 | Schmelzer | Feb 2003 | A1 |
20040001106 | Deutscher et al. | Jan 2004 | A1 |
20040034829 | Ohashi et al. | Feb 2004 | A1 |
20040243930 | Schowtka et al. | Dec 2004 | A1 |
20050100223 | de Queiroz | May 2005 | A1 |
20050108619 | Theall et al. | May 2005 | A1 |
20050171758 | Palmquist | Aug 2005 | A1 |
20060036965 | Harris et al. | Feb 2006 | A1 |
20060126932 | Eschbach | Jun 2006 | A1 |
20060136520 | Leppinen | Jun 2006 | A1 |
20060136827 | Villaron et al. | Jun 2006 | A1 |
20060156218 | Lee | Jul 2006 | A1 |
20060220983 | Isomura et al. | Oct 2006 | A1 |
20060259858 | Collins et al. | Nov 2006 | A1 |
20060282779 | Collins et al. | Dec 2006 | A1 |
20060294046 | Sareen et al. | Dec 2006 | A1 |
20070019924 | Teo et al. | Jan 2007 | A1 |
20070185926 | Prahlad | Aug 2007 | A1 |
20070196013 | Li et al. | Aug 2007 | A1 |
20070198523 | Hayim | Aug 2007 | A1 |
20070291049 | Edwards et al. | Dec 2007 | A1 |
20080005195 | Li | Jan 2008 | A1 |
20080075360 | Li et al. | Mar 2008 | A1 |
20080276176 | Wahba et al. | Nov 2008 | A1 |
20090049064 | Alquier et al. | Feb 2009 | A1 |
20090051826 | Chang | Feb 2009 | A1 |
20090077261 | Broadhurst et al. | Mar 2009 | A1 |
20090116752 | Isomura et al. | May 2009 | A1 |
20090252413 | Hua et al. | Oct 2009 | A1 |
20100082672 | Kottomtharayil | Apr 2010 | A1 |
20100082713 | Frid-Nielsen | Apr 2010 | A1 |
20100088297 | Kiilerich | Apr 2010 | A1 |
20100088605 | Livshin et al. | Apr 2010 | A1 |
20100092076 | Iofis | Apr 2010 | A1 |
20100158380 | Neville et al. | Jun 2010 | A1 |
20100289818 | Hirooka | Nov 2010 | A1 |
20100332401 | Prahlad | Dec 2010 | A1 |
20110058736 | Tokungaga | Mar 2011 | A1 |
20110125722 | Rae Goutham et al. | May 2011 | A1 |
20110131341 | Yoo et al. | Jun 2011 | A1 |
20110157221 | Ptucha et al. | Jun 2011 | A1 |
20110221764 | Callens et al. | Sep 2011 | A1 |
20110234613 | Hanson | Sep 2011 | A1 |
20110243453 | Kashima et al. | Oct 2011 | A1 |
20110246893 | Paas et al. | Oct 2011 | A1 |
20110280476 | Berger et al. | Nov 2011 | A1 |
20120105467 | Chao et al. | May 2012 | A1 |
20120106859 | Cheatle | May 2012 | A1 |
20120275704 | Cok et al. | Nov 2012 | A1 |
20130028521 | Yabu | Jan 2013 | A1 |
20130111373 | Kawanishi et al. | May 2013 | A1 |
20130124980 | Hudson et al. | May 2013 | A1 |
20130239002 | Maloney et al. | Sep 2013 | A1 |
20130279773 | Masumoto | Oct 2013 | A1 |
20140195575 | Haustein | Jul 2014 | A1 |
20140282009 | Avrahami | Sep 2014 | A1 |
20140380171 | Maloney et al. | Dec 2014 | A1 |
20150046791 | Isaacson | Feb 2015 | A1 |
20150095385 | Mensch et al. | Apr 2015 | A1 |
20150113411 | Underwood et al. | Apr 2015 | A1 |
20150277726 | Maloney et al. | Oct 2015 | A1 |
20150310124 | Ben-Aharon et al. | Oct 2015 | A1 |
20160171954 | Guo | Jun 2016 | A1 |
20160179826 | Batra | Jun 2016 | A1 |
20170026552 | Tomono | Jan 2017 | A1 |
20170139930 | Maloney | May 2017 | A1 |
20170140241 | Maloney et al. | May 2017 | A1 |
20170140250 | Maloney et al. | May 2017 | A1 |
20180217742 | Maloney et al. | Aug 2018 | A1 |
Number | Date | Country |
---|---|---|
1828587 | Sep 2006 | CN |
102945226 | Feb 2013 | CN |
1085464 | Mar 2001 | EP |
1657648 | May 2006 | EP |
2503759 | Sep 2012 | EP |
3119062 | Jan 2017 | EP |
1995019003 | Jul 1995 | WO |
2001093563 | Dec 2001 | WO |
2006123328 | Nov 2006 | WO |
2006126628 | Nov 2006 | WO |
2009085526 | Jul 2009 | WO |
2012047253 | Apr 2012 | WO |
2013059545 | Apr 2013 | WO |
2014015081 | Jan 2014 | WO |
2014131194 | Sep 2014 | WO |
Entry |
---|
Chinese Office Action dated Nov. 16, 2017 cited in Application No. 201480036154.4, 10 pgs. |
PCT 2nd Written Opinion dated Jul. 31, 2017 cited in Application No. PCT/US2016/060416, 11 pgs. |
“Final Office Action Issued in U.S. Appl. No. 15/081,351”, dated Jun. 28, 2018, 15 Pages. |
“Second Office Action Issued in Chinese Patent Application No. 201480036154.4”, dated Jul. 16, 2018, 6 Pages. |
“Create a slide layout that meets your needs”, Retrieved on: Oct. 28, 2015, Available at:https://support.office.com/en-us/article/Create-a-slide-layout-that-meets-your-needs-f881f3a5-522b-4ff8-a496-10a74771a14c, 2 pgs. |
Abela, “Announcing the Slide Chooser”, Published on: Jan. 14, 2015, 4 pgs., available at: http://extremepresentation.typepad.com/blog/2015/01/announcing-the-slide-chooser.html. |
Athitsos et al., “Distinguishing Photographs and Graphics on the World Wide Web”, In Proceedings of IEEE Workshop on Content-Based Access of Image and Video Libraries, Jun. 20, 1997, pp. 1-7. |
Behera et al., “Combing Color and Layout Features for the Identification of Low-resolution Documents”, Google, Mar. 2005, 8 pgs. |
Chen et al., “Artistic Image Analysis using the Composition of Human Figures”, In Proceedings of European Conference on Computer Vision, Sep. 6, 2014, pp. 1-15. |
Chen et al., “Identifying Computer Graphics Using HSV Color Model and Statistical Moments of Characteristic Functions”, In Proceedings of IEEE International Conference on Multimedia and Expo, Jul. 2, 2007, 4 pgs. |
Deng et al., “Color Image Segmentation”, In Proceedings of Conference on Computer Vision and Pattern Recognition, vol. 2, Jun. 23, 1999, 6 pgs. |
Dogar et al., “Ditto—A System for Opportunistic Caching in Multi-hop Wireless Networks”, In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, Sep. 14, 2008, 12 pgs. |
Krinidis et al., “An Unsupervised Image Clustering Method Based on EEMD Image Histogram”, In Journal of Information Hiding and Multimedia Signal Processing, vol. 3, No. 2, Apr. 2012, pp. 151-163. |
Luo et al., “Natural Scene Classification using Overcomplete ICA”, In Journal of Pattern Recognition, vol. 38, No. 10, Oct. 2005, pp. 1507-1519. |
Morse et al., “Image-based Color Schemes”, In Proceedings of IEEE International Conference on Image Processing, vol. 3, Sep. 16, 2007, pp. 497-500. |
Muthitacharoen et al., “A Low-bandwidth Network File System”, In Proceedings of Eighteenth ACM Symposium on Operating Systems Principles, Oct. 21, 2004, 14 pgs. |
Ng et al., “Classifying Photographic and Photorealistic Computer Graphic Images using Natural Image Statistics”, In Advent Technical Report #220-2006-6, Oct. 2004, pp. 1-20. |
Park et al., “Supporting Practical Content-Addressable Caching with CZIP Compression”, In Proceedings of USENIX Annual Technical Conference, Jun. 17, 2007, 24 pgs. |
Prabhakar et al., “Picture-Graphics Color Image Classification”, In Proceedings of International Conference on Image Processing, vol. 2, Sep. 22, 2002, 5 pgs. |
Tridgell et al., “The Rsync Algorithm”, In Technical Report TR-CS-96-05 of the Australian National Unversity, Jun. 18, 1996, 8 pgs. |
PCT International Search Report dated Feb. 1, 2017 cited in Application No. PCT/US2016/060424, 13 pgs. |
PCT International Search Report dated Feb. 8, 2017 cited in Application No. PCT/US2016/060498, 11 pgs. |
PCT International Search Report and Written Opinion dated Mar. 2, 2017 cited in Application No. PCT/US2016/060414, 13 pgs. |
PCT International Search Report and Written Opinion dated Mar. 2, 2017 cited in Application No. PCT/US2016/060416, 23 pgs. |
U.S. Final Office Action dated Oct. 12, 2016 cited in U.S. Appl. No. 13/925,114, 18 pgs. |
U.S. Office Action dated Mar. 10, 2017 cited in U.S. Appl. No. 15/081,416, 14 pgs. |
PCT Written Opinion dated Sep. 11, 2017 cited in Application No. PCT/US2016/060414, 8 pgs. |
PCT International Preliminary Report dated Sep. 22, 2017 cited in Application No. PCT/US2016/060424, 14 pgs |
US Office Action dated Oct. 19, 2017 cited in U.S. Appl. No. 15/081,351, 33 pgs. |
International Preliminary Report on Patentability dated Sep. 28, 2017 cited in Application No. PCT/US2016/060498, 7 pgs. |
International Preliminary Report on Patentability dated Oct. 18, 2017 cited in Application No. PCT/US2016/060416, 12 pgs. |
About layouts, Retrieved on: Mar. 26, 2013, Available at: http://office.microsoft.com/en-in/powerpoint-help/about-layouts-HP003082915.aspx. |
Leading the way in Microsoft Office Development, Retrieved on: Mar. 26, 2013,Available at: http:/www.bettersolutions.com/powerpoint/PIZ113/YU112210331.htm. |
PCT International Preliminary Report on Patentability Issued in PCT Application No. PCT/US2014/041025, dated Oct. 7, 2015, 8 Pages. |
PCT International Search Report dated Nov. 26, 2014 in Application No. PCT/US2014/041025, 9 pgs. |
PCT Second Written Opinion Issued in Patent Application No. PCT/US2014/041025, dated Jun. 5, 2015, 7 Pages. |
U.S. Appl. No. 11/152,755 Notice of Allowance dated Jun. 8, 2009 8 pgs. |
U.S. Appl. No. 11/152,755 Office Action dated Sep. 4, 2008 7 pgs. |
U.S. Appl. No. 11/152,755 Response dated Feb. 4, 2009 8 pgs. |
U.S. Appl. No. 13/925,114 Office Action dated Mar. 10, 2016 7 pgs. |
U.S. Appl. No. 13/925,114 Amendment dated Jul. 11, 2016 12 pgs. |
International Preliminary Report on Patentability Issued in PCT Application No. PCT/US2016/060414, dated Jan. 4, 2018, 9 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 15/081,270”, dated Nov. 29, 2018, 14 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 15/850,191”, dated Jun. 28, 2019, 9 Pages. |
“Office Action Issued in European Patent Application No. 14735771.9”, dated Mar. 20, 2019, 9 Pages. |
“Final Office Action Issued in U.S. Appl. No. 15/081,270”, dated May 6, 2019, 12 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 15/081,270”, dated Jul. 29, 2019, 9 Pages. |
Number | Date | Country | |
---|---|---|---|
20170139978 A1 | May 2017 | US |
Number | Date | Country | |
---|---|---|---|
62254989 | Nov 2015 | US |