Abstract:
A method includes maintaining a list of component dependencies for components of a plurality of webpages served from a web server. A change relating to a data item in a database is detected. A first set of components that are impacted by the change relating to the data item in the database are identified. Using the list of component dependencies, a second set of components that are dependent on the first set of components are identified. A set of webpages, served from the web server to at least one browser application, that include components from the first and second sets of components are identified. From an update server, an update operation is initiated with respect to the set of webpages.
Abstract:
A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple external systems that communicate with the social networking system to access information about the users of the social networking system. Login status of the user account on the social networking system is maintained. If the login status of the user account on the social networking system indicates that the user is not logged in, the user is required to provide authentication information. If the login status of the user account indicates that the user is logged in, social network information is provided to the user via an external system, subject to the privacy settings of users of the social networking system. If the user logs out from an external system, the user is also logged out from the social networking system.
Abstract:
A question-and-answer application with an “ask-to-answer” feature is described. The ask-to-answer feature enables any user to solicit an answer to a question from another user. Upon soliciting another user for an answer to a particular question, a message with a call to action is directed to the solicited user. The message may include a copy of the text of the question and may provide a mechanism (e.g., a selectable user interface element) enabling the solicited user to pass on answering the question. Subsequent to the solicitation, the question page for the question will include a notification with information about the solicitation, including in some instances information identifying the user who has been asked to answer the question and the number of times the user has been asked to provide an answer to the question.
Abstract:
A method to perform component-based rendering of a webpage includes identifying a component hierarchy from which to render the webpage. A set of components are selected from the component hierarchy as an evaluation component set. The evaluation component set is evaluated by determining that a particular component of the evaluation component set does not include a data request for data item to be used in the rendering of the webpage. Responsive to the determination, least one child component of the particular component is identified within the component hierarchy. The child component is added to the evaluation component set.
Abstract:
A question-and-answer application having questions with which topics are associated is described. In some embodiments, user-generated topics are assigned to questions to indicate the subject matter covered by the questions. The application logic includes topic merge logic for quickly and efficiently merging two topics, while enabling the topic merge operation to be easily undone if necessary.
Abstract:
An external system (such as a website) that interacts with users communicates with a social networking system to access information about the users, who may also be users of the social networking system. If a privacy setting is changed in the social networking system, and the change applies to information that has been shared with an external system, the change is enforced at the external system. For example, the external system may be notified that the information is invalid and must be deleted, or the external system may periodically request the information so that changes to the privacy settings are eventually experienced at the external systems. When an external system again needs the information, whether expired naturally or actively invalidated by the social network, the external system sends a new request for the information, which is subject to the (possibly revised) privacy settings.
Abstract:
A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple external systems that communicate with the social networking system to access information about the users of the social networking system. Login status of the user account on the social networking system is maintained. If the login status of the user account on the social networking system indicates that the user is not logged in, the user is required to provide authentication information. If the login status of the user account indicates that the user is logged in, social network information is provided to the user via an external system, subject to the privacy settings of users of the social networking system. If the user logs out from an external system, the user is also logged out from the social networking system.