Abstract:
Technologies are generally described for a spoiler alert scheme. In some examples, a spoiler alert system may include an event determination unit configured to determine an event of interest to a user for which a spoiler alert is to be provided, a spoiler identification unit configured to identify one or more posts in an online forum that include spoiler information regarding the determined event of interest, and a spoiler control unit configured to hide the one or more identified posts from the online forum, as displayed to the user.
Abstract:
Technologies are generally described for task management on computing platforms. In some examples, a method performed under control of a task management system may include determining a relationship among a plurality of tasks executed on a first platform to identify one or more associated tasks; identifying at least one attribute of each of the one or more associated tasks; generating a job that includes the one or more associated tasks and the identified at least one attribute of each of the one or more associated tasks; and instantiating, on a second platform, the one or more associated tasks included in the job based on the at least one attribute of each of the one or more associated tasks, in response to a request to launch the job.
Abstract:
Technologies are generally described for a social networking service (SNS). In some examples, a method performed under control of a server may include receiving a user input associated with the user responding to content posted in an online forum, determining whether a threshold condition set by the user is satisfied for the user's response to be disclosed with regard to a particular piece of content posted in the online forum, and disclosing the user's response to the particular piece of content posted in the online forum when the threshold condition is determined to be satisfied.
Abstract:
Technologies are generally described for privacy protection for a life-log system. In some examples, a method performed under control of a life-log system may include receiving, from a user account, a request to change one or more real life-log data entries relating to a real event that are stored in a first part of a database; removing the one or more real life-log data entries relating to the real event from the first part of the database; and storing, in the first part of the database, one or more misleading life-log data entries relating to a false event corresponding to the real event.
Abstract:
Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a mobile operating server may include determining whether there is an authenticated wireless access point around a mobile device, if there is no authenticated wireless access point, determining whether there is a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device and if there is a non-authenticated wireless access point whose capacity is over the predetermined value, instructing the mobile device to connect to a wireless local area network provided by the non-authenticated wireless access point.
Abstract:
Technologies are generally described for a display management scheme. In some examples, a method may include determining a number of new data items that have not been accessed by a user account, among a plurality of data items; and changing a manner by which respective ones of the new data items that have not been accessed are to be displayed on an electronic device associated with the user account based on, at least, the determined number of new data items.
Abstract:
Technologies are generally described for a social networking service (SNS). In some examples, a method performed under control of a server may include receiving a user input associated with the user responding to content posted in an online forum, determining whether a threshold condition set by the user is satisfied for the user's response to be disclosed with regard to a particular piece of content posted in the online forum, and disclosing the user's response to the particular piece of content posted in the online forum when the threshold condition is determined to be satisfied.