Abstract:
The subject technology provides for identifying an item being dragged over an application in which the items are arranged in a table in a first arrangement. The subject technology copies the first arrangement to generate a second arrangement that corresponds to an initial arrangement of the items when the item is identified as being dragged over the first application. The subject technology updates the first arrangement to reflect changed positions of the items in the table resulting from another item being inserted into the table. The subject technology updates the second arrangement to reflect changed positions of items. Further, the subject technology merges the updated second arrangement with the updated first arrangement to reconcile the changed positions resulting from the item being inserted into the table at the location with the changed positions resulting from the another item being inserted into the table.
Abstract:
A device implementing drag and drop for touchscreen devices may include a processor configured to detect a drag gesture selecting an item in a first application. The processor may be further configured to detect a touch release at an end of the drag gesture for dropping the item in a second application, and send, in response to the detected touch release, a message to the second application, the message including information for a plurality of representations of the item. The processor may be further configured to receive, from the second application, a request for a representation of the item from among the plurality of representations. The processor may be further configured to send, to the first application, the request for the representation of the item. The processor may be further configured to initiate a data transfer of the representation of the item from the first application to the second application.
Abstract:
In the described embodiments, a device configuration file is used to set configuration settings on a computing device during a configuration operation (e.g., an initial configuration or a re-configuration of the computing device). The device configuration file is retrieved from a location where the device configuration file is hosted using a reference to the location from a bootstrap configuration. The bootstrap configuration is provided by a bootstrap configuration server and is retrieved by the computing device from the bootstrap configuration server during the configuration operation.
Abstract:
A device may comprise at least one wireless transceiver, a memory configured to store a local pasteboard, and a processor. The processor may be configured to receive local selections of data to be placed on a local pasteboard, broadcast advertisements indicating that the local data is on the local pasteboard, and wirelessly transmit the local data to remote device pasteboards. The processor may also be configured to receive advertisements indicating that remote data is available on remote pasteboards of other devices, request the remote data in response to a paste command, wirelessly receive the remote data, and paste the remote data.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.
Abstract:
A device may comprise at least one wireless transceiver, a memory configured to store a local pasteboard, and a processor. The processor may be configured to receive local selections of data to be placed on a local pasteboard, broadcast advertisements indicating that the local data is on the local pasteboard, and wirelessly transmit the local data to remote device pasteboards. The processor may also be configured to receive advertisements indicating that remote data is available on remote pasteboards of other devices, request the remote data in response to a paste command, wirelessly receive the remote data, and paste the remote data.
Abstract:
Methods and apparatuses that enroll a wireless device into an enterprise service with a management server addressed in a management profile are described. The enrollment may grant a control of configurations of the wireless device to the management server via the management profile. In response to receiving a notification from the management server, a trust of the notification may be verified against the management profile. If the trust is verified, a network session may be established with the management server. The network session may be secured via a certificate in the management profile. Management operations may be performed for management commands received over the secure network session to manage the configurations transparently to a user of the wireless device according to the control.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.
Abstract:
In the described embodiments, a device configuration file is used to set configuration settings on a computing device during a configuration operation (e.g., an initial configuration or a re-configuration of the computing device). The device configuration file is retrieved from a location where the device configuration file is hosted using a reference to the location from a bootstrap configuration. The bootstrap configuration is provided by a bootstrap configuration server and is retrieved by the computing device from the bootstrap configuration server during the configuration operation.