摘要:
Systems and methods for synchronizing and sharing data associated with sharing relationships are disclosed. Such systems and methods may be implemented by interfacing with an application that manages or accesses the data to be shared, and by making shared data available using a feed along with some mechanism for tracking changes or enabling synchronization between different endpoints.
摘要:
Among other things, one or more techniques and/or systems are disclosed for generating a human memorable resource name. Both a first part of the resource name and a second part of the resource name are generated, where both parts respectively comprise a memorable alphanumeric string (e.g., easily remembered). The first and second parts of the resource name are combined with an intervening separator symbol to generate the first resource name, comprising the first part, the symbol, and the second part. The first resource name is compared against a desired threshold to determine if it can be used as the name for the resource. If the first resource name does not meet the threshold a second resource name is generated for the resource.
摘要:
Data files, applications and/or corresponding user interfaces may be accessed at a device that collaborates in a mesh. The mesh may include any number or type of devices that collaborate in a network. Data, applications and/or corresponding user interfaces may be stored within a core object that may be shared over the mesh. Information in the core object may be identified with a corresponding user such that a user may use any collaborating device in the mesh to access the information. In one example, the information is stored remotely from a device used to access the information. A remote source may store the desired information or may determine the storage location of the desired information in the mesh and may further provide the desired information to a corresponding user.
摘要:
Data files, applications and/or corresponding user interfaces may be accessed at a device that collaborates in a mesh. The mesh may include any number or type of devices that collaborate in a network. Data, applications and/or corresponding user interfaces may be stored within a core object that may be shared over the mesh. Information in the core object may be identified with a corresponding user such that a user may use any collaborating device in the mesh to access the information. In one example, the information is stored remotely from a device used to access the information. A remote source may store the desired information or may determine the storage location of the desired information in the mesh and may further provide the desired information to a corresponding user.
摘要:
Proper user-to-data associations are maintained in shared spaces created in a peer-to-peer collaborative system by means of a simplified and minimal user interface that permits users to easily authenticate other members of a shared space. In particular, support is provided for automatically building authenticated relationships even if users do not take the time to authenticate other users. When a user enters a shared space and views the contacts in that space, the display names of each contact are accompanied by distinctive icons that identify that authentication status of that contact. A mechanism is provided for resolving conflicts between contacts with the same display names to prevent confusion and contact “spoofing.” Security policies can be established to provide a uniform approach to authentication. These policies can be set by a user or, alternatively, the policies can be set by an administrator.
摘要:
Systems and methods of distributed storage are disclosed herein. A request to store data in a client computer is received. A request is sent from the client computer to a storage service to create a core object such that the core object can be created with a member entry to a member feed in the core object. The member feed can be indicative of one or more entities that are permitted to access to the core object. A message is received at the client computer with the core object. A replica of the core object on the client computer is created. The client computer can add the data as a data entry to a data feed in the core object. An updating message is sent to the storage service. The message can include a copy of the replica of the core object including the data entry.
摘要:
Providing for graphical visualization of contextual information pertinent to electronic messaging is described herein. By way of example, contextual network usage information or messaging disposition can be determined for a set of participants to electronic communication. The contextual information is compiled into categories and organized at least as a function of category. The compiled data can be transformed into a visualization of user disposition or context and output to a user device as a multi-dimensional graphical rendering. By rendering contextual data graphically, the rich and diverse information available from usage histories, current user context and user dispositions can be output and consumed rapidly and efficiently, resulting in productive electronic interaction.
摘要:
A single device that receives communications intended for a user having multiple contact addresses associated with different user roles is provided. The single device can receive communications intended for multiple telephone numbers, email aliases, screen names, aliases, other means of contact, or combinations thereof. Since a user engaged in a particular role might not desire to be interrupted with communications intended for a different role, the communications for the other roles can be maintained until the user is actively engaged in the role for which the communication was intended. In situations where there is an important communication sent to a non-active role, selective convergence between roles is initiated and the important communication is presented to the user.
摘要:
Embodiments of erasure coded storage aggregation are disclosed. The erasure coded storage aggregation includes storing a data file as erasure coded fragments in a plurality of nodes of one or more data centers. The erasure coded storage aggregation further includes monitoring an access frequency of the data file. Based on the comparison between the access frequency and a predetermined threshold, the data file is either reconstructed from the erasure coded fragments and stored in a storage node or retained as erasure coded fragments in the plurality of nodes of the one or more data centers.