Abstract:
In one embodiment, a user of a social networking system requests to look up a contact's communication channel information in the user's address book. The social networking system provides to the user the contact's communication channels in an ordered sequence based on the user's social graph and communication information.
Abstract:
In one embodiment, a method includes detecting interception of data sent by the computing device to a first network resource through a communication network. The first network resource corresponds to a particular domain of the communication network. The method also includes determining whether the communication network is administered by the particular domain; and automatically generating a request to access the communication network that identifies a second network resource based at least in part on the determination. The second network resource is configured to authenticate a user to the particular domain of the communication network. The method also includes sending the request to the second network resource to access the communication network.
Abstract:
Using pinch gestures to navigate user interface layers of an application. In particular embodiments, a pinch gesture may cause an application program to close a currently running user interface layer of the application and navigate to another user-interface layer of the application. In some implementations, a pinch gesture may cause an application to close.
Abstract:
To provide more contextually and temporally relevant information to its users, a social networking system may surface relevant information about a target user with whom an recipient user is likely to interact. The social networking system predicts whether the recipient user is likely to be in contact with a target user, either currently or in the near future. If contact is predicted, the system determines information about the target user that that the recipient user may find of interest for their interaction. To determine what information may be of interest, the system determines a relevance score for information items about that target user. The system can then use the relevance scores to decide whether and which information items to surface to the recipient user, e.g., in the form of notifications.
Abstract:
A client device receives advertisement content associated with an entity having a physical location and one or more instructions that, when executed, present information identifying the physical location. The client device displays an ad unit including the received advertisement content and a link associated with the instructions to present the information identifying the physical location. If a user selects the link, the client device presents information identifying the physical location, such as a map, within the ad unit. Additional instruction may be included in the advertisement that, when executed by the client device, execute an application installed on the client device to provide directions to the physical location.
Abstract:
In one embodiment, a method includes accessing at least two determinations of the location of a mobile computing device, with each determined location having been determined without reference to explicit location information manually input by a user of the mobile computing device. At least one first determined location is compared with at least one second determined location, with comparisons being made between location determinations made based on different location determination input. A functionality associated with the mobile computing device is allowed if the first determined location corresponds to at least one of the second determined locations.
Abstract:
In one embodiment, a computing server receives from a client computing device a first upload that includes a set of multimedia objects on the client computing device. The set of multimedia objects is selected by a user of the client computing device. While the upload of the set of multimedia objects is in progress, the computing server concurrently receives, from the client computing device, a second upload that includes metadata entered by the user. The metadata corresponds to a subset of the multimedia objects, the subset being selected by the user from the set of multimedia objects.
Abstract:
In particular embodiments, one or more computer systems of a social-networking system determine a first media device of a first user of a social-networking system and determine a second media device of a second user of the social-networking system. The one or more computer systems access a social graph of the social-networking system, update the social graph based on the determined first and second media devices, and stream media from the first media device to the second media device using the updated social graph. The social graph includes nodes and edges connecting the nodes, the nodes including user nodes that are each associated with a particular user of the social-networking system and concept nodes that are each associated with a particular media device.
Abstract:
In particular embodiments, a social networking system queries a social graph of the social-networking system for social content associated with video content provided to one or more users of the social-networking system and accesses privacy settings associated with each of the one or more users. The privacy settings indicate whether a particular user has authorized the social-networking system to share social content associated with the particular user with one or more third parties. The social networking system provides the social content associated with video content provided to the one or more users to a particular third party if the privacy settings of the one or more users indicate that the one or more users have authorized the social-networking system to share the social content with one or more third parties.
Abstract:
In particular embodiments, a computing device may receive authentication information provided by a temporary user and retrieve personal information associated with the temporary user from a server using the authentication information. The device may present a personalized user interface on a screen of the computing device for the temporary user, the personalized user interface being generated based on the personal information. The device may detect a terminating event that indicates access to the computing device by the temporary user is to be disabled. The terminating event may be detected by determining that a biometric information associated with the temporary user is undetectable, or determining that the computing device is put down. In response to the detected terminating event, information associated with the temporary user may be removed from the computing device, and the computing device may be reverted to a default state.