摘要:
A method and apparatus are described for enabling a first node, which utilizes a first naming protocol, to obtain an network address of another node from a naming service that does not provide addresses in accordance with the first naming protocol. A network embodying the present invention includes a naming proxy agent. A first node in the network obtains network addresses corresponding to node names according to a first naming protocol, and a second node conducts network naming operations according to a second naming protocol that is incompatible with the first naming protocol. As a result, the first node cannot by itself obtain the address of the second node by means of a node name query under the first naming protocol. However, the naming proxy agent receives a first naming query transmitted by the first node according to the first naming protocol that includes the name of the second node. The naming proxy agent converts the first naming query into a second naming query that also includes the registered name. The naming proxy agent transmits the second naming query according to the second naming protocol.
摘要:
Systems and methods are disclosed for customizing a user's experience with an application such as a search engine application. The user's experience is customized based on inferring a mood and/or interests of the user at least in part from an analysis of the user's posts on one or more social media sites. The search engine application is configured to include a user-following engine which follows a user's activities on social media websites. By tracking a user's posts and other activity on social media websites, and possibly those of his or her friends, the user-following engine is able to draw inferences about a user, including for example the user's emotional state, current trending interests, future plans, likes/dislikes and aspirations. The user-following engine may then customize the user's search experience based on these drawn inferences.
摘要:
A system and method are disclosed for coordinating different image capture devices at an event so that images captured by the different devices may form a cohesive and consistent image set. The system includes a group of image capture devices, referred to herein as an event capture group, wirelessly communicating with a remote server. The image capture devices in an event capture group may consist of still image cameras, video recorders, mobile phones and other devices capable of capturing images. The server coordinates the devices in a group before images are taken, so that the resultant images from the different devices are consistent with each other and may be aggregated into a single, cohesive image set. Images from different devices in the group may be uploaded during an event and organized on a remote database into the image set which may be viewed during or after the event.
摘要:
The apparent speed with which a media work is ripped to copy the work into a visible store is substantially reduced. When the media work is played, its content is cached onto a persistent, fast access storage media. If the user subsequently decides to rip the media work, the content of the cache is copied to a visible store in substantially less time than would be required to play the media work and convert it. The user thus perceives that the media work is ripped in a substantially shorter time, compared to that required for ripping the media work in a conventional manner. The ripping process may encode or transform the format of the content to a desired format for use within the visible store. Constraints may be imposed by the user to limit the cache, or the caching process may be hidden from the user.
摘要:
An online media content service is adapted for use with a personal media player to provide targeted content to the player on a rental basis and is architected to enable users to access music using new models.. The targeted media content includes content that has special context or meaning to a user of the service by virtue, for example, of either being organized into a collection that appeals to the user, or by being related to the user through the user's social graph. In the first case, the targeted media content may illustratively include a set of media that has been selected to fulfill a theme or genre, and is made available to a user as a package to access and play for a limited period of time for a rental fee. In the second case, the targeted media content may illustratively include a collection of songs that are drawn from playlists of people that the service knows to be friends of the user and provided on a subscription basis.
摘要:
A method and system for invoking by a client computer system of a function of an object of an object class provided by a server computer system. The client sends a request to a server that comprises a Universal Resource Locator (“URL”) that identifies a script, an object class, and a function of the object class to invoke. In response to receiving the request, the server starts the script and transfers control to the script. The script instantiates an object of the object class identified in the URL of the received request and invokes the function identified in the URL of the received request. The invoked function performs the behavior of the function, creates a response to be sent to the client, and sends the response to the client. The response contains state information describing a state of the object after the behavior of the function is performed. When the client subsequently sends a request to invoke a function of the object class, the state information is included in the request so that the function can perform its behavior based on the state information.
摘要:
A method and system for invoking by a client computer system of a function of an object of an object class provided by a server computer system. The client sends a request to a server that comprises a Universal Resource Locator (“URL”) that identifies a script, an object class, and a function of the object class to invoke. In response to receiving the request, the server starts the script and transfers control to the script. The script instantiates an object of the object class identified in the URL of the received request and invokes the function identified in the URL of the received request. The invoked function performs the behavior of the function, creates a response to be sent to the client, and sends the response to the client. The response contains state information describing a state of the object after the behavior of the function is performed. When the client subsequently sends a request to invoke a function of the object class, the state information is included in the request so that the function can perform its behavior based on the state information.
摘要:
A client computer has a facility for encapsulating location information, such as a uniform resource locator (URL), for a resource that is available on a server computer. The facility is especially well-adapted for use with Internet documents. The location information for such a resource is encapsulated into an object known as an Internet shortcut. The Internet shortcut may created through a drag and drop operation from a link to the desktop. Appearing as an icon, the shortcut is used to gain access to the underlying resource. The Internet shortcut icon holds a link to a remote resource and will automatically activate the web browser when selected. The Internet shortcut icons may be implemented as objects that are visible on the desktop of the operating system. File operations such as copy, delete, and copy may be performed on the Internet shortcut icon through a context menu. In addition, Internet shortcuts may be transferred to E-mail, facsimile, floppy disk destinations through a context menu.
摘要:
A method for tracking usage patterns of users of hyper-media systems, such as the World-Wide Web, that creates a usage log on a user's client computer and periodically transmits the usage log from the user's client machine to a usage tracking server computer to be incorporated in an overall usage log for a given information server computer. Alternatively, proxy server may be connected between a client computer and an information server with the proxy server acting as a client to the information server and creating a usage log of the user's client computer access to the information server computer to be sent to usage tracking computer. Each time a user connects to a Web site, the client computer or proxy server creates a usage log that records all objects retrieved from that particular Web site and other attributes of user processing such as time spent viewing an object, amount of an object viewed, etc. Periodically, upon the occurrence of one of more predefined events that signify the end of a session, computer or proxy server saves the usage log into a single, compressed file and transmits the resulting file to the server. Events that signify the end of a session and trigger the transmission of a usage log from the user's client computer or proxy server computer to the usage tracking server computer may include a predetermined time interval, accessing a predetermined number of objects, application program or operating system shut down, connecting to a different Web site, and/or modem shut down.
摘要:
A method and system for invoking by a client computer system of a function of an object of an object class provided by a server computer system. The client sends a request to a server that comprises a Universal Resource Locator ("URL") that identifies a script, an object class, and a function of the object class to invoke. In response to receiving the request, the server starts the script and transfers control to the script. The script instantiates an object of the object class identified in the URL of the received request and invokes the function identified in the URL of the received request. The invoked function performs the behavior of the function, creates a response to be sent to the client, and sends the response to the client. The response contains state information describing a state of the object after the behavior of the function is performed. When the client subsequently sends a request to invoke a function of the object class, the state information is included in the request so that the function can perform its behavior based on the state information.