摘要:
A data sharing mechanism may allow programs to share access to data collections. The mechanisms that implement the sharing may allow programs written in any language to read and write a shared collection. The mechanisms may make the shared nature of the collection relatively transparent to the program and to the programmer, by allowing a program to operate on the data more or less as if it were purely local data. The sharing of collections may be managed by a shared object runtime on each machine on which a collection is used, and by a shared object server. The shared object server maintains the true state of the collection, and deterministically resolves collections when programs operate on the same collection without knowledge of each other's operations. The mechanisms by which collections are shared may be implemented so as to be agnostic as to the kind of data in the collection.
摘要:
A user entering information in an application might desire functionality not supported by that application. Based on an input or a subset of the input, a functionality associated with a different application can be automatically applied within a current application. Sometimes, a particular application or mode of communication can be used to send information and reply information can be sent in a different mode of communication. The communications can be automatically associated or related to each other. A user can be presented with information relating to both communications, upon request, although the communications might be associated with different modes of communication. Constraints or parameters can be placed on a subsequent communication by either a sender or a recipient.
摘要:
Sharing of objects may be implemented in a way that allows programs to use shared objects in much the same way that they would use local objects. In one example, a program creates an object and sets properties through normal instructions that would be used to create a local object. The program then registers the object with a shared object model, which may be maintained by a shared object server. For each machine on which the object may be used, a shared object runtime monitors for changes to the objects, and notifies the server of these changes. The server updates the object, and notifies other machines of changes to the state of the object. The shared object runtimes on those machines receive notification of the changes, and update the local copies.
摘要:
Architecture is provided that facilitates user-controlled access to user profile information. A user is allowed to selectively expose (or mask) portions of his/her profile to third parties. Additionally, advertisers and/or content providers can offer incentives or enticement in response to the acceptance of which a user exposes larger portions of their profile. The architecture comprises a system that facilitates profile management utilizing a profile component that facilitates creation and storage of an electronic profile of a user, and a control component under control of the user for controlling access to the profile. Machine learning and reasoning is provided to make inferences and automate aspects thereof.
摘要:
In a peer-to-peer collaborative system in which collaborators communicate via a shared telespace and exchange data change requests, a unique number is assigned to each endpoint (a unique pairing of a device and a person) of each of the telespace members. Each endpoint number indicates the order in which the member joined the telespace, and, for each member invited to join (or otherwise sponsored) by another telespace member (the “inviting member”), it also indicates the inviting member. As more and more members are invited to join by those new members, the designations add additional orders of digits to indicate the family tree or chain of inviting members. The designations are used to resolve collisions between two data change requests that are both dependent on the same data change request.
摘要:
Systems, methods, data structures and/or the like are provided for placing copy data, supplemental, and/or additional data on a clipboard, for example. The copy data may comprise a reference to supplemental data, such as HTML data (e.g., a social media data from an HTML social media webpage). The supplemental data may be retrieved using the reference, and placed within the clipboard. In this way, the copy data and the supplemental data may be available within the clipboard.
摘要:
Personal data mining mechanisms and methods are employed to identify relevant information that otherwise would likely remain undiscovered. Users supply personal data that can be analyzed in conjunction with data associated with a plurality of other users to provide useful information that can improve business operations and/or quality of life. Personal data can be mined alone or in conjunction with third party data to identify correlations amongst the data and associated users. Applications or services can interact with such data and present it to users in a myriad of manners, for instance as notifications of opportunities.
摘要:
Content management architecture for a portable wireless device. Caching and fetching techniques are provided to improve content handling for portable devices such as cellular telephones and portable computers. A search component automatically performs searches as a background process, and potentially desired content is received and cached by a content storing component to be available in the future when and if needed, mitigating latency associated with slow download speeds, refresh rates, and other system and/or network impediments. Content from background search results can be trickled into the device as part of the background process so as not to burden system resources for other processes. As part of memory management, aged and/or low priority or low interest content can be selectively removed or archived to increase available cache or memory space, as well as to maintain relevant content within the device. A presentation component facilitates presentation of the pre-stored content.
摘要:
Providing for task-related electronic feedback based on user interaction with a communication network is described herein. By way of example, user interactions the network or a network interface can be monitored to identify user activities performed in conjunction with a task. A rating for performance of the task can be obtained via comparison of user activities with benchmark performance activities. Based on the rating and user-benchmark comparison, inefficiencies can be identified, along with corrective actions for such activities. The corrective actions can then be output to coach the user on techniques for improving performance of the task. Accordingly, by employing corrective feedback based on monitored user activity, personal training can be automated, potentially reducing time and cost of such training.
摘要:
Systems and methods that analyze aggregated tagging behavior of users, and evaluate such tagging trends to identify criteria for taxonomy applications. Initially, existence of a possible trend of tagging data based on collective user behavior is determined. Subsequently, tagging trends can be examined to identify that a predetermined convergence criteria has in fact been met, and/or establish such criteria for taxonomy applications. Machine learning systems (implicitly as well as explicitly trained) can be supplied to facilitate determining the trends and the convergence criteria.