摘要:
Methods, apparati, and computer-readable media for regulating a user's access to a Web page. A method embodiment of the present invention comprises the steps of hashing (31) a URL associated with a Web page requested by the user; comparing (32) the hashed URL with a list (24) of pre-stored URL hashes; and granting (34) or denying (37) access to the requested Web page based upon results of the comparing step (32).
摘要:
A computer-implemented method for automatically synchronizing online communities may comprise identifying login information for a first user account associated with the first online community, accessing the first user account using the login information for the first user account, obtaining information from the first user account, and modifying, based on the information obtained from the first user account, a second user account associated with a second online community. Corresponding systems and computer-readable media are also disclosed.
摘要:
A computer-implemented method for automatically configuring virtual private networks may include 1) broadcasting by a client on a network to discover a virtual private network server configured to manage virtual private networks, 2) discovering, by the client in response to the broadcast, the virtual private network server, 3) establishing a secure connection between the client and the virtual private network server in response to the discovery, and 4) receiving, by the client from the virtual private network server through the secure connection, configuration settings that enable the client to automatically connect to a virtual private network. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
The number of redundant content items provided to a user by a multi-source feed reader is automatically reduced. Each content item obtained by the multi-source feed reader from each feed to which the users subscribes is analyzed prior to being made available to the user. More specifically, the content items are analyzed to determine whether they are based on source content from different feeds. Each content item is searched for attributes indicating a source on which it is based. Where it is determined that a content item from a first feed is based on source content from a second feed, it is further determined whether the user subscribes to the second feed which the source content is from. If so, the specific received content item from the first feed is not provided to the user.
摘要:
A computer correlates web and email attributes to detect spam. A security module on a client collects attributes of a web site to which an email address was submitted and attributes of an email message sent to the email address that was previously submitted. The security module analyzes the attributes of the web site and the email message to determine whether the email message was sent to the email address responsive to the submission of the email address to the web site. Based on the analysis, the security module determines whether the email message is spam. A machine learning module on a security server establishes training data describing the attributes of the web site to which email addresses were submitted and attributes of legitimate emails received in response to the address submissions. The machine learning module generates an attributes classifier for the security module for spam detection.
摘要:
Computer-implemented methods and systems for simultaneously installing user-input-dependent software packages on multiple devices are disclosed. In one example, an exemplary method for performing such a task may comprise: 1) initiating installation of a software package on each of a plurality of client devices, 2) receiving, from each client device, a visual image generated during installation of the software package that depicts an installation step that requires user input, 3) consolidating the visual images into a consolidated view, 4) displaying, via an installation-management interface, the consolidated view to a user of the computing device, 5) receiving, via the installation-management interface, user input from the user for completing the installation step, and then 6) completing the installation step by sending the user input to each client device.
摘要:
A storage farm is maintained, on which user generated publishable content is stored. Users can copy generated content to the storage farm for automatic publishing to associated target sites. User login information for the plurality of publication sites is maintained, such that the system can use the login information to login to the various publication sites as a given user. The publishable content stored in the storage farm is compared to publishable content published on the associated publication sites. Responsive to finding publishable content on at least one publication site that is not present on the storage farm, that publishable content can be aggregated to the storage farm for future access by the associated user. Responsive to finding publishable content on the storage farm not published on an associated publication site, that publishable content can be automatically published.
摘要:
Method and apparatus managing calls for call-related calendar entries stored on a device is described. In some examples, calendar entries stored in the device are parsed to detect call-related calendar entries. A telephone number associated with each of the call-related calendar entries is extracted. An invocator is provided in the device that is configured to cause the device to dial the telephone number associated with a first call-related calendar entry of the call-related calendar entries that is within a temporal threshold of a current time maintained by the device.
摘要:
An automated wireless synchronization platform allows users to synchronize files and folders between devices, while transparently providing content transformation services. The content transformation services ensure that content is synchronized to target devices in the appropriate format, at a proper balance of size and quality to be ideally output on the target devices.
摘要:
A method and apparatus for mitigating the performance impact of background or idle time processing during interactive computing sessions. One embodiment of the present invention is a method for mitigating performance impact of background or idle time processing on interactive applications comprising identifying executable and data pages in physical memory that are associated with an interactive application that is temporarily unused and preventing any of the identified executable and data pages from paging out.