摘要:
An online service provider (OSP) operates online data centers to store members' data objects relating to various online member services of the OSP. An aggregated catalog lists members' data objects residing in the online data centers and also those residing in member computers' local storage. An aggregator monitors contents of the online storage facilities to detect new storage of prescribed types of data objects owned by the members, and also communicates with member computers to identify prescribed types of data objects newly stored in the respective local storage. The aggregator updates the aggregated catalog to list the newly stored data objects. Responsive to a request by a member, a finder searches the aggregated catalog and utilizes results of the search to provide, for display at the requesting member's computer, a consolidated listing of online data objects and locally stored data objects owned by the requesting member.
摘要:
An application capture is distributed by an application capture trigger associated with an online communication session between a first user and a second user and generating an application capture associated with rendered portions of the first user's display in response to activation of the application capture trigger. The application capture is sent to the second user within the online communication session.
摘要:
A handheld client framework system provides a server proxy client that services client requests for network accessible information and determines the server that is most appropriate to supply the requested information and sends information request packets to that server across the Internet and/or intranet. Server responses to information requests are received by the server proxy client. The server proxy client separates the response information into the appropriate data components. Data components are sent to the appropriate client. Presentation and logic components are temporarily stored in a one-behind cache on the client. A client will continue to use the presentation and logic components already installed or in the one-behind cache to service the current user request. Any updates sent by the server proxy client and stored in the one-behind cache are retrieved by the client upon subsequent use by the user. The state of the client is saved by the server proxy client so that the client is not dropped when a user, for example, changes from a wired connection to a wireless connection. The invention includes a scripting language that supplies the logic component of the client and gives the client unlimited flexibility by allowing the host to modify the client's behavior or add new features at any time.
摘要:
A computer implemented method for intelligently enabling menu choices includes rendering, on a client system, an address book user interface comprising information related to one or more contacts, selecting a contact from the address book user interface, determining an online presence state for the selected contact, enabling one or more menu options based upon the determined online presence state, with the menu options enabled for a first online presence state differing from the menu options enabled for a second online presence state, and presenting the enabled menu options to a user in a user interface.
摘要:
A sender's degrees of separation from a recipient may be used to aid in spam filtering or to otherwise handle a communication. The “degrees of separation” represent a metric used to quantify whether/how the recipient is linked to the sender through intermediary people or other entities. For example, a recipient may know a first user (first degree of separation) and the first user may know a second user (second degree of separation) who knows the sender of an e-mail. In this case, the sender is separated from the recipient by two degrees of separation (by two other contacts). A level of “trust” or “legitimacy” about a sender's communication can be inferred by looking at whether the sender is linked to an intended recipient. Typically, user contact lists (e.g., address book, buddy list, and/or white list) are evaluated to determine the number of degrees (or hops) are required to link or relate two users.
摘要:
A home-networking gateway may automatically provide a function based on data identified on a device on a home network. The home-networking gateway may perform the function using another device that is capable of performing the function and is accessible to the home-networking gateway.
摘要:
A query phrase may be automatically classified to one or more topics of interest (e.g., categories) to assist in routing the query phrase to one or more appropriate backend databases. A selectional preference query classification technique may be used to classify the query phrase based on a comparison between the query phrase and patterns of query phrases. Additionally, or alternatively, a combination of query classification techniques may be used to classify the query phrase. Topical classification of a query phrase also may be used to assist a search system in delivering auxiliary information to a user who entered the query phrase. Advertisements, for instance, may be tailored based on classification rather than query keywords.
摘要:
A client computer requests a resource from an ISP/OSP. The ISP/OSP maintains multiple instances of the resource. In deciding to which instance of the resource to route the client computer, a resource selection server takes network routability information into account. Geographic proximity, resource utilization, network utilization, and/or maintenance of peering agreements may also be taken into account in selecting the instance of the resource.
摘要:
Systems and techniques for transferring electronic data between users of a communications system by receiving, at an instant messaging host, a video file from a sender and intended for a recipient; authenticating the video file; and sending the video file to the intended recipient.
摘要:
Techniques are described for forwarding an instant message addressed to an intended instant messaging recipient to the recipient's mobile telephone when the recipient's mobile telephone number is known to the instant message sender. In one example, an instant message is forwarded to the intended recipient's mobile telephone number when the instant message sender's contact information for the intended recipient includes an instant message address (e.g., a screen name or other type of instant message identifier) and a mobile telephone number, without dependence upon the intended recipient' s presence on the instant message (IM) system or through actual login or registration with an IM forwarding service. In another example, an instant message addressed to an intended instant messaging recipient is forwarded to the recipient's mobile telephone when the recipient is known to the instant message sender.