摘要:
A method embodiment includes receiving data indicative of a person accessing at least one of a first network-available electronic content or a second network-available electronic content. Also, receiving data indicative of an involvement with respect to possible matters of interest between the person and a third-party. The involvement being independent of the person activating a link to a site owned by the third-party that is included in the first network-available electronic content or in the second network available electronic content. Further, assessing a behavioral influence by the first network-available electronic content and/or the second network-available electronic content on the indicated involvement with respect to the possible matters of interest between the person and a third-party. Also, facilitating delivery of a benefit to an owner of the first network-available electronic content and/or an owner of the second network-available electronic content in response to the assessed behavioral influence.
摘要:
An execution environment may have a monitoring, analysis, and feedback loop that may configure and tune the execution environment for currently executing workloads. A monitoring or instrumentation system may collect operational and performance data from hardware and software components within the system. A modeling system may create an operational model of the execution environment, then may determine different sets of parameters for the execution environment. A feedback loop may change various operational characteristics of the execution environment. The monitoring, analysis, and feedback loop may optimize the performance of a computer system for various metrics, including throughput, performance, energy conservation, or other metrics based on the applications that are currently executing. The performance model of the execution environment may be persisted and applied to new applications to optimize the performance of applications that have not been executed on the system.
摘要:
The claimed subject matter relates to an architecture that can mitigate privacy concerns in connection with ad targeting or data collection. In particular, architecture can be included in a personal mobile communication device such as a cell phone. During communication transactions between the host device and a peer device, shared information can be extracted either from content included in the communication or from metadata. Based upon the shared information, a social graph maintained on the host device can be updated. In addition, the host device can receive a large set of ads and select or tailor a custom ad from the set based upon the social graph.
摘要:
Executable code may be fingerprinted by inserting NOP codes into the executable code in a pattern that may reflect a fingerprint. The NOP codes may be single instructions or groups of instructions that perform no operation. A dictionary of NOP codes and their corresponding portion of a fingerprint may be used to create a series of NOP codes which may be embedded into executable code. The fingerprinted executable code may be fully executable and the presence of the NOP codes may not be readily identifiable. The fingerprinting mechanism may be used to authenticate executable code in various scenarios.
摘要:
Architecture is provided that facilitates user-controlled access to user profile information related to spam filtering. A user is allowed to selectively expose (or mask) portions of his/her profile related to spam filtering to third parties. Additionally, advertisers and/or content providers can offer incentives or enticement in response to the acceptance of which a user exposes larger portions of their profiles related to spam filtering. The architecture comprises a system that facilitates profile management utilizing a profile component that facilitates creation and storage of an electronic profile including spam filtering information of a user, and a control component under control of the user for controlling access to the profile.
摘要:
The present disclosure relates generally to determining influencers in a Web 2.0 environment. More specifically, in some implementations, an influence of an electronically-accessed content on an involvement between an accessor and a third party is determined. In further implementations, a provider of the electronically accessed content is rewarded based on the assessed influence.
摘要:
An operating system may be configured using a control flow graph that defines relationships between each executable module. The operating system may be configured by analyzing an application and identifying the operating system modules called from the application, then building a control flow graph for the configuration. The operating system may be deployed to a server or other computer containing only those components identified in the control flow graph. Such a lightweight deployment may be used on a large scale for datacenter servers as well as for small scale deployments on sensors and other devices with little processing power.
摘要:
A logical file system is described that distributes copies of files across various different physical storage resources yet provides a consistent view to the user of his or her data, regardless of which machine the user is accessing the files from, and even when the user's computer is offline. The distributed file system uses smart data redundancy to enable a virtually infinite amount of storage as long as additional storage resources are made available to the distributed file system. The result is a reliable storage system that does not necessarily tie the user's data to the user's particular computer. Instead, the user's data is associated with the user—for life—or for however long the user would like the data to be maintained, regardless of whether the user's computer or data storage components are replaced or destroyed.
摘要:
A system architecture integrates spreadsheet functionality into text. The architecture allows insertion of discrete individual fields, referred to as “free floating fields”, inline with normal textual sentences. In an HTML document, for example, the free floating fields are elements constructed along with text elements and rendered together as an integrated document. Once rendered, the free floating fields present contents that resemble normal text consistent with the surrounding text. The free floating fields offer spreadsheet functionality, including the ability to handle complex formulas, reference values in a separate free floating field or table, and automatically recalculate the formulas when a source value changes.
摘要:
The claimed subject matter provides systems and/or methods that facilitate replicating a state associated with a client, user, service, application, and the like. A third party service provider can support any number of services that can be concurrently requested by several clients without user perception of degraded computing performance as compared to conventional systems/techniques due to improved connectivity and mitigated latencies. A replication component can generate replicas of states associated with requested services. Further, the replicas can facilitate seamlessly interacting with the third party service provider (e.g., while transitioning between client devices). Additionally, by providing replicas of the state related information, differing third party service providers can effectuate services based upon a request from a client without regenerating the state.