Abstract:
A method and apparatus for using a remote delegate is described. In one embodiment, the method comprising evaluating information that identifies at least one of software packages resident in a client computer or licenses associated with the software packages using a remote delegate and enabling use of a resource at the client computer based on the information through use of the remote delegate.
Abstract:
A computer-implemented method for applying parental-approval decisions to user-generated content. The method may include receiving, from a child, a request to upload user-generated content to the Internet. The method may also include providing the user-generated content to a guardian of the child and receiving, from the guardian of the child, a decision indicating whether the user-generated content is allowed to be uploaded to the Internet. The method may further include applying the decision of the guardian to the user-generated content. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
Method and apparatus for monitoring product purchasing activity on a network are described. In some examples, processing of network traffic in a network is performed. Web content is extracted from the network traffic at a node in the network. A statistical analysis of the web content is performed to detect product purchasing activity. Product attributes associated with the product purchasing activity are extracted. The product attributes are stored in a log implemented in a memory on the network.
Abstract:
A computer-implemented method for sharing logs of a child's computer activities with a guardian of the child is disclosed. The method may include determining that a child may be involved in a computer activity on a computing device that is not controlled by a guardian of the child, monitoring the computer activity, creating a log of the computer activity, determining that the guardian of the child is authorized to view the log of the computer activity, and providing the log of the computer activity to the guardian of the child. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
It is detected whenever the user of the local computer system views online content that provides an entryway to a remote application. When such a detection occurs, data concerning the remote application is collected and transmitted to a central repository. The central repository receives and aggregates such collected data from a plurality of sources. It is detected when the user of the local computer system is being prompted to activate a new remote application, and aggregated data concerning the new remote application is retrieved from the central repository. The aggregated data concerning the new remote application is analyzed, and responsive to the analyzing it is determined whether the new remote application is benign. Responsive to determining that the new remote application is not benign, the new remote application can be blocked, and/or a warning can be output to the user.
Abstract:
A filtering policy is defined responsive to parental directives. The filtering policy specifies to filter a child's access to content based on fact-based categorization and subjective factors, such as the emotional tone, expressed sentiment, extremity and/or expressed subjectivity. Content is categorized based on the occurrence of predefined words. A sentiment-based analysis of content is also performed. The categorization and/or analysis can occur prior to a child's attempt to download the content, or in real-time in conjunction with a download attempt. Attempts by the child to access content are detected. It is determined whether the filtering policy permits the child to access the content in question, responsive to results of the categorization and sentiment-based analysis of that content. If so, the attempted access is allowed to proceed. If not, the access attempt is blocked.
Abstract:
The performance of a boot sequence is improved by presenting the user with easy to read information concerning the performance cost of each boot time application, and allowing the user to remove processes from the boot sequence or uninstall them altogether. Processes associated with the boot sequence are identified, and their corresponding performance cost is determined as percentage of the performance cost of the entire boot sequence, or according to the time they take to execute. The identified processes and their associated performance costs are presented to the user, along with a user interface component for selecting processes to remove from the boot sequence and/or uninstall. Responsive to input from the user, selected processes are removed from the boot sequence and/or uninstalled as directed.
Abstract:
A computer-implemented method for correlating online aliases with real-world identities may comprise accessing a first user account associated with a first online communication mechanism, obtaining contact data associated with a first online alias from the first user account, identifying contact data associated with a second online alias, identifying, by comparing the contact data associated with the first online alias with the contact data associated with the second online alias, at least one common characteristic between the first online alias and the second online alias, and associating both the first online alias and the second online alias with a common contact. A graphical user interface may display a contact's name, online aliases for by the contact, and the online communication mechanisms that may be used to communicate with the contact. The method may also facilitate communication with a contact using online communication mechanisms. Corresponding systems and computer-readable media are also disclosed.
Abstract:
Outbound network traffic originating from a client is filtered, to check for files targeted for upload to remote sites. When a file targeted for upload to a remote site is detected, a remote storage location at which the client's backup data is stored is checked for a copy of the detected file. If a copy of the file is located at the remote backup site, that copy is substituted for the client copy in the network transmission to the target remote site. By uploading online copies of files when available, the client upload experience is much faster, and local bandwidth is preserved for other tasks.
Abstract:
Techniques for avoiding dynamic domain name system (DNS) collisions are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for avoiding dynamic domain name system (DNS) collisions comprising: storing a first location associated with a first client device, a second location associated with a second client device, and a third location associated with a network, receiving, from the first client device, a first notification indicating an Internet Protocol (IP) address via the network, receiving, from the second client device, a second notification indicating the IP address via the network, determining a most likely owner of the network between the first client device and the second client device based on the first location, the second location, and the third location, and applying a content filtering policy associated with the first client device when the first client device is determined to be the most likely owner.