Abstract:
Disclosed are various embodiments for facilitating gift campaigns in association with a social networking system. A computing device may identify a user of a social networking system that is associated with a recipient for a gift campaign. An invitation for the user to participate in the gift campaign can be transmitted by the computing device. The computing device may identify a product as a suggested gift for the gift campaign. In addition, the computing device may generate content for a network page for the social networking system, and the network page can include a user interface container in which the product is represented. The computing device may also obtain a selection of the product made via the network page and perform a transaction to order the product for the recipient.
Abstract:
Disclosed are various embodiments for facilitating gift campaigns in association with a social networking system. A computing device may identify a user of a social networking system that is associated with a recipient for a gift campaign. An invitation for the user to participate in the gift campaign can be transmitted by the computing device. The computing device may identify a product as a suggested gift for the gift campaign. In addition, the computing device may generate content for a network page for the social networking system, and the network page can include a user interface container in which the product is represented. The computing device may also obtain a selection of the product made via the network page and perform a transaction to order the product for the recipient.
Abstract:
A system and method for controlling access to digital content based on proximity and location of a user device. A user device connects to a local network and an audio transmission including a perpetually rolling key is transmitted within a geo-fence in the local area. The user device hears the audio transmission and uses the key to authenticate to a content server over the network. Once authenticated, the user device may then stream content from the content server. In order to terminate access to the content when the user device leaves the geo-fence, the content server may require the key to be retransmitted from the user device at regular intervals to re-authenticate the user device. Other factors such as radio fingerprints from the user device may also be used instead of or in addition to the audio to verify the user device's presence within the geo-fence.