Abstract:
The subject technology provides for detecting a drag gesture selecting an item in a first application. The subject technology detects a touch release at an end of the drag gesture for dropping the item in a second application. The subject technology sends in response to the detected touch release, a message to the second application, the message including information for a plurality of representations of the item. The subject technology receives, from the second application, a request for a representation of the item from among the plurality of representations. The subject technology sends, to the first application, the request for the representation of the item. Further, the subject technology initiates a data transfer of the representation of the item from the first application to the second application.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.
Abstract:
The subject technology provides for identifying an item being dragged over an application in which the items are arranged in a table in a first arrangement. The subject technology copies the first arrangement to generate a second arrangement that corresponds to an initial arrangement of the items when the item is identified as being dragged over the first application. The subject technology updates the first arrangement to reflect changed positions of the items in the table resulting from another item being inserted into the table. The subject technology updates the second arrangement to reflect changed positions of items. Further, the subject technology merges the updated second arrangement with the updated first arrangement to reconcile the changed positions resulting from the item being inserted into the table at the location with the changed positions resulting from the another item being inserted into the table.
Abstract:
A device implementing drag and drop for touchscreen devices may include a processor configured to detect a drag gesture selecting an item in a first application. The processor may be further configured to detect a touch release at an end of the drag gesture for dropping the item in a second application, and send, in response to the detected touch release, a message to the second application, the message including information for a plurality of representations of the item. The processor may be further configured to receive, from the second application, a request for a representation of the item from among the plurality of representations. The processor may be further configured to send, to the first application, the request for the representation of the item. The processor may be further configured to initiate a data transfer of the representation of the item from the first application to the second application.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.
Abstract:
The subject technology provides for receiving a request for a representation of an item from a destination application. The subject technology sends the request for the representation of the item to a source application. The subject technology receives a link to a file provider, the file provider fulfilling a data transfer of the representation of the item. Further, the subject technology sends the link to the file provider to the destination application.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys.
Abstract:
Methods and apparatuses that enroll a wireless device into an enterprise service with a management server addressed in a management profile are described. The enrollment may grant a control of configurations of the wireless device to the management server via the management profile. In response to receiving a notification from the management server, a trust of the notification may be verified against the management profile. If the trust is verified, a network session may be established with the management server. The network session may be secured via a certificate in the management profile. Management operations may be performed for management commands received over the secure network session to manage the configurations transparently to a user of the wireless device according to the control.