摘要:
Feed content presentation techniques are described. In an implementation, data from a plurality of feeds of data is aggregated. The data that is aggregated may include an attribute that describes the data and is associated with a member of a social network service. The data is filtered for presentation based on one or more of a user context associated with a member that is to consume the presentation when the data is requested or a particular attribute of the data selected by a member that is to consume the presentation.
摘要:
Permission access model techniques are described. In an implementation, an association between data that is publicly accessible and a member of a social network service is formed. The association is combined with a permission control that is operable to control access to the association independent of access to the data.
摘要:
Localization techniques are described. In an implementation, data is parsed from a feed of data that is public and not localized. A template is formed from the data for each locale that is to be supported. The data that is localized for a particular locale is presented is based on a particular template for the particular locale.
摘要:
A method and a system provide an online application platform in which an entity may create applications to be shared among users of a user community. The online application platform may provide the users of the user community with information regarding applications and entities and may provide the users with an interface for providing feedback with respect to the applications and the entities. The online application platform may track usage of the applications and may store data with respect to the tracked usage. The data may be used to generate business intelligence, which may be used to improve the applications, market the applications, or for other useful purposes. The users of the user community may subscribe to an information update service to receive dynamically communicated application updates, or other information.
摘要:
A method and system for creating security policies for firewall and connection policies in an integrated manner is provided. The security system provides a user interface through which a user can define a security rule that specifies both a firewall policy and a connection policy. After the security rule is specified, the security system automatically generates a firewall rule and a connection rule to implement the security rule. The security system provides the firewall rule to a firewall engine that is responsible for enforcing the firewall rules and provides the connection rule to an IPsec engine that is responsible for enforcing the connection rules.
摘要:
A security system that allows an outbound security policy for the connection security to be automatically derived from an inbound security policy for connection security is provided. The security system for an inbound security policy has security suites that each specify one or more security algorithms. Because the security system offers an outbound security suite that matches an inbound security suite, the computing devices that have the same inbound security policy have matching inbound and outbound security suites.
摘要:
A method and system for creating security policies for firewall and connection policies in an integrated manner is provided. The security system provides a user interface through which a user can define a security rule that specifies both a firewall policy and a connection policy. After the security rule is specified, the security system automatically generates a firewall rule and a connection rule to implement the security rule. The security system provides the firewall rule to a firewall engine that is responsible for enforcing the firewall rules and provides the connection rule to an IPsec engine that is responsible for enforcing the connection rules.
摘要:
A method and system for creating security policies for firewall and connection policies in an integrated manner is provided. The security system provides a user interface through which a user can define a security rule that specifies both a firewall policy and a connection policy. After the security rule is specified, the security system automatically generates a firewall rule and a connection rule to implement the security rule. The security system provides the firewall rule to a firewall engine that is responsible for enforcing the firewall rules and provides the connection rule to an IPsec engine that is responsible for enforcing the connection rules.
摘要:
A security token is coupled to a computer and is available for use by both local and remote processes for on-demand response to a challenge. To minimize the security risk of an unattended session, the challenge may be issued to verify the presence of the token. When the token has a user interface, it may be used in conjunction with the computer to require that a user also participate in transferring displayed data between the token and computer. This helps to ensure that not only the token, but the user are both present at the computer during operation. For the most sensitive operations, such a confirmation may be required with each data submission.