摘要:
Improved techniques and systems for delivery and acquisition of digital assets are disclosed. The techniques and systems are especially suitable and useful for delivering digital assets (e.g., media assets) that are available for acquisition and electronic delivery from online stores to electronic devices. In accordance with one aspect, when a digital asset is acquired form an online store via an electronic device associated with a user, the digital asset can be arranged for delivery to a number of other of electronic devices also associated with the user. It will be appreciated that the digital asset can be delivered and acquired without requiring explicit user input or instruction in accordance with another aspect. Other aspects of the techniques and systems include customization of configuration and user interfaces that are provided to facilitate acquisition of digital assets in a more efficient manner.
摘要:
Improved techniques and systems for delivery and acquisition of digital assets are disclosed. The techniques and systems are especially suitable and useful for delivering digital assets (e.g., media assets) that are available for acquisition and electronic delivery from online stores to electronic devices. In accordance with one aspect, when a digital asset is acquired form an online store via an electronic device associated with a user, the digital asset can be arranged for delivery to a number of other of electronic devices also associated with the user. It will be appreciated that the digital asset can be delivered and acquired without requiring explicit user input or instruction in accordance with another aspect. Other aspects of the techniques and systems include customization of configuration and user interfaces that are provided to facilitate acquisition of digital assets in a more efficient manner.
摘要:
Improved techniques and systems for storage, delivery and acquisition of digital assets are disclosed. The techniques and systems are suitable and useful for storing, delivering and accessing digital assets (e.g., media assets) that have been acquired from online stores. The techniques and systems are also suitable and useful for storing, delivering and accessing digital assets that have been acquired from other than from online stores. Regardless, the digital assets become accessible from a network-based digital data repository (e.g., cloud data storage) via electronic devices (e.g., user devices) and thus usable by the electronic devices. The digital assets can include media assets and/or non-media assets.
摘要:
Improved techniques and systems for storage, delivery and acquisition of digital assets are disclosed. The techniques and systems are suitable and useful for storing, delivering and accessing digital assets (e.g., media assets) that have been acquired from online stores. The techniques and systems are also suitable and useful for storing, delivering and accessing digital assets that have been acquired from other than from online stores. Regardless, the digital assets become accessible from a network-based digital data repository (e.g., cloud data storage) via electronic devices (e.g., user devices) and thus usable by the electronic devices. The digital assets can include media assets and/or non-media assets.
摘要:
Improved techniques and systems for storage, delivery and acquisition of digital assets are disclosed. The techniques and systems are suitable and useful for storing, delivering and accessing digital assets (e.g., media assets) that have been acquired from online stores to electronic devices. The techniques and systems are also suitable and useful for storing, delivering and accessing digital assets that have been acquired from other than from online stores. The digital assets can include media assets and/or non-media assets.
摘要:
Improved techniques and systems for storage, delivery and acquisition of digital assets are disclosed. The techniques and systems are suitable and useful for storing, delivering and accessing digital assets (e.g., media assets) that have been acquired from online stores. The techniques and systems are also suitable and useful for storing, delivering and accessing digital assets that have been acquired from other than from online stores. Regardless, the digital assets become accessible from a network-based digital data repository (e.g., cloud data storage) via electronic devices (e.g., user devices) and thus usable by the electronic devices. In one embodiment, subsequent access to the digital assets from the network-based digital data repository by electronic devices can be limited through use of a limited set of assignable slots. The digital assets can include media assets and/or non-media assets.
摘要:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for utilizing a secondary application to render invitational content. Primary content rendered by a web browser can be embedded with a command requesting that a secondary application be executed. The secondary application can be executed in a secured sand box environment and configured to render invitational content in a second window above the primary content. The secondary application can be known and trusted by the operating system to gather sensitive data used to select appropriate invitational content. Further, data can be included in the command requesting that the secondary application be executed. The invitational content can be associated with secondary views that can be rendered without affecting the primary content. The secondary application can collect data to render the secondary view, such as the exact point selected, which is used to render graphical transition effects leading to the secondary view.
摘要:
Methods and arrangements are provided for utilizing a secondary application to render invitational content. Primary content rendered by a web browser can be embedded with a command requesting that a secondary application be executed. The secondary application can be executed in a secured sand box environment and configured to render invitational content in a second window above the primary content. The secondary application can be known and trusted by the operating system to gather sensitive data used to select appropriate invitational content. Further, data can be included in the command requesting that the secondary application be executed. The invitational content can be associated with secondary views that can be rendered without affecting the primary content. The secondary application can collect data to render the secondary view, such as the exact point selected, which is used to render graphical transition effects leading to the secondary view.
摘要:
Methods and apparatus that receive, at a wireless device, power through wire or inductive pad are described. The received power is monitored to back up data from the device to a server in a network through an OTA (over the air) wireless interface. The data is transmitted to the server to back up the data on the device. While backing up the data, whether the power has been removed from the device is determined. The backing up of the data in the device can be terminated automatically and without user request, in response to the determination that the power has been removed.
摘要:
Methods and apparatus that receive, at a wireless device, power through wire or inductive pad are described. The received power is monitored to back up data from the device to a server in a network through an OTA (over the air) wireless interface. The data is transmitted to the server to back up the data on the device. While backing up the data, whether the power has been removed from the device is determined. The backing up of the data in the device can be terminated automatically and without user request, in response to the determination that the power has been removed.