Abstract:
A method of providing particular account configurations to a user of a mobile device based on a predetermined account configuration offering between a mobile device manufacturer and a third-party service provider based on a code stored on the mobile device. During the out-of-box experience (OOBE) when the user is initially configuring the mobile device, the third-party provider receives user information, a code, and a mobile device identification number. The third-party service provider confirms that the mobile device is eligible for the particular account configuration by using the code and mobile device identification number. Once account configuration eligibility is confirmed, the third-party service provider associates the particular account configuration with either an existing user account or with a new user account established during the OOBE.
Abstract:
Systems, methods, and computer-readable storage media for analyzing the recorded interactions of users within a shared dataspace, where the shared dataspace is provided by an a synced online content management system. As each user adds and deletes files in the shared dataspace, the content management system can record each interaction. The content management system can then analyze the recorded interactions, creating collapsed summaries of the interactions, and generate notifications that can be presented to users. Various thresholds can be used to determine when the recorded interactions are condensed, and when notifications associated with those condensed interactions are presented to users.
Abstract:
A system and method for detecting and accounting for the improper use of a deal code on a mobile device. When the user initially configures the mobile device, the third-party provider receives information from the mobile device that includes user information, mobile device information, a deal code associated with a third-party service, information about an application program preloaded on the mobile device associated with the service, and a hash value that is at least partially calculated based on the foregoing. The third-party service provider calculates a second hash value at least partially based on the received information and based on other predetermined information and compares the first hash value to the second hash value. Based on the comparison, the system determines if use of the deal code is improper and, if so, tracks the user and mobile device information to prevent improper use of the deal code.
Abstract:
Systems, methods, and computer-readable storage media for analyzing the recorded interactions of users within a shared dataspace, where the shared dataspace is provided by an a synced online content management system. As each user adds and deletes files in the shared dataspace, the content management system can record each interaction. The content management system can then analyze the recorded interactions, creating collapsed summaries of the interactions, and generate notifications that can be presented to users. Various thresholds can be used to determine when the recorded interactions are condensed, and when notifications associated with those condensed interactions are presented to users.
Abstract:
A portable computing device with methodologies for client-side analytic data collection are described. In one embodiment, for example, a method performed by a portable computing device having non-volatile memory includes the steps of obtaining event information reflecting runtime behavior of an application executing on the portable computing device; cryptographically encrypting the event information; storing the encrypted event information in the non-volatile memory; decrypting the encrypted event information; and sending the decrypted event information to a server over a data network, the decrypted event information encapsulated in a cryptographically secured network data stream when sent over the data network to the server.
Abstract:
Disclosed are systems, methods, and computer-readable storage media for enhancing event summaries of synced online content management system interactions. Users can identify one or more of the collapsed events markers that have pointers to the original, uncondensed, event markers. Upon identifying the one or more collapsed event markers, users can add additional data, via the pointers, to the original, uncondensed, event markers that were used to generate the collapsed event marker. The content management system can then perform a new analysis of the shared dataspace, analyzing the event markers using pre-existing data and the newly added data to create additional collapsed event markers, modify previously generated collapsed event markers, or remove/replace collapsed event markers. These enriched collapsed event markers can then newly presented to the user.
Abstract:
A portable computing device with methodologies for client-side analytic data collection are described. In one embodiment, for example, a method performed by a portable computing device having non-volatile memory includes the steps of obtaining event information reflecting runtime behavior of an application executing on the portable computing device; cryptographically encrypting the event information; storing the encrypted event information in the non-volatile memory; decrypting the encrypted event information; and sending the decrypted event information to a server over a data network, the decrypted event information encapsulated in a cryptographically secured network data stream when sent over the data network to the server.
Abstract:
Disclosed are systems, methods, and computer-readable storage media for enhancing event summaries of synced online content management system interactions. Users can identify one or more of the collapsed events markers that have pointers to the original, uncondensed, event markers. Upon identifying the one or more collapsed event markers, users can add additional data, via the pointers, to the original, uncondensed, event markers that were used to generate the collapsed event marker. The content management system can then perform a new analysis of the shared dataspace, analyzing the event markers using pre-existing data and the newly added data to create additional collapsed event markers, modify previously generated collapsed event markers, or remove/replace collapsed event markers. These enriched collapsed event markers can then newly presented to the user.
Abstract:
A portable computing device with methodologies for client-side analytic data collection are described. In one embodiment, for example, a method performed by a portable computing device having volatile and non-volatile memory includes obtaining a plurality of events to be logged; serializing the events to be logged; storing the serialized events in the volatile memory; encrypting the serialized events to produce serialized and encrypted events; storing the serialized and encrypted events in the non-volatile memory; decrypting the serialized and encrypted events to produce serialized and decrypted events; storing the serialized and decrypted events in the volatile memory; compressing the serialized and decrypted events to produce compressed, serialized, and decrypted events; encrypting the compressed, serialized, and decrypted events to produce encrypted, compressed, and serialized events and storing the encrypted, compressed, and serialized events in the non-volatile memory.
Abstract:
A client device can be configured to perform a local index search and a server index search to automatically identify and upload content items on the client device that have not been uploaded to an online content management system. A local index search can include creating a unique local identifier of a content item and searching a local upload index that includes the unique local identifier of each content item that has been uploaded. A server index search can include creating a unique server identifier of the content item and searching a server upload index that includes the unique server identifier of each content item stored on the online content management system. Content items that are determined to have not been uploaded to the online content management system based on the results of the two searches, can be uploaded to the content management system by the client device.