Abstract:
A first set of posts associated with a verified entity can be identified. A second set of posts associated with the verified entity and with one or more particular topics can be identified. At least a first subset of the first set of posts and at least a second subset of the second set of posts can be ranked to produce a ranked set of posts that are associated, at least in part, with the verified entity. The verified entity can be provided with access to at least some posts in the ranked set of posts. Moreover, a canonical post authored by a verified entity can be identified. It can be determined that one or more subsequent posts have at least a specified threshold level of relevance with respect to the canonical post. The verified entity can be provided with access to the one or more subsequent posts.
Abstract:
A computer system allows two devices operated by two users from a plurality of trusted users to establish a direct peer to peer limited range wireless connection based on a social network connection between the users. The first client device associated with a first user receives a list of the plurality of trusted users from the computer system. The first client device receives a limited range signal broadcast by a second client device. The first client device determines that the second client device is associated with a second user from the plurality of trusted users based on the list and the limited range signal. Responsive to determining that the second client device is associated with the second user from the plurality of trusted users, the first client device establishes a direct peer to peer wireless connection. The first client device transmits content to the second client device via the peer to peer wireless connection.
Abstract:
A first set of posts associated with a verified entity can be identified. A second set of posts associated with the verified entity and with one or more particular topics can be identified. At least a first subset of the first set of posts and at least a second subset of the second set of posts can be ranked to produce a ranked set of posts that are associated, at least in part, with the verified entity. The verified entity can be provided with access to at least some posts in the ranked set of posts. Moreover, a canonical post authored by a verified entity can be identified. It can be determined that one or more subsequent posts have at least a specified threshold level of relevance with respect to the canonical post. The verified entity can be provided with access to the one or more subsequent posts.
Abstract:
A computer system allows two devices operated by two users from a plurality of trusted users to establish a direct peer to peer limited range wireless connection based on a social network connection between the users. The first client device associated with a first user receives a list of the plurality of trusted users from the computer system. The first client device receives a limited range signal broadcast by a second client device. The first client device determines that the second client device is associated with a second user from the plurality of trusted users based on the list and the limited range signal. Responsive to determining that the second client device is associated with the second user from the plurality of trusted users, the first client device establishes a direct peer to peer wireless connection. The first client device transmits content to the second client device via the peer to peer wireless connection.
Abstract:
Systems, methods, and non-transitory computer readable media are configured to evaluate, by a computing system associated with a user, a sharing policy associated with a media content item. It is determined whether provision of the media content item to a second computing system associated with a second user is permissible under the sharing policy. The media content item is transmitted to the second computing system in a peer to peer manner when the provision is permissible under the sharing policy.