摘要:
A computing device may be configured to allow a shopper to interact with one or more displays in a retail environment. A perception device may detect human actions in the retail environment and the shopper may be able to use human movements to navigate through retail data and have it displayed on the display device in the retail environment.
摘要:
A portable computing device may be configured to allow a user to interact with one or more displays in a retail environment. The portable computing device may establish a communication link with a communication device in the retail environment and the user may be able to use the portable computing device to navigate through retail data and have it displayed on the display device in the retail environment.
摘要:
A portable computing device may be configured to allow a user to interact with one or more displays in a retail environment. The portable computing device may establish a communication link with a communication device in the retail environment and the user may be able to use the portable computing device to navigate through retail data and have it displayed on the display device in the retail environment.
摘要:
The claimed subject matter relates to architectures for facilitating network-accessible or local backup or restore features in a manner that leverages event-oriented contextual information associated with one or more users of the data to be backed up or restored. In particular, a first restore-based architecture can interface with an associated second backup-based architecture that hosts or maintains a backup data store in order to retrieve a version of the data file that is desired by a user. Additionally, the first architecture can obtain a log of contextual event descriptions that can be aggregated by the second architecture or obtained independently from, e.g. a social networking service or a calendar application associated with the user. Thus, in addition to displaying time and date information associated with the desired version, the first architecture can provide the user with a social context of event from the social services feeds to aid the user in distinguishing between multiple versions of the data file.
摘要:
The claimed subject matter relates to architectures for facilitating network-accessible or local backup or restore features in a manner that leverages event-oriented contextual information associated with one or more users of the data to be backed up or restored. In particular, a first restore-based architecture can interface with an associated second backup-based architecture that hosts or maintains a backup data store in order to retrieve a version of the data file that is desired by a user. Additionally, the first architecture can obtain a log of contextual event descriptions that can be aggregated by the second architecture or obtained independently from, e.g. a social networking service or a calendar application associated with the user. Thus, in addition to displaying time and date information associated with the desired version, the first architecture can provide the user with a social context of event from the social services feeds to aid the user in distinguishing between multiple versions of the data file.
摘要:
Described is a virtual environment built by drawing stacks of three-dimensional objects (e.g., discrete blocks) as manipulated by a user. A user manipulates one or more objects, resulting in stack heights being changed, e.g., by adding, removing or moving objects to/from stacks. The stack heights are maintained as sample points, e.g., each point indexed by its associated horizontal location. A graphics processor expands height-related information into visible objects or stacks of objects by computing the vertices for each stack to draw that stack's top surface, front surface and/or side surface based upon the height-related information for that stack. Height information for neighboring stacks may be associated with the sample point, whereby a stack is only drawn to where it is occluded by a neighboring stack, that is, by computing the lower vertices for a surface according to the height of a neighboring stack where appropriate.
摘要:
Techniques for content customization with security for client preferences are described herein. The techniques describe the customization of content provided by websites according to preferences, such as the interests, “likes” and demographic and/or geographic information of users. Additional techniques describe aspects of keeping the users' preferences secure from the website, so that the users' privacy and anonymity are protected. In one implementation, a “trusted entity” is trusted by users to obtain and store the preferences. Content may be obtained by the trusted entity from a content provider, such as a website. The content may be changed according to the preferences. The content is then provided to the users. In view of the changes made by the trusted entity, the user enjoys a customized version of the content. Additional techniques describe limits to customization, based on permissible customizations and frameworks generated by the content providers.
摘要:
A suggestive mapping device may predict, suggest, and/or provide potential destinations to a user. Additionally, the device may store historical location data of the user, determine a travel vector of the user, and predict the destination of the user based at least in part on the historical location data and/or the travel vector. Further, the device may provide hands-free maps to destinations when the user does not know the address at least by receiving contextual data of the user and/or contextual data of the user's contacts. Such hands-free, suggestive mapping devices may facilitate more effective navigation.
摘要:
A unified search service may collect information related to an enterprise from at least one of publicly available data and private enterprise data. In some implementations, crowd sourcing may be used to determine a source list of one or more sources of information. Authored content can be generated, such as by combining one or more items of information from the public data with one or more items of information from the private enterprise data. Further, in some implementations, a public index may be generated from the public data, and one or more affiliation indexes may be generated from the private enterprise data. For example, a first affiliation index may contain confidential enterprise information, while a second affiliation index may contain non-confidential enterprise information. A user's affiliation to the enterprise may be taken into consideration when determining which indexes to use when responding to a search request from the user.
摘要:
A metadata management architecture. The architecture includes a property component that lists one or more properties related to a file, and a viewing component that present files having one or more of the related properties. A synchronization component provides immediate synchronization between property editing fields of the property component and a view in the property-based browser component, providing both instantaneous feedback on property changes and an ability to manipulate properties graphically. Thus, a change in the property pane is immediately reflected in the view component, and a change in the view component is immediately reflected in the property pane.