摘要:
A system and related techniques prepare and condition the installation of new networked service or application components, such as Internet services, based on an individual subscriber's subscribed-to services, features and other components. A subscriber to an Internet service may choose to add, for example, a componentized subscription to a music or video download service to their access plan. When the user inserts a CDROM or accesses a Web site for installation, the user may be prompted for a username or passport-type object to authenticate their account. The user may then be presented with a set of available service selections, extensions or enhancements to choose to add to their plan. Those available selections may be prefiltered or prequalified, for example, based on geographic location, account spending or access limits, language or other criteria. Because the installation engine delivers components which are intelligently filtered at time of installation, the service components or applications can be tailored to that specific user's needs and options, instead of downloading or installing a monolithic package which may contain services not available or of interest to that user.
摘要:
Method and computer storage media for sharing resources between a plurality of computing devices associated with a common non-enterprise network. A common set of credentials is stored on at least two or more of a plurality of computing devices that reside behind a routing device and are associated through a common non-enterprise network. Upon storing the common set of credentials, each of the two or more of a plurality of computing devices create a local account that contains, at least, the common set of credentials. The common set of credentials allow for the sharing, among the two or more of the plurality of computing devices, of resource that reside on or are associated with the computing devices.
摘要:
Systems and methods are provided for defining a default handler software application in response to an event at a computer. An event, for example, a user opening a file with a specific extension or accessing a uniform resource locator (URL) with a specific protocol, may trigger the operating system to instantiate a user-level default handler program associated with the event type and the specific user. Users may define user-level default handlers through a centralized user interface maintained by the operating system. During the application installation process, an application may register lists of supported events that the application is capable of handling.
摘要:
Computer-readable media, computer-readable media, computerized methods, and computer systems for acting on properties of multiple resources, which span disparate locations within a network, upon detecting an intuitive user-initiated operation are provided. Initially, a library is provided that includes a framework for contemporaneously accessing a collection of items within a scope thereof. Upon launching the library, representations of the scoped items are surfaced at a UI display. When the user-initiated operation is applied at one of the surfaced representations, properties of each of the scoped items are automatically manipulated. A library-configuration state, which reflects how the items are affected upon manipulating the properties thereof, may be updated upon implementing the manipulation. Accordingly, if the scope of the library is subsequently extended to encompass another item outside the original collection of items, the properties of this new item are automatically manipulated to align with the library-configuration state.
摘要:
Embodiments of the present invention relate to systems and methods for configuring computing devices to join a peer group. A peer group may be created on a subnetwork by a computing device. When a new computing device enters the subnetwork, it may join the peer group and be given access to the shared resources on the peer group and associated computing devices, using a communications layer and an authorization layer. Allowing a new computing device to join a peer group includes inviting the new device to join and then challenging the device for a passkey of the peer group. After joining the peer group, the computing device will be able to access and share resources with the peer group and other computing devices associated with the peer group.
摘要:
A method, system, and medium are provided for sharing items residing on a computing device. Items selected for sharing can be made simultaneously available to users on a local network and to users outside of the local network. A remote sharing service allows access to copies of items based on user identifiers associated. Local attributes associated with items are modified such that the user identifiers are associated with the items for providing access via a local network.
摘要:
Computer-readable media, computerized methods, and computer systems for acting on properties of multiple resources, which span disparate locations within a network, upon detecting an intuitive user-initiated operation are provided. Initially, a library is provided that includes a framework for contemporaneously accessing a collection of items within a scope thereof. Upon launching the library, representations of the scoped items are surfaced at a UI display. When the user-initiated operation is applied at one of the surfaced representations, properties of each of the scoped items are automatically manipulated. A library-configuration state, which reflects how the items are affected upon manipulating the properties thereof, may be updated upon implementing the manipulation. Accordingly, if the scope of the library is subsequently extended to encompass another item outside the original collection of items, the properties of this new item are automatically manipulated to align with the library-configuration state.
摘要:
Embodiments of the present invention relate to systems and methods for configuring computing devices to join a peer group. A peer group may be created on a subnetwork by a computing device. When a new computing device enters the subnetwork, it may join the peer group and be given access to the shared resources on the peer group and associated computing devices, using a communications layer and an authorization layer. Allowing a new computing device to join a peer group includes inviting the new device to join and then challenging the device for a passkey of the peer group. After joining the peer group, the computing device will be able to access and share resources with the peer group and other computing devices associated with the peer group.