摘要:
An operating system provides an extensible share action to broker content sharing between applications executing on a computing platform such as a personal computer, tablet computer, or smartphone. The share action enables a consistent user experience for content sharing to be implemented across all applications and eliminates users having to switch from the current application they are using to some other functionality in order to share content. Applications can participate with the operating system share action as source applications and/or target applications. Source applications may describe what content is shareable given the current state of their application when the user chooses to invoke the share action. Target applications can be configured to receive the shared content from the source application according to content type, and will expose a companion view of their application to the user that is specifically tailored to facilitate sharing.
摘要:
An operating system provides an extensible share action to broker content sharing between applications executing on a computing platform such as a personal computer, tablet computer, or smartphone. The share action enables a consistent user experience for content sharing to be implemented across all applications and eliminates users having to switch from the current application they are using to some other functionality in order to share content. Applications can participate with the operating system share action as source applications and/or target applications. Source applications may describe what content is shareable given the current state of their application when the user chooses to invoke the share action. Target applications can be configured to receive the shared content from the source application according to content type, and will expose a companion view of their application to the user that is specifically tailored to facilitate sharing.
摘要:
A user interface is configured to identify and display each of the one or more service providers servicing the user's computing system. The interface also identifies the presence information that is being supplied to the service providers by the user's computing system for publication. The presence information that is provided to the service providers can include, but is not limited to, the name, alias, location, and network status of the user. A user can make global or discrete customized changes to the presence information that is provided to each of the service providers through the user interface. Modifications made to the presence information can also be made automatically to reflect a new condition or status in the user's presence on a network that is provided by a service provider.
摘要:
Methods, systems, and computer program products for tracking real-time communication data within a single contact tracking application for diverse communication providers and applications. A global data store is synchronized with real-time communication data, such as presence, status, unread messages, and unread notifications, from each application/provider. Real-time communication data for contacts dynamically determined to be recent contacts is retrieved from the data store, based on properties such as a most recent communication time, a communication count, and the like. Real-time communication data corresponding to contacts identified as pinned contacts for which display of real-time communication data is preferred, also may be retrieved. A user interface is generated for displaying the one or more recent and/or pinned contacts, which may vary in size based on the number of contacts identified as pinned contacts, from which a contact may be selected for real-time conversation or e-mail.
摘要:
Systems and methods for switching from a first Internet context to a second Internet context without process shutdown are described. Internet context data, such as cookies, history and user-defined data, is stored in containers unique to each user on a system. Internet content is stored in a common location so redundant downloaded information is not stored. Content information is found or stored by hashing a URL and indexing the memory location according to the resulting hash value. If content data is specific to a particular user, a hash is performed on a combination of the URL and an ordinal associated with the user's unique identity to obtain a hash value unique to the user. The user-specific content is then stored and the memory location is indexed according to the unique hash value.
摘要:
A file system shell is provided. One aspect of the shell provides virtual folders which expose regular files and folders to users in different views based on their metadata instead of the actual physical underlying file system structure on the disk. Users are able to work with the virtual folders through direct manipulation (e.g., clicking and dragging, copying, pasting, etc.). Filters are provided for narrowing down sets of items. Quick links are provided which can be clicked on to generate useful views of the sets of items. Libraries are provided which consist of large groups of usable types of items that can be associated together, along with functions and tools related to the items. A virtual address bar is provided which comprises a plurality of segments, each segment corresponding to a filter for selecting content. A shell browser is provided with which users can readily identify an item based on the metadata associated with that item. An object previewer in a shell browser is provided which is configured to display a plurality of items representing multiple item types.
摘要:
Systems and methods for switching from a first Internet context to a second Internet context without process shutdown are described. Internet context data, such as cookies, history and user-defined data, is stored in containers unique to each user on a system. Internet content is stored in a common location so redundant downloaded information is not stored. Content information is found or stored by hashing a URL and indexing the memory location according to the resulting hash value. If content data is specific to a particular user, a hash is performed on a combination of the URL and an ordinal associated with the user's unique identity to obtain a hash value unique to the user. The user-specific content is then stored and the memory location is indexed according to the unique hash value.