摘要:
There is provided a method and system for an approval based economy. The method comprises, receiving input corresponding to media content associated with a user, determining a number of approval units corresponding to the input, retrieving a user account associated with the user, and saving the approval units in the user account. The user account may include past approval units and an approval total. The approval total may account for the approval units and the past approval units, the approval units and the past approval units of active users and available media content only, or a maximum lifetime total of active users and available media content only. The approval based economy may provide new media content to users based on their respective approval total in their user account.
摘要:
There is provided a method and system for an approval based economy. The method comprises, receiving input corresponding to media content associated with a user, determining a number of approval units corresponding to the input, retrieving a user account associated with the user, and saving the approval units in the user account. The user account may include past approval units and an approval total. The approval total may account for the approval units and the past approval units, the approval units and the past approval units of active users and available media content only, or a maximum lifetime total of active users and available media content only. The approval based economy may provide new media content to users based on their respective approval total in their user account.
摘要:
Techniques are disclosed for supplying users in an online environment with a safe and effective chat facility. The chat facility is “safe” in the sense that the ability of users to compose inappropriate messages is greatly restricted, while “effective” in the sense that users are still allowed a broad range of expressivity in composing and exchanging chat messages.
摘要:
When using a clipboard or drag-and-drop interface of a graphical computer interface, a source application includes trust information along with data that is proffered to a target application. The target application conditions its acceptance of such data based on the trust information.
摘要:
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate during a negotiation of a secure session between a local device and a remote device. The certificate includes security information about a site maintained at the remote device. The security information is displayed to a user of the browsing software in a meaningful fashion to allow the user to make a trust determination about the site. Displaying the security information may include presenting a certificate summary that includes the most relevant information about the certificate, such as the name of the owner of the site and the name of the certificating authority of the certificate.
摘要:
Techniques are disclosed for presenting information related to a user's friends within a virtual environment. For example, when a user requests to view a friends list, the virtual environment may respond by identifying interactions between that user and their friends. From this, the virtual environment may determine an order to present the users in the list. For example, individual with whom the user interacts with frequently may be more prominently displayed. However, the user may fix or “pin” the position of certain users (e.g., a close friend with whom contact is infrequent). Further, in addition to displaying friends' names, the list may display an animation of a user's friend generated based on the then current activity, location, or appearance of that friend within a virtual environment.
摘要:
Techniques are disclosed that allow a user to efficiently move their online presence from a current location in a virtual world to a target location near a friend or character. The target location may be in another instance of the virtual world or in another virtual world. Further, the movement of the user—referred to as a jump—may be in response to a request from the user to jump their online presence to the target location of a friend or character. In the other direction, a user can send a “jump to me” request to their friends.
摘要:
In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege level that can prohibit the application from accessing portions of an associated computing device. For example, in some embodiments, the restricted process can prohibit applications from read and write access to portions of a system's computer-readable media, such as the hard disk, that contains administrative data and settings information and user data and settings. In these embodiments, a special portion of the disk, termed a “containment zone”, is designated and used by applications in this restricted process.
摘要:
Techniques for receiving user feedback for an instance of content. Embodiments provide an interface that includes an interactive element through which users can provide feedback for an instance of content. Responsive to a first user interacting with the interactive element, an indication of user feedback from the first user is registered for the instance of content, and the interactive element within the interface is disabled for the first user. Embodiments monitor the instance of content to detect changes to the instance of content. Additionally, upon detecting a change to the instance of content, the interactive element is enabled for the first user, such that the first user can again interact with the interactive element.
摘要:
In various embodiments, applications that are configured to interact with the Internet in some way are executed in a restricted process with a reduced privilege level that can prohibit the application from accessing portions of an associated computing device. For example, in some embodiments, the restricted process can prohibit applications from read and write access to portions of a system's computer-readable media, such as the hard disk, that contains administrative data and settings information and user data and settings. In these embodiments, a special portion of the disk, termed a “containment zone”, is designated and used by applications in this restricted process.