摘要:
Viral application distribution facilitates distribution of an application among users and increases likelihood of downloading the application by the users. A first device may receive information of an application from a second device through a short-range communication channel. The information may comprise identification information of the application without any personally identifiable information of the second device to protect privacy of a user of the second device. A version of the application that is compatible with the first device is determined by searching a catalog using the identification information of the application. The compatible version of the application may then be downloaded or obtained by the first device. Location-based viral distribution may also be performed between devices that visit a location, even at different times.
摘要:
Viral application distribution facilitates distribution of an application among users and increases likelihood of downloading the application by the users. A first device may receive information of an application from a second device through a short-range communication channel. The information may comprise identification information of the application without any personally identifiable information of the second device to protect privacy of a user of the second device. A version of the application that is compatible with the first device is determined by searching a catalog using the identification information of the application. The compatible version of the application may then be downloaded or obtained by the first device. Location-based viral distribution may also be performed between devices that visit a location, even at different times.
摘要:
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network.
摘要:
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network.
摘要:
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network.
摘要:
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network.
摘要:
The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without compromising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near field communication link to secure a wireless connection for the device to the network.
摘要:
Technologies for transient personal preference customization of environments, devices and systems based on user preference data. Such technologies enable users to maintain personal preference data on mobile or other devices, such as cell phones, personal data assistants (“PDA”), or the like, such that the data can be transferred to devices and systems capable of conforming parameters under their control to the preferences expressed in the data. For example, a frequent traveler may define preferences regarding room temperature, ambient lighting, music style, and the like and maintain these preferences in a mobile device such as a cell phone. Upon arrival at a hotel room, for example, the systems of the hotel may access the preference data and adjust the parameters of the room, and the devices and systems in the room, to conform to the user's preferences while the user is in the room or checked into the hotel. Such customization may be transient in that parameters may be returned to a default or other setting once a user is no longer present, or when another user is present.
摘要:
Various technologies described herein pertain to sharing Wi-Fi credentials based upon relationships in a computer-implemented social network. At least one server computing device of a Wi-Fi credential sharing service receives an identifier from a mobile device and credentials for a Wi-Fi network from the mobile device. The identifier identifies a user of the mobile device. Moreover, the credentials for the Wi-Fi network are desirably shared by the user. Further, contacts of the user are retrieved from the social network. The credentials for the Wi-Fi network are retained in respective accounts of the contacts of the user from the social network. Further, an account of a contact includes credentials for Wi-Fi networks shared with the contact.
摘要:
Technology for use with computing devices, particularly mobile devices and wireless networks supporting federation, enabling people, devices, systems, or the like to join together in electronic federations for purposes of voting or the like. The votes in such voting situations may be weighted based on various criteria associated with the voter, the subject of the vote, and/or other criteria relevant to the voting scenario. The technology also enables users to monitor a voting scenario in real-time and tailor their own voting or decisions or the like to the scenario, even as it unfolds.