摘要:
Systems and methods of the present invention provide for detecting and mitigating abuse of unsolicited email or “spam.” An administrator may select one or more contacts from a list of contacts to opt in to receive an email distribution. An abuse detection software may then determine for each contact in the contact list whether the contact has read the email distribution and reported the email distribution as an unsolicited email message. If so, an abuse department may place a hold on the email distribution (possibly using abuse mitigation software) and display an alert referring the administrator to the abuse department for review of the account. Otherwise, the email distribution may continue to completion.
摘要:
Systems and methods of the present invention provide for detecting and mitigating abuse of undeliverable email or “bounced” emails. An administrator may import a list of email addresses for one or more contacts. The opt-in software may determine if each email address in the list of email addresses is opted in to receive an email distribution, and if so, a bounce detection software may determine if each email address is found in a database of known undeliverable or “bounced” email addresses. If so, an abuse-mitigation software may defer importing the list of email addresses and display an alert referring the administrator to an abuse department for review of the account. A message-delivery software may deliver the email distribution, and the bounce detection software may then determine whether undeliverable emails in the email distribution exceed one or more “bounce limit rules,” and if so, the abuse mitigation software may delay delivery of the email distribution and display an alert referring the administrator to the abuse department for review of the account. Otherwise, delivery may continue to completion.
摘要:
Systems and methods of the present invention provide for detecting and mitigating abuse of undeliverable email or “bounced” emails. An administrator may import a list of email addresses for one or more contacts. The opt-in software may determine if each email address in the list of email addresses is opted in to receive an email distribution, and if so, a bounce detection software may determine if each email address is found in a database of known undeliverable or “bounced” email addresses. If so, an abuse-mitigation software may defer importing the list of email addresses and display an alert referring the administrator to an abuse department for review of the account. A message-delivery software may deliver the email distribution, and the bounce detection software may then determine whether undeliverable emails in the email distribution exceed one or more “bounce limit rules,” and if so, the abuse mitigation software may delay delivery of the email distribution and display an alert referring the administrator to the abuse department for review of the account. Otherwise, delivery may continue to completion.
摘要:
A touch screen input device is provided which simulates a 3-state input device such as a mouse. One of these states is used to preview the effect of activating a graphical user interface element when the screen is touched. In this preview state touching a graphical user interface element on the screen with a finger or stylus does not cause the action associated with that element to be performed. Rather, when the screen is touched while in the preview state audio cues are provided to the user indicating what action would arise if the action associated with the touched element were to be performed.
摘要:
An interactive multimedia presentation has an interactive content component that includes an application, which has instructions for rendering a media object. By nesting a declarative language event instruction inside of a declarative language timing instruction, a particular event can arise and/or be handled (for example, a media object is rendered) only within a time interval specified by the timing instruction. The event instruction specifies when a particular event (such as a user event, a system event, a document object event, or another type of event) arises. When the event arises during the time interval, the event may be handled. Outside of the time interval, even if the event arises, the event is not handled. In this manner, responses to the event are constrained to happen in the time interval, and events that are not handled within a certain time may be ignored.
摘要:
An interactive multimedia presentation has a predetermined presentation play duration, a video content component (which may include video, audio, data, or any combination thereof), and an interactive content component. Methods and systems for playing the presentation include specifying a time when a particular media object is renderable. The time is specifiable using an application instruction that references either a first timing signal having a rate that is based on the play speed of the presentation, or a second timing signal having a continuous rate. One example of an application instruction usable as described above is an element associated with an XML data structure. An attribute of the element, such as the clock attribute, may be used to provide time values for the element that reference either timing signal. The attribute is used to maintain frame-accurate synchronization between the video and the interactive content components of the presentation.
摘要:
Braille symbols are automatically read aloud, to aid in learning or using Braille. More generally, a tile which bears a tactile symbol and a corresponding visual symbol is placed in a sensing area, automatically distinguished from other tiles, and vocalized. The tile is sensed and distinguished from other tiles based on various signal mechanisms, or by computer vision analysis of the tile's visual symbol. Metadata is associated with the tile. Additional placed tiles are similarly sensed, identified, and vocalized. When multiple tiles are placed in the sensing area, they are vocalized individually, and an audible phrase spelled by their arrangement of tactile symbols is also produced. A lattice is provided with locations for receiving tiles. Metadata are associated with lattice locations. Tile placement is used to control an application program which responds to tile identifications.
摘要:
An interactive multimedia presentation playable by a presentation system includes a media content component and an interactive content component. The interactive content component includes one or more applications, which provide instructions for organizing, formatting, and synchronizing the presentation of interactive objects to a user. Prior to playing the interactive multimedia presentation, an entity responsible for authoring or publishing one or more of the applications is digitally identified and authenticated, or it is determined that the applications are unsigned. Prior to and/or during play of the interactive multimedia presentation, authorization for performing certain actions (such as executing certain application instructions, especially those that access functionality of the presentation system, computer-readable media, or external networks) is granted via a permission-based model. User input and application requests may be considered in determining whether an application is granted permission to perform certain actions.
摘要:
Using declarative language application instructions, actions associated with playing interactive content of an interactive multimedia presentation are triggered based on a state change of a particular media object. Certain application instructions specify the characteristic of the media object, while other application instructions specify the actions associated with playing the interactive content (for example, when media objects are renderable, event generation, script execution, or changes in variables) based on a state change of the characteristic. The state change is detected by querying a structured representation of the application such as a document object model, which includes nodes associated with the application instructions, the media object, and/or the characteristic. When state changes are detected, one or more of the specified actions are triggered to thereby declaratively respond to the state change. In an illustrative example, the state changes are tracked using attributes which include foreground, focused, pointer, actioned, enabled, and value.
摘要:
Systems and methods of the present invention provide for publishing an announcement of a registered domain name and a link to an associated website on a social networking website. A control panel for the registered domain name and associated website may be displayed on a client.