摘要:
A system and method are disclosed for pairing computing devices using an authentication protocol that allows an initiating computing device to gain access to a secure, encrypted network of a target computing device.
摘要:
A proximity network architecture is proposed that enables a device to detect other devices in its proximity and automatically interact with the other devices to share in a user experience. In one example implementation, data and code for the experience is stored in the cloud so that users can participate in the experience from multiple and different types of devices.
摘要:
A license to use content (e.g., a movie, song, application, etc.) is provided to a consumer. The license allows for use of the content by the device the consumer is using (e.g., logged into) and devices near the device the consumer is using. For example, a first computing device obtains a license to restricted content. A second computing device obtains a copy of the restricted content; however, the second computing device is not licensed to use the content and may not be able to access the content because the content is encrypted or otherwise restricted. The first computing device is brought into proximity with the second computing device. In response to detecting that the first computing device is in proximity with the second computing device, the second computing device is provided with legal access to the restricted content. The second computing device can then decrypt (or otherwise access) and play the content.
摘要:
A license to use content (e.g., a movie, song, application, etc.) is provided to a consumer. The license allows for use of the content by the device the consumer is using (e.g., logged into) and devices near the device the consumer is using. For example, a first computing device obtains a license to restricted content. A second computing device obtains a copy of the restricted content; however, the second computing device is not licensed to use the content and may not be able to access the content because the content is encrypted or otherwise restricted. The first computing device is brought into proximity with the second computing device. In response to detecting that the first computing device is in proximity with the second computing device, the second computing device is provided with legal access to the restricted content. The second computing device can then decrypt (or otherwise access) and play the content.
摘要:
A backup system has a set of temporary backup data stored on a data storage system. When performing a backup operation for a device over a network, a block of data on the device may be compared to blocks of the temporary backup data. If the block of data already exists on the backup system in the temporary backup data, the block of data is not transferred over the network. Comparisons between blocks of data may be performed by calculating and comparing a hash value for the blocks.
摘要:
Described is a headless server appliance configured with a secondary actuation mechanism that when actuated, enters the headless server appliance into a diagnostic mode. For example, the diagnostic mode may correspond to a secondary operating system booted from a BIOS component activated by the secondary actuation mechanism. In the diagnostic mode, primitives may be communicated between a client device coupled (e.g., via a network or USB connection) to the headless server appliance, such as to provide the client device with access to the headless server appliance's hard disk. Other primitives, such as communicated via APIs, may provide the client device with access to the BIOS. The secondary operating system and/or client device may perform diagnostics and recovery operations on the headless server appliance. For example, the client device or similar source may restore or update the primary operating system image to a storage medium of the headless server appliance.
摘要:
A system automatically and continuously finds and aggregates the most relevant and current information about the people and things that a user cares about. The information gathering is based on current context (e.g., where the user is, what the user is doing, what the user is saying/typing, etc.). The result of the context based information gathering is presented ubiquitously on user interfaces of any of the various physical devices operated by the user.
摘要:
One or more techniques and/or systems are disclosed for improving location awareness of a device. A device position can be determined (e.g., via GPS or some location service), and this position can be used to identify a user-experience that may be in an area around the device, such as within a desired position threshold. A near-field radio system beacon that is associated with the user-experience can be activated in order to identify a distance of the device from the beacon. The beacon can use a near-field radio system ID associated with the device to identify the device, and determine a distance to the device. When a user moves the device to within a threshold distance from the beacon, the user-experience can be activated on the device, such that the user may interact with the user-experience (e.g., to hear a description of artwork as the user navigates through a museum).
摘要:
A client/server distribution system for applications, media, messages, and other items operates by distributing a list of items to client devices, then the client devices may generate a user interface that reflects the availability of the items based on the capabilities of the device and permissions of the user. The distribution system may distribute media for consumption on the clients, applications that may be executed on the server, messages for status and other purposes. Each item may have an associated application that may be launched from the user interface, and the client devices may customize the launch script or other configuration based on the characteristics of the client device and permissions of the user.
摘要:
A novel application and user interface for facilitating group interactions over a network integrates messaging, file sharing, media playing, journaling, profiles, and gaming into a cohesive environment. The groups facilitated by the invention are persistent and mobile in that a user does not have to recollect and reconfigure the group each time he or she wants to interact with the group online and, while online, the group may be taken from one activity to another without having to disband and reconnect at the second activity. The application is modular so as to be extensible to include other activities and functionalities. In an embodiment, the group interaction application utilizes a peer-to-peer network environment to facilitate network communications between group members.