Abstract:
A sandboxed process is initiated in response to a request for a preview of dynamic media content. A stream of frames is generated in a preview specific format by a plug-in that executes within the sandboxed process. The stream of frames is provided as the preview of the dynamic media content, where the preview is viewable on a display screen.
Abstract:
In some implementations, a computing device may configure a new device based on a current state of an old device, including settings, preferences, and other user data. The data may be transferred from the old device to the new device, and then relocated according to a manifest that details positions of the data on the old device. The destination device may be rebooted into a configuration mode to allow for the relocation of the transferred data, and then rebooted again to configure the destination device to provide access to the data in its respective relative locations on the destination device.
Abstract:
In some implementations, a computing device may configure a new device based on a current state of an old device, including settings, preferences, and other user data. The data may be transferred from the old device to the new device, and then relocated according to a manifest that details positions of the data on the old device. The destination device may be rebooted into a configuration mode to allow for the relocation of the transferred data, and then rebooted again to configure the destination device to provide access to the data in its respective relative locations on the destination device.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application distributor creates a unique proof of purchase receipt. This receipt can be bundled with the application and delivered to the purchaser. Each machine can maintain an authorization file that lists the users authorized to use applications on that machine. A system configured to practice the method verifies that a user is authorized to use an application on a machine based on an application proof of purchase receipt and the authorization file. If the application proof of purchase receipt and the authorization file are both valid, the system checks if the user account identifier in the receipt is contained in the authorization file. If so, the user can be considered authorized to use the application on the machine.
Abstract:
In accordance with some embodiments, a method includes detecting a management input indicative of a request to manage data stored at the direction of the device at a storage location with a limited available storage capacity, and in response, displaying a data storage management user interface that includes a plurality of data storage management affordances. The method further includes, detecting selection of a particular data storage management affordance of the plurality of data storage management affordances; and, in response to detecting selection of the particular data storage management affordance, in accordance with a determination that the particular data storage management affordance is the first data storage management affordance, initiating a process for performing the first data storage management operation and, in accordance with a determination that the particular data storage management affordance is the second data storage management affordance, initiating a process for performing the second data storage management operation.
Abstract:
A digital image capture system and method uses a display device to illuminate a target with light for improved image capture under poor lighting conditions. Various characteristics of the flash (e.g., brightness, color, duration, etc.) can be adjusted to improve image capture. Users are provided with feedback (e.g., live video feed, audio and/or visual countdowns, etc.) to assist them in preparing for image capture. The captured images are seamlessly integrated with existing applications (e.g., video conferencing, instant text messaging, etc.).
Abstract:
The described embodiments comprise an electronic device that executes an application, the electronic device including a processing subsystem. In these embodiments, the processing subsystem is configured to acquire a receipt associated with the application, wherein the application was purchased by a purchasing entity and installed on the electronic device after being assigned to a user of the electronic device by the purchasing entity. The processing subsystem is further configured to determine, using the receipt, if the application has expired. When the application has not expired, The processing subsystem is configured to execute the application with predetermined functions of the application enabled. When the application has expired, The processing subsystem is configured to execute the application with the predetermined functions of the application disabled.
Abstract:
Methods, systems and machine readable tangible storage media that integrate an application store in a user device. In one embodiment, a selected document that cannot be used as selected triggers a request to an application store server to determine an availability of applications to use the document as selected. The user device enhances the display of the document selection interface to allow the user to display an application store interface to purchase the application. The purchased application is downloaded and installed on the user device, and the user is optionally apprised of the progress of the purchase with an animated icon representing the application “flying” from the application store interface and “landing” in a dock area within the display on the user device when ready for subsequent launch. Other embodiments are also described.
Abstract:
In some implementations, a computing device may configure a new device based on a current state of an old device, including settings, preferences, and other user data. The data may be transferred from the old device to the new device, and then relocated according to a manifest that details positions of the data on the old device. The destination device may be rebooted into a configuration mode to allow for the relocation of the transferred data, and then rebooted again to configure the destination device to provide access to the data in its respective relative locations on the destination device.
Abstract:
In some implementations, a computing device may configure a new device based on a current state of an old device, including settings, preferences, and other user data. The data may be transferred from the old device to the new device, and then relocated according to a manifest that details positions of the data on the old device. The destination device may be rebooted into a configuration mode to allow for the relocation of the transferred data, and then rebooted again to configure the destination device to provide access to the data in its respective relative locations on the destination device.