Abstract:
Some embodiments include a computer-implement method of producing a flexible sentence syntax to facilitate one or more computer applications to generate and publish sentence expressions. For example, the method can include providing a developer interface to define a flexible sentence syntax that controls one or more sentences publishable by an application service. A developer of the application service can customize the flexible sentence syntax including selecting at least one of selectable tokens that is associated with another element to incorporate in the flexible sentence syntax. Based on the selected token, a computing device can generate and publish a target sentence according to the flexible sentence syntax on the application service's behalf.
Abstract:
A method and system for providing flexible sentences are disclosed. The system includes a developer interface for providing options to define actor, edge, target and aggregation of a flexible sentence syntax. In one embodiment, tokens are provided to define property expressions of the edge and/or target of the flexible sentence syntax. Based on the defined edge and target, the developer interface may generate a plurality of flexible sentence syntaxes for a developer to select. In some embodiments, the developer can add additional property expressions to further define the edge and/or target of the flexible sentence syntax. In some instances, the plurality of flexible sentence syntaxes may be prioritized based on a percentage coverage, which is determined by the impressions received over a given time frame.
Abstract:
Systems, methods, and non-transitory computer-readable media can present a first interface that provides a first set of content items. A command to present a second interface that provides a second set of content items can be detected. An animation that transitions from the first interface to the second interface can be performed. The animation can cause a second subset of content items out of the second set to be visually representative of a first subset of content items out of the first set.
Abstract:
A method and system for instant personalization security are provided. The system includes a platform for a user to open applications and/or access web sites. When an application is integrated with the platform, the identification of the application can be combined with the ID of the user and encrypted into a hashed ID. The application does not have access to the user's fully identifying profile (e.g., UID or other public information). Instead, the application only has access to a pseudonymous profile (e.g., the hashed ID, first name, last initial, small profile pictures, and/or other non-fully identifying profile information) of the user. One or more options are then provided for the user to authorize or reject the application to access the user's fully identifying profile. Upon the user's authorization, an access token is provided to the application to access a subset of the user's fully identifying profile.
Abstract:
Sentence internationalization methods and systems are disclosed. The method may include: providing a developer interface to define an internationalized sentence syntax for an application on a social networking system, the internationalized sentence syntax for translating a natural language expression of a social graph edge of the social networking system; providing a sentence option on the developer interface to define grammar of the internationalized sentence syntax; generating a token structure including a language token to assist translation of the internationalized sentence syntax into a preferred language indicated by the language token, the token structure customizable via the developer interface to configure translation options; associating a social graph attribute with a first token of the token structure; and storing the sentence option and the token structure with the internationalized sentence syntax to facilitate run-time translation of the internationalized sentence syntax into the natural language expression in the preferred language.
Abstract:
Some embodiments include a computer-implement method of producing a flexible sentence syntax to facilitate one or more computer applications to generate and publish sentence expressions. For example, the method can include providing a developer interface to define a flexible sentence syntax that controls one or more sentences publishable by an application service. A developer of the application service can customize the flexible sentence syntax including selecting at least one of selectable tokens that is associated with another element to incorporate in the flexible sentence syntax. Based on the selected token, a computing device can generate and publish a target sentence according to the flexible sentence syntax on the application service's behalf.
Abstract:
Some embodiments include a computer-implement method of producing a flexible sentence syntax to facilitate one or more computer applications to generate and publish sentence expressions. For example, the method can include providing a developer interface to define a flexible sentence syntax that controls one or more sentences publishable by an application service. A developer of the application service can customize the flexible sentence syntax including selecting at least one of selectable tokens that is associated with another element to incorporate in the flexible sentence syntax. Based on the selected token, a computing device can generate and publish a target sentence according to the flexible sentence syntax on the application service's behalf.
Abstract:
An online system receives from a third-party application on a client device, an anonymous login request to anonymously log a user of the online system into a third-party system associated with the third-party application. Responsive to receiving the anonymous login request, the online system generates a permissions user interface (UI) that provides an interface component including an option for the user to anonymously log into the third-party system using the user's login information for the online system. The online system provides the permissions UI to the client device, and receives permissions information from the client device. The online system generates an anonymous identifier that allows the user to login to the third-party system. The online system provides the anonymous identifier to the third-party application to allow anonymous login of the user into the third-party system in accordance with the permissions information.
Abstract:
Some embodiments involve methods and systems for instant personalization security. For example, a social networking system can provide a platform for a user to open applications and/or access external websites. In some cases, an application does not have access to the user's fully identifying profile (e.g., UID or other public information). Instead, the application has access to a pseudonymous profile corresponding to a hashed ID that is generated by the platform and provided to the application. Access to the pseudonymous profile enables the application or an external website to personalize its environment without breaching the security of the platform.
Abstract:
In one embodiment, a method includes accessing posts of an online social network, each post being associated with a first entity of the online social network, classifying, based on content and metadata associated with each post, one or more of the posts as being relevant to the first entity, extracting a set of one or more n-grams from the content of the posts classified as being relevant to the first entity, filtering the set of n-grams to remove one or more of the extracted n-grams from the set of n-grams, calculating a quality score for each n-gram in the filtered set of n-grams, generating a snippet-module including one or more of the extracted n-grams from the filtered set of n-grams having quality-scores greater than a threshold quality-score, and sending, to a client system of a first user of the online social network, the snippet-module for display to the user.