Patent application number | Description | Published |
20090249210 | COMPUTER SYSTEM WITH ENHANCED USER INTERFACE FOR IMAGES - A computer system and method are presented that enhance a user experience when viewing images displayed on the computer. The system includes a user interface for the computer that displays a number of thumbnail images that are small representations of image files existing on the computer. The thumbnail images are arranged in alignment with one another, such as at the bottom of a viewing window. An enlarged preview image is positioned adjacent the thumbnail images. The enlarged preview image corresponds to a selected thumbnail image and is a larger representation of an image file corresponding with the selected thumbnail image. A control is displayed in the window that enables the user to iterate through the thumbnail images in at least one direction. As the user iterates through the thumbnail images, the enlarged preview image changes correspondingly. | 10-01-2009 |
20120036438 | COMPUTER SYSTEM WITH ENHANCED USER INTERFACE FOR IMAGES - A computer system and method are presented that enhance a user experience when viewing images displayed on the computer. The system includes a user interface for the computer that displays a number of thumbnail images that are small representations of image files existing on the computer. The thumbnail images are arranged in alignment with one another, such as at the bottom of a viewing window. An enlarged preview image is positioned adjacent the thumbnail images. The enlarged preview image corresponds to a selected thumbnail image and is a larger representation of an image file corresponding with the selected thumbnail image. A control is displayed in the window that enables the user to iterate through the thumbnail images in at least one direction. As the user iterates through the thumbnail images, the enlarged preview image changes correspondingly. | 02-09-2012 |
20120158891 | TECHNIQUES FOR UNIVERSAL REPRESENTATION OF DIGITAL CONTENT - A universal content representation system (“UCRS”) implements techniques for universally representing digital content such as files, device information, and applications across a group of electronic devices that includes at least a source electronic device and a remote electronic device. Proxy content items, which correspond with items of content (“source content items”) stored on the source electronic device, are data stores for the corresponding source content items, and visually represent the corresponding source content items on the remote electronic device, whether the source electronic device is online or offline. A user of the remote electronic devices uses the proxy content items to search for and view source content items prior to requesting full access to the source content items. From time-to-time, source content items and proxy content items are synchronized with each other. | 06-21-2012 |
20120159363 | Z-ORDER BANDS - The subject disclosure relates to managing z-dimensional ordering of elements within a computing system display through the use of z-order bands. As described herein, z-order bands are utilized to arrange windows and other graphics corresponding to respective application types. A policy engine controls which windows and/or other graphical elements can enter and exit each band. Graphical elements within a given band can additionally be subject to per-band properties corresponding to the band and/or user preferences. As additionally described herein, z-order bands and/or other suitable mechanisms are utilized to facilitate registration watermarking for a computing environment by rendering a registration watermark display upon determining that one or more licensed elements of a computing system have not been registered. The registration watermark display is assigned a z-order band that enables its display over all other graphical elements associated with the computing system and prevents other graphical elements from interfering with its display. | 06-21-2012 |
20120192275 | REPUTATION CHECKING OF EXECUTABLE PROGRAMS - The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user. | 07-26-2012 |
20140324776 | FILE MANAGEMENT WITH PLACEHOLDERS - Aspects of the subject matter described herein relate to file system placeholders. In aspects, placeholders may be used by a client to represent remote file system objects. The placeholders may include metadata and may also include none, some, or all of the content of the represented remote file system objects. In conjunction with local file system metadata, the placeholders allow a file system namespace to be navigated and may also allow other operations to be performed on the file system objects even when the client is offline with respect to the remote file system. After connectivity is re-established with the remote file system, the placeholders may be used in synchronizing changes. | 10-30-2014 |
20140324777 | SEARCHING AND PLACEHOLDERS - Aspects of the subject matter described herein relate to file system placeholders. In aspects, placeholders may be used by a client to represent remote file system objects. The placeholders may include metadata, searchable text, and may also include none, some, or all of the content of the represented remote file system objects. Search data from the placeholders is integrated into a local search database of the client such that the client is able to satisfy queries and identify relevant local and remote file system objects even when the client is offline with respect to remote storage. | 10-30-2014 |
20140324945 | HYDRATION AND DEHYDRATION WITH PLACEHOLDERS - Aspects of the subject matter described herein relate to file system placeholders. In aspects, placeholders may be used by a client to represent remote file system objects. The placeholders may include metadata and may also include none, some, or all of the content of the represented remote file system objects. In conjunction with placeholders and based on one or more factors, a client may hydrate or dehydrate file system objects of the client to follow user directives, inferred user intent, and storage policies of the client. | 10-30-2014 |
20140330874 | STREAMING CONTENT AND PLACEHOLDERS - Aspects of the subject matter described herein relate to file system placeholders. In aspects, placeholders may be used by a client to represent remote file system objects. The placeholders may include metadata and may also include none, some, or all of the content of the represented remote file system objects. In response to a request to access content of a file system object represented by a placeholder, a client may obtain needed data from a remote storage system and stream or not stream the data to the requesting application based on whether the requesting application is capable of streaming the data. | 11-06-2014 |
20140358860 | Sync Framework Extensibility - Embodiments described herein may involve enabling applications to cooperate with a system-level sync framework. The sync framework may provide system synchronization of files between user devices and a cloud storage service. Arbitrary applications on a user computing device can communicate with the sync framework to temporarily suspend synchronization of a specified file by the sync framework. The application can register functions with the sync framework that the sync framework can invoke in relation to suspending synchronization, continuing to provide system-level access to the file for arbitrary applications, and resuming synchronization. | 12-04-2014 |