Abstract:
The subject technology provides a messaging application in which an image can be captured and supplemented with supplemental content such as stickers, animations, etc., from within an active messaging thread. In this manner, a user participating in a messaging conversation with a remote user can add stickers, animations, and/or adaptive content to an image captured by the user, without having to locally cache/store the captured image before editing and without having to leave the messaging conversion (or the messaging application) to access an image editing application.
Abstract:
Techniques for handling security of an application and its extension are described. In one embodiment, an application manager of an operating system running within a data processing system launches an application in a first sandboxed environment based on a first security profile associated with the application. In response to receiving a request from the application for accessing a function of an application extension that is associated with the application, the application manager launches the application extension in a second sandboxed environment based on a second security profile associated with the application extension. The application manager is to individually enforce security and manage resources of the application and the application extension in the first and second sandboxed environments based on the first and second security profiles, respectively. The second security profile specifies resources fewer than the first security profile.
Abstract:
Techniques for handling security of an application and its extension are described. In one embodiment, an application manager of an operating system running within a data processing system launches an application in a first sandboxed environment based on a first security profile associated with the application. In response to receiving a request from the application for accessing a function of an application extension that is associated with the application, the application manager launches the application extension in a second sandboxed environment based on a second security profile associated with the application extension. The application manager is to individually enforce security and manage resources of the application and the application extension in the first and second sandboxed environments based on the first and second security profiles, respectively. The second security profile specifies resources fewer than the first security profile.
Abstract:
The subject technology receives, at a local device, a requested camera format based on specifications of a display associated with a remote device. The remote device and the local device are devices participating in a video conference. The requested camera format includes a first resolution. Camera formats supported by a camera associated with the local device are determined. If a second resolution of a first camera format matches among the supported camera formats matches with the first resolution, the first camera format is selected for capturing the video stream by the camera. Otherwise, a second camera format among the supported camera formats is determined for capturing the video stream so as to maximize a field of view of the video stream relative to other camera formats supported by the camera.
Abstract:
Techniques are presented for managing for visual prominence of participants in a video conference, including conferences where participants communicate visually, such as with sign language. According to these techniques, a visual prominence indication of a participant in a video conference may be estimated, a video stream of the participant may be encoded, and the encoded video stream may be transmitted along with an indication of the estimated visual prominence to a receiving device in the video conference.
Abstract:
A device implementing the subject technology may include at least one processor configured to receive a plurality of buffer reports from a plurality of other devices, each of the plurality of buffer reports indicating a current target buffer level for a respective one of the plurality of other devices. The at least one processor may be further configured to determine a group target buffer level based at least in part on the current target buffer levels of the plurality of other devices and a current target buffer level of the at least one buffer. The at least one processor may be further configured to transmit the group target buffer level to the plurality of other devices. The at least one processor may be further configured to manage an occupancy of the at least one buffer based at least in part on the group target buffer level.
Abstract:
The subject technology provides a messaging application in which an image can be captured and supplemented with supplemental content such as stickers, animations, etc., from within an active messaging thread. In this manner, a user participating in a messaging conversation with a remote user can add stickers, animations, and/or adaptive content to an image captured by the user, without having to locally cache/store the captured image before editing and without having to leave the messaging conversion (or the messaging application) to access an image editing application.
Abstract:
According to one embodiment, in response to an inquiry received from a first application for an extension service associated with a first of a plurality of extension points of an operating system, a list of one or more extensions is identified that have been registered for the first extension point with the operating system, where the first application is executed within a first sandboxed environment. The identified list of extensions is displayed to prompt a user to select one of the extensions to be associated with the first application. In response to a selection of one of the extensions, the selected extension is launched in a second sandboxed environment. The selected extension and the second application were packaged in an application bundle, and when the application bundle was installed, the selected extension and the second application appeared in a registry of the operating system as separate applications.
Abstract:
Techniques for handling security of an application and its extension are described. In one embodiment, an application manager of an operating system running within a data processing system launches an application in a first sandboxed environment based on a first security profile associated with the application. In response to receiving a request from the application for accessing a function of an application extension that is associated with the application, the application manager launches the application extension in a second sandboxed environment based on a second security profile associated with the application extension. The application manager is to individually enforce security and manage resources of the application and the application extension in the first and second sandboxed environments based on the first and second security profiles, respectively. The second security profile specifies resources fewer than the first security profile.
Abstract:
In an example method, a graphical user interface (GUI) is displayed to a user on a display device of a computer system. The GUI includes a first game portion visually depicting a first game element and second game elements disposed within a game environment. A position of the first game element, a position of each of the second game elements, and/or a number of second game elements is randomized. The first GUI also includes a control portion visually depicting commands for manipulating the first game element within the game environment, and a first code portion. The computer system receives an indication that the user selected one of the commands depicted in the control portion. In response, the game element is manipulated within the game environment in accordance with the selected command. A first sequence of software code associated with the selected command is displayed in the first code portion.