This relates generally to recommending applications, including but not limited to providing recommendations of mobile device applications.
The growing base of mobile device applications available to users satisfies a wide range of needs, providing consumers with both a source of entertainment and a variety of convenient features and functionality.
Given the overwhelming number of options available, consumers are often unaware of existing applications from which they may benefit and that may suit their interests.
Accordingly, there is a need for methods, systems, and interfaces for providing recommendations of applications to be downloaded, installed, and/or run on a client device of a user. By detecting trigger events for the user, applications in which the user may be interested will be recommended to the user. Such methods and interfaces optionally complement or replace conventional methods for downloading, installing, and/or running applications.
In accordance with some embodiments, a method is performed at an electronic device (e.g., a server system) with one or more processors and memory storing instructions for execution by the one or more processors. The method includes providing a recommendation of an application to be run on a client device of the user, based at least in part on detecting a trigger event for a user of a social-networking service.
In accordance with some embodiments, an electronic device (e.g., a server system) includes one or more processors, memory, and one or more programs; the one or more programs are stored in the memory and configured to be executed by the one or more processors. The one or more programs include instructions for performing the operations of the method described above. In accordance with some embodiments, a non-transitory computer-readable storage medium has stored therein instructions that, when executed by the electronic device, cause the electronic device to perform the operations of the method described above.
Thus, electronic devices are provided with efficient and effective methods for providing recommendations of applications to be downloaded, installed, or run on a client device, thereby increasing the effectiveness and efficiency of such devices and user satisfaction with such devices.
For a better understanding of the various described embodiments, reference should be made to the Description of Embodiments below, in conjunction with the following drawings. Like reference numerals refer to corresponding parts throughout the figures and description.
Reference will now be made to embodiments, examples of which are illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide an understanding of the various described embodiments. However, it will be apparent to one of ordinary skill in the art that the various described embodiments may be practiced without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been described in detail so as not to unnecessarily obscure aspects of the embodiments.
It will also be understood that, although the terms first, second, etc. are, in some instances, used herein to describe various elements, these elements should not be limited by these terms. These terms are used only to distinguish one element from another. For example, a first trigger event could be termed a second trigger event, and, similarly, a second trigger event could be termed a first trigger event, without departing from the scope of the various described embodiments. The first trigger event and the second trigger event are both trigger events, but they are not the same trigger event.
The terminology used in the description of the various embodiments described herein is for the purpose of describing particular embodiments only and is not intended to be limiting. As used in the description of the various described embodiments and the appended claims, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term “and/or” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms “includes,” “including,” “comprises,” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As used herein, the term “if” is, optionally, construed to mean “when” or “upon” or “in response to determining” or “in response to detecting” or “in accordance with a determination that,” depending on the context. Similarly, the phrase “if it is determined” or “if [a stated condition or event] is detected” is, optionally, construed to mean “upon determining” or “in response to determining” or “upon detecting [the stated condition or event]” or “in response to detecting [the stated condition or event]” or “in accordance with a determination that [a stated condition or event] is detected,” depending on the context.
As used herein, the term “exemplary” is used in the sense of “serving as an example, instance, or illustration” and not in the sense of “representing the best of its kind.”
In some embodiments, the client devices 104-1, 104-2, . . . 104-n are computing devices such as smart watches, personal digital assistants, portable media players, smart phones, tablet computers, 2D gaming devices, 3D (e.g., virtual reality) gaming devices, virtual reality headsets, wearable computing devices, laptop computers, desktop computers, televisions with one or more processors embedded therein or coupled thereto, in-vehicle information systems (e.g., an in-car computer system that provides navigation, entertainment, and/or other information), and/or other appropriate computing devices that can be used to communicate with the social-network system 108. In some embodiments, the social-network system 108 is a single computing device such as a computer server, while in other embodiments, the social-network system 108 is implemented by multiple computing devices working together to perform the actions of a server system (e.g., cloud computing).
Users 102-1, 102-2, . . . 102-n employ the client devices 104-1, 104-2, . . . 104-n to access the social-network system 108 and to participate in a corresponding social-networking service provided by the social-network system 108. For example, one or more of the client devices 104-1, 104-2, . . . 104-n execute web browser applications that can be used to access the social-networking service. As another example, one or more of the client devices 104-1, 104-2, . . . 104-n execute software applications that are specific to the social-networking service (e.g., social-networking “apps” running on smart phones or tablets, such as a Facebook social-networking application running on an iPhone, Android, or Windows smart phone or tablet).
Users interacting with the client devices 104-1, 104-2, . . . 104-n can participate in the social-networking service provided by the social-network system 108 by providing and/or consuming (e.g., posting, writing, viewing, publishing, broadcasting, promoting, recommending, sharing) digital information, such as text comments (e.g., statuses, updates, announcements, replies, location “check-ins,” private/group messages), photos, videos, audio files, links, documents, and/or other electronic content. In some embodiments, users interact with a page, group, event, message board, feed, application, and/or user profile of a social-networking service provided by the social network system 108. Users of the social-networking service can annotate information posted by other users of the social-networking service (e.g., endorsing or “liking” a posting of another user, or commenting on a posting by another user). In some embodiments, information can be posted on a user's behalf by systems and/or services external to the social-network system 108. For example, the user may post a review of a movie to a movie-review website, and with proper permissions that website may cross-post the review to the social network system 108 on the user's behalf. In another example, a software application executing on a mobile client device, with proper permissions, may use global positioning system (GPS) or other geo-location capabilities (e.g., Wi-Fi or hybrid positioning systems) to determine the user's location and update the social network system 108 with the user's location (e.g., “At Home,” “At Work,” or “In San Francisco, Calif.”), and/or update the social network system 108 with information derived from and/or based on the user's location. Users interacting with the client devices 104-1, 104-2, . . . 104-n can also use the social-networking service provided by the social-network system 108 to define groups of users, to communicate and collaborate with each other, and/or to install and run applications provided through the social-networking service.
In some embodiments, the network architecture 100 also includes third-party servers 110-1, 110-2, . . . 110-m. In some embodiments, a given third-party server 110 is used to host third-party websites that provide web pages to client devices 104, either directly or in conjunction with the social-network system 108. In some embodiments, the social-network system 108 uses inline frames (“iframes”) to nest independent websites within a user's social network session. In some embodiments, a given third-party server is used to host third-party applications that are used by client devices 104, either directly or in conjunction with the social-network system 108. In some embodiments, the social-network system 108 uses iframes to enable third-party developers to create applications that are hosted separately by a third-party server 110, but operate within a social-networking session of a user 102 and are accessed through the user's profile in the social-network system 108. Exemplary third-party applications include applications for books, business, communication, contests, education, entertainment, fashion, finance, food and drink, games, health and fitness, lifestyle, local information, movies, television, music and audio, news, photos, video, productivity, reference material, security, shopping, sports, travel, utilities, and the like. In some embodiments, a given third-party server 110 is used to host enterprise systems, which are used by client devices 104, either directly or in conjunction with the social-network system 108. In some embodiments, a given third-party server 110 is used to provide third-party content (e.g., news articles, reviews, message feeds, etc.).
In some embodiments, a given third-party server 110 is a single computing device, while in other embodiments, a given third-party server 110 is implemented by multiple computing devices working together to perform the actions of a server system (e.g., cloud computing).
Memory 206 includes high-speed random-access memory, such as DRAM, SRAM, DDR RAM, or other random-access solid-state memory devices; and may include non-volatile memory, such as one or more magnetic disk storage devices, optical disk storage devices, flash memory devices, and/or other non-volatile solid-state storage devices. Memory 206 may optionally include one or more storage devices remotely located from the processor(s) 202. Memory 206, or alternately the non-volatile memory device(s) within memory 206, includes a non-transitory computer-readable storage medium. In some embodiments, memory 206 or the computer-readable storage medium of memory 206 stores the following programs, modules and data structures, or a subset or superset thereof:
The social network database 214 stores data associated with the social network in one or more types of databases, such as graph, dimensional, flat, hierarchical, network, object-oriented, relational, and/or XML databases.
In some embodiments, the social network database 214 includes a graph database, with entity information 216 represented as nodes in the graph database and connection information 220 represented as edges in the graph database. The graph database includes a plurality of nodes, as well as a plurality of edges that define connections between corresponding nodes. In some embodiments, the nodes and/or edges themselves are data objects that include the identifiers, attributes, and information for their corresponding entities, some of which are rendered at clients 104 on corresponding profile pages or other pages in the social-networking service. In some embodiments, the nodes also include pointers or references to other objects, data structures, or resources for use in rendering content in conjunction with the rendering of the pages corresponding to the respective nodes at clients 104.
Entity information 216 includes user information 218, such as user profiles, login information, privacy and other preferences, biographical data, and the like. In some embodiments, for a given user, the user information 218 includes the user's name, profile picture, contact information, birth date, sex, marital status, family status, employment, education background, preferences, interests, and/or other demographic information.
In some embodiments, entity information 216 includes information about a physical location (e.g., a restaurant, theater, landmark, city, state, or country), real or intellectual property (e.g., a sculpture, painting, movie, game, song, idea/concept, photograph, or written work), a business, a group of people, and/or a group of businesses. In some embodiments, entity information 216 includes information about a resource, such as an audio file, a video file, a digital photo, a text file, a structured document (e.g., web page), or an application. In some embodiments, the resource is located in the social-network system 108 (e.g., in content 222) or on an external server, such as third-party server 110.
In some embodiments, connection information 220 includes information about the relationships between entities in the social network database 214. In some embodiments, connection information 220 includes information about edges that connect pairs of nodes in a graph database. In some embodiments, an edge connecting a pair of nodes represents a relationship between the pair of nodes.
In some embodiments, an edge includes or represents one or more data objects or attributes that correspond to the relationship between a pair of nodes. For example, when a first user indicates that a second user is a “friend” of the first user, the social-network system 108 transmits a “friend request” to the second user. If the second user confirms the “friend request,” the social-network system 108 creates and stores an edge connecting the first user's user node and the second user's user node in a graph database as connection information 220 that indicates that the first user and the second user are friends. In some embodiments, connection information 220 represents a friendship, a family relationship, a business or employment relationship, a fan relationship, a follower relationship, a visitor relationship, a subscriber relationship, a superior/subordinate relationship, a reciprocal relationship, a non-reciprocal relationship, another suitable type of relationship, or two or more such relationships.
In some embodiments, an edge between a user node and another entity node represents connection information about a particular action or activity performed by a user of the user node towards the other entity node. For example, a user may “like” or have “attended,” “played,” “listened,” “cooked,” “worked at,” or “watched” the entity at the other node. The page in the social-networking service that corresponds to the entity at the other node may include, for example, a selectable “like,” “check in,” or “add to favorites” icon. After the user clicks one of these icons, the social-network system 108 may create a “like” edge, “check in” edge, or a “favorites” edge in response to the corresponding user action. As another example, the user may listen to a particular song using a particular application (e.g., an online music application). In this case, the social-network system 108 may create a “listened” edge and a “used” edge between the user node that corresponds to the user and the entity nodes that correspond to the song and the application, respectively, to indicate that the user listened to the song and used the application. In addition, the social-network system 108 may create a “played” edge between the entity nodes that correspond to the song and the application to indicate that the particular song was played by the particular application.
In some embodiments, content 222 includes text (e.g., ASCII, SGML, HTML), images (e.g., jpeg, tif and gif), graphics (e.g., vector-based or bitmap), audio, video (e.g., mpeg), other multimedia, and/or combinations thereof. In some embodiments, content 222 includes executable code (e.g., games executable within a browser window or frame), podcasts, links, and the like.
In some embodiments, user content 224 includes text comments (e.g., statuses, updates, announcements, replies, location “check-ins,” private/group messages), photos, videos, audio files, links, documents, and/or other electronic content. In some embodiments, user content 224 further includes user annotations of information posted by other users of the social-networking service (e.g., endorsements or “likes” of another user's posting, comments on another user's posting, etc.).
In some embodiments, the social network server module 228 includes web or Hypertext Transfer Protocol (HTTP) servers, File Transfer Protocol (FTP) servers, as well as web pages and applications implemented using Common Gateway Interface (CGI) script, PHP Hyper-text Preprocessor (PHP), Active Server Pages (ASP), Hyper Text Markup Language (HTML), Extensible Markup Language (XML), Java, JavaScript, Asynchronous JavaScript and XML (AJAX), XHP, Javelin, Wireless Universal Resource File (WURFL), and the like.
In some embodiments, the recommendation module 238 selects (e.g., ranks) applications for recommendation based on a variety of factors (e.g., user profile, application popularity, detected trigger events, etc.).
Memory 306 includes high-speed random-access memory, such as DRAM, SRAM, DDR RAM or other random-access solid-state memory devices; and may include non-volatile memory, such as one or more magnetic disk storage devices, optical disk storage devices, flash memory devices, or other non-volatile solid-state storage devices. Memory 306 may optionally include one or more storage devices remotely located from the processor(s) 302. Memory 306, or alternately the non-volatile memory device(s) within memory 306, includes a non-transitory computer-readable storage medium. In some embodiments, memory 306 or the computer-readable storage medium of memory 306 stores the following programs, modules and data structures, or a subset or superset thereof:
In some embodiments, respective client application modules 344 are downloaded and installed through a social-networking service (e.g., provided by social-network system 108) or a third-party server (e.g., third-party servers 110,
In some embodiments, the optional recommendation module 342 is analogously configured to the recommendation module 238 of the social-network system 108 (
Each of the above identified modules and applications corresponds to a set of executable instructions for performing one or more functions as described above and/or in the methods described in this application (e.g., the computer-implemented methods and other information processing methods described herein). These modules (i.e., sets of instructions) need not be implemented as separate software programs, procedures or modules, and thus various subsets of these modules are, optionally, combined or otherwise re-arranged in various embodiments. In some embodiments, memory 206 and/or 306 store a subset of the modules and data structures identified above. Furthermore, memory 206 and/or 306 optionally store additional modules and data structures not described above.
Attention is now directed towards embodiments of graphical user interfaces (“GUIs”) and associated processes that may be implemented on a client device (e.g., the client device 104,
User content items 402 include different types of user content 224. For example, user content item 402-1 is a location check-in submitted by “User_01” (e.g., “User_01” performed a check-in operation, indicating that the user was located at “San Jose Airport”). As additional examples, user content items 402-2 and 402-3 are personal statuses published by “User_01” to the social-networking service (“I am SOOO bored!!,” “Everyone seems to be loving Game_01!”).
Triggers are events or situations in which there is a likelihood that a recommendation of an application would be valuable to the user of a device. Based at least in part on detecting a trigger event, a recommendation of an application is provided.
Trigger events may include detecting that a user has checked into a location that is associated with a likelihood of the user being idle. For example, user content item 402-1 is a location check-in at an airport, which is associated with a likelihood of the user being idle (the user is presumed to be idle when waiting to board the plane, boarded on the plane and in transit). Based on the detected location of the user, trigger events may also include determining that one or more contacts of the user in the social-networking service are also present at the location. For example, the comment of “User_02” (“Whoa, I'm here too!”) in response to the location check-in of “User_01” indicates that “User_02” is also present at the same location as “User_01.” Because “User_01” and “User_02” are in the same location, they might be interested in playing a game or using another type of application together. (Alternatively, “User_01” might be idle while waiting for “User_02” to finish doing something—e.g., shopping—at a given location.) In some embodiments, trigger events may include detecting that a user has not relocated for more than a predefined period of time (e.g., user has remained in the same location for more than 3 hours).
Trigger events may also include determining that a content item posted by a user to a social-networking service includes an indication of potential user interest in an application (e.g., based on keywords or phrases detected in user content). For example, user content item 402-2 includes a keyword, “bored,” which indicates potential user interest in using an application, such as a video game. As another example, user content item 402-3 includes the title of a video game application, “Game_01,” which indicates potential user interest in video game applications, and also the specific video game application “Game_01.”
In some embodiments, selection of an application for recommendation to the user is based on the detected trigger event. For example, as shown by the application recommendation 404-1 (
As another example, the application recommendation 404-2 (
These examples of application recommendations 404, and the recommended applications themselves, may be based on other trigger events, some of which are described in greater detail with respect to
In performing the method 500, an electronic device detects (502) a trigger event for a user of a social-networking service (e.g., user 102-1 of client device 104-1,
In some embodiments, detecting (502) a trigger event includes detecting (504) repetitive user activity on the social-networking service. For example, in some embodiments, repetitive user activity includes refreshing (506) a content feed (e.g., a feed displayed by the GUI 400,
In some embodiments, the trigger event is associated (510) with use, on the client device, of an application (e.g., browser module 338,
In some embodiments, detecting (502) a trigger event includes determining (512) that a content item (e.g., status update) posted by the user to the social-networking service includes an indication of potential user interest in an application. Indications of potential user interest may include keywords or phrases suggesting that the user seeks some form of entertainment (e.g., keyword “bored” in user content item 402-2,
In some embodiments, detecting (502) a trigger event includes determining (514) a location of the client device. The location of the client device may correspond to a specific set of coordinates (e.g., GPS coordinates), a geo-fence (e.g., a virtual perimeter corresponding to a predefined geographic area), or other defined region.
In some implementations, the determined location of the client device is associated with a likelihood of the user being idle (e.g., an airport, train station, bus station, shopping mall, medical office, or governmental office, etc.). These locations suggest a likelihood that a recommendation of an application would be valuable to the user. Optionally, the determined location of the client device may also be used to determine (520) that one or more contacts of the user in the social-networking service are also present at the location (e.g., within a threshold distance from the location).
In some embodiments, detecting (502) the trigger event includes detecting (516) a check-in operation performed on the client device to indicate a location of the client device to the social-networking service, the location being associated with a likelihood of the user being idle (e.g., an airport). For example, referring to
In some embodiments, detecting (502) a trigger event includes identifying (518) a location of the client device as being associated with a likelihood of subsequent loss of network connectivity by the client device. A subsequent loss of network connectivity may suggest that a recommendation of an application will be valuable to the user during a later time when, and at a location where, network connectivity is unavailable. For example, the electronic device detects a trigger event if it detects that the user is located at an airport. This is based on the assumption that the user will not have access to network connectivity once on-board the plane, a situation in which there is a likelihood that a recommendation of an application (e.g., that does not require network access) would be valuable to the user of the client device (e.g., a video game application to occupy the user's time in transit).
In some embodiments, the activity of the user in the social-networking service is monitored, and machine learning is applied to the monitored activity to determine the trigger event. Machine learning thus may be used to specify one or more conditions that define, or a part of, the trigger event. By applying machine learning techniques, potential user interest in an application can be better gauged by identifying which trigger events are more determinative of the user's interest.
Referring now to
In some embodiments, the recommended application is (526) a video game. The video game may be accessed via the social network system (e.g., downloaded and/or run through social network client module 340,
In some embodiments, providing (522) the recommendation includes recommending (528) an application that does not require network connectivity. Optionally, recommending (528) is performed in accordance with identifying (518) a location of the client device as being associated with a likelihood of subsequent loss of network connectivity by the client device. For example, a trigger event is detected based on the location check-in of “User_01” at the airport (user content item 402-1,
In some embodiments, providing (522) the recommendation is based further on the determination (530) that one or more contacts of the user in the social-networking service are also present at a determined location (520) of the client device of the user. The recommended application may be (532) a multi-user application. For example, referring to
In some embodiments, the electronic device selects (534) the application for recommendation to the user, from among a plurality of applications, based at least in part on a profile of the user in the social-networking service. A user profile includes personal information about the user that implicitly or explicitly indicates an interest of the user in the application, the subject matter of the application, and/or a feature/functionality provided by the application (e.g., based on listed hobbies, interests, activities, etc.).
In some embodiments, the electronic device selects the application for recommendation based on the user's browsing history within and/or outside of the social-networking service (e.g., user views a social-media page of the company that develops the application), and/or the user's application purchase history (e.g., recommending applications similar to those the user has already purchased/used, recommending other applications by the developer of one or more applications the user has already purchased/used, etc.).
In some embodiments, the electronic device selects (534) the application for recommendation based at least in part on a popularity of the application in the social-networking service. The popularity of an application may be based on a click-through rate, installation rate, and/or a number of contacts of the user in the social-networking service who have used/purchased the application. In some embodiments, selecting the application for recommendation is based at least in part on which applications are used/purchased most by contacts of the user who are considered important contacts. Important contacts include, for example, contacts with an importance designation (e.g., designated as “close friends” or family) or contacts whose published content on the social-networking service the user views with a frequency that satisfies a threshold (e.g., an absolute threshold, or a threshold defined in comparison to other contacts).
In some embodiments, the electronic device selects (536) the application for recommendation based at least in part on the trigger event. For example, referring to
In some embodiments, a plurality of applications are ranked and an application is selected for recommendation to the user based on the rankings (e.g., the highest ranking application is selected for recommendation). In some embodiments, respective rankings are determined based on one or more variables for selecting and/or providing the recommended application, as discussed above (e.g., the user profile, a popularity of a respective application, detected trigger events, etc.). In some embodiments, one or more (e.g., all) variables used for ranking are independent of the trigger condition.
In some embodiments, providing (522) the recommendation is performed based further on an activity level (538) of the user with respect to using applications. For example, the recommendation is provided based at least in part on a combination of detecting a trigger event and determining that the user's activity level satisfies a threshold. The frequency with which recommendations for applications are provided may be based on a number of applications that the user has used, downloaded, and/or purchased, the frequency with which applications were used over a period of time, and/or the duration of time for which applications are used when executed/run. In some embodiments, recommendations of application to be downloaded/run are provided more frequently to active users of applications (e.g., are provided with a first frequency to users whose activity levels do not satisfy a threshold and with a second, higher frequency to users whose activity levels satisfy the threshold).
In some embodiments, providing (522) the recommendation includes providing to the user an indication of one or more factors based on which the application was selected for recommendation to the user. For example, application recommendation 404-2 (
The client device receives user input indicating whether the user accepts or declines the recommendations. For example, the user selects user interface element 406-1 or 406-2 (
Referring now to
If the determined network connectivity for the client device does not satisfy the criterion (552—No), a recommendation of an application to be run is not provided (554). For example, if the client device has Internet connectivity through a first type of network (e.g., the cellular network), but does not have connectivity through a second type of network (e.g., Wi-Fi connection), no recommendation is provided so that bandwidth on the first type of network is saved. If the user has connectivity through the second type of network, however, then the recommendation is provided. In another example, the recommendation is provided if the signal strength satisfies (e.g., exceeds, or equals or exceeds) a threshold but not if the signal strength does not satisfy the threshold. In yet another example, the recommendation is not provided if network congestion satisfies (e.g., exceeds, or equals or exceeds) a threshold, but is provided if the network congestion does not satisfy the threshold.
If the determined network connectivity for the client device satisfies the criterion (552—Yes), a recommendation of an application to be run on the client device is provided (522) based at least in part on detecting a trigger event for a user of a social-networking service (where providing the recommendation is performed in accordance with any of the embodiments discussed above with respect to the method 500). In this example, the recommendation is provided based further on the determination (552—Yes) that the network connectivity satisfies the criterion.
Referring now to
If the determined movement of the client device does not satisfy the criterion (562—No), a recommendation of an application to be run is not provided (564). For example, if it is determined that the client device is moving at a speed indicative of being in a moving vehicle then a recommendation is not provided as a safety precaution to avoid distracting the user, who may be driving. (In this example, the criterion may specify that the speed be less than, or less than or equal to, a threshold.)
If the determined movement of the client device satisfies the criterion (562—Yes), a recommendation of an application to be run on the client device is provided (522) based at least in part on detecting a trigger event for a user of a social-networking service (where providing the recommendation is performed in accordance with any of the embodiments discussed above with respect to the method 500). In this example, the recommendation is provided based further on the determination (562-Yes) that the movement satisfies the criterion. As another example, if a user is detected as stationary and actively using the client device, then the criterion is satisfied and a recommendation is provided.
Stages of methods 500, 550, and 560 may be performed additionally and/or alternatively to one another. For example, determinations 552 and 562 may be included in the same method, which may also include operation 520.
For situations in which the systems discussed above collect information about users, the users may be provided with an opportunity to opt in/out of programs or features that may collect personal information (e.g., information about a user's preferences or a user's contributions to social content providers). In addition, in some embodiments, certain data may be anonymized in one or more ways before it is stored or used, so that personally identifiable information is removed. For example, a user's identity may be anonymized so that the personally identifiable information cannot be determined for or associated with the user, and so that user preferences or user interactions are generalized (for example, generalized based on user demographics) rather than associated with a particular user.
Although some of various drawings illustrate a number of logical stages in a particular order, stages which are not order dependent may be reordered and other stages may be combined or broken out. Furthermore, some stages may be performed in parallel and/or simultaneously with one other. While some reordering or other groupings are specifically mentioned, others will be apparent to those of ordinary skill in the art, so the ordering and groupings presented herein are not an exhaustive list of alternatives. Moreover, it should be recognized that the stages could be implemented in hardware, firmware, software or any combination thereof.
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the scope of the claims to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen in order to best explain the principles underlying the claims and their practical applications, to thereby enable others skilled in the art to best use the embodiments with various modifications as are suited to the particular uses contemplated.