摘要:
Systems and methods may provide for identifying media content and determining a user perception level of the media content. Systems and methods may also provide for reducing a visual quality of at least a portion of the media content for which the user perception level is at least partially limited to optimize resource consumption. One example prevents retrieval of at least a portion of the media content for which the user perception level is completely limited.
摘要:
Systems and method may provide for a communication device that includes a primary communications module, a sensor, and a secondary wireless communications module. The sensor may detect a motion towards a second device while the communication device is involved in a real-time communication with one or more parties using the primary communications module. The secondary wireless communications module may invite the second device to join the real-time communication if the second device is authorized to take part in the real-time communication.
摘要:
Apparatuses and methods associated with memory allocations for virtual machines are disclosed. In embodiments, an apparatus may include a processor; a plurality of memory modules; and a memory controller configured to provide a layout of the memory modules. The apparatus may further include a VMM configured to be operated by the processor to manage execution of a VM by the processor including selective allocation of the memory modules to the VM using the layout of the memory modules provided to the VMM by the memory controller. Other embodiments may be described and claimed.
摘要:
Systems and methods may provide for monitoring one or more runtime performance characteristics of a link and determining a state of the link based on at least one of the one or more runtime performance characteristics. Additionally, a retraining of the link may be automatically scheduled based on the state of the link. In one example, scheduling the retraining of the link further includes setting one or more retraining parameters.
摘要:
Systems and methods may provide for transmitting an outbound radar signal via an antenna structure and receiving a reflected radar signal via the antenna structure. Additionally, a three dimensional (3D) code may be interpreted based on the outbound radar signal and the reflected radar signal. In one example, interpreting the 3D code includes determining depth data for each of a plurality of cells in the 3D code.
摘要:
Technologies for displaying public and private images includes a display device and one or more user viewing devices. The display device is configured to display or generate a personalized image or video that is viewable by an authorized user viewing device and not viewable by unauthorized viewing devices. To facilitate the display of the personalized images, the display device and the user viewing device(s) may negotiate a display protocol to be used by the display device to display the personalized image in a private manner. In some embodiment, the display device may also display a public image or video that is viewable by unauthorized viewing devices and/or individuals without viewing devices.
摘要:
While cloud services can offer processing from personal devices or synthesized data from multiple sources, many users prefer their data to remain private. According to some embodiments, private user data may be processed in the cloud without revealing the user identity to the cloud service provider. Only the user or an authorized agent of the user and the service's hardware platform have access to certain keys. The service application software and operating system only have access to encrypted data.
摘要:
A method, device, and system for delaying delivery of incoming packets during a network-triggered wake of a host computing device includes receiving one or more packets from a remote computing device over a network. The host computing device holds or buffers incoming packets to delay delivery while one or more components transition from a low-power power-managed state to an operational power-managed state. The host computing device may hold and release the packets after passage of a reference time. Additionally, the host computing device may hold and release, buffer and inject, or buffer and replay the packets upon receiving notification that one or more components has transitioned from a low-power state to an operational state. The delayed packets may be acknowledged to the remote computing device to reduce or minimize the overall time needed to establish a connection.