摘要:
Various techniques for providing network connectivity are described herein. In one example, a moving object includes an uplink device of the moving object to connect the moving object to a publicly available computer network. The moving object also includes a downlink device of the moving object to be communicatively coupled to a remote device at a specific segment along a route of the moving object. The remote device is to provide data received via the downlink device to a user. The moving object also further includes a cache store communicatively coupled to the uplink device and the downlink device. Implementations include the use of commercial airplanes for providing connectivity via intermittent access and refreshing of a cache store that makes content available to end users.
摘要:
This document relates to management of computing devices using modulated electricity. One example includes assigning a set of time slices to a computing device for drawing electricity and subsequently causing the computing device to adjust consumption of the electricity by assigning a different set of time slices to the computing device.
摘要:
A description of computing resource requirements for execution of an application associated with a publicly available service is obtained. Access to computing resources is opportunistically obtained from a computing entity that includes a private computing device that is external to, and separate from, the publicly available service. The computing resource requirements are intelligently matched to available computing resources of the computing entity with private computing resources that are temporarily available from a private computing device source. The intelligent matching is performed using an optimization analysis.
摘要:
N nodes are assigned to a first layer of nodes having a first domain name server (DNS) anycast Internet Protocol (IP) address and a first fully qualified domain name (FQDN). M nodes are assigned to a second layer of nodes having a second DNS anycast IP address and a second FQDN. When a request to resolve the first FQDN for the first layer of nodes is received by a DNS of a node of the first layer and a load on the ES of the node is less than a threshold, the DNS handles the request by returning an edge server (ES) anycast IP address for the ES of the node. When the load on the ES is greater than the threshold, the DNS offloads the request by returning the second FQDN so that the second FQDN of the second layer is resolved to the second DNS anycast IP address.
摘要:
This document relates to user-authentication gestures. One example can capture multiple biometric features when a user-authentication gesture is performed as a device authentication attempt. The example can compare values of the multiple biometric features to previous values stored for the user. The example can further unlock the computing device in an instance where the values of the multiple biometric features satisfy a similarity threshold relative to the previous values.
摘要:
Biometric authentication and touch differentiation embodiments are described which use a handheld mobile computing device having a signal injection site that injects a signal into a user's hand for a prescribed period of time, and at least one signal sensing site each of which captures a signal emanating from a finger of either of the user's hands that is touching the signal sensing site during at least the period of time the signal is injected. The captured signal or signals are analyzed to determine whether they match, to a prescribed degree, a pre-established signal model that is indicative of a signal or signals expected to be captured. The signal matching determination can be employed to authenticate a user, or identify which finger of a user's hand is touching the computing device.