Abstract:
Technologies are generally described that relate to managing and/or generating sensor data. An example method may include receiving output data generated by a pressure sensor. The method may also include determining surface data, indicative of a surface type associated with a force applied to a surface of the pressure sensor, based on the output data. Furthermore, the method may include adjusting the output data based on the surface data to facilitate generating adjusted output data indicative of an adjusted pressure value generated by the pressure sensor.
Abstract:
Technologies and implementations for providing an online game experience using multiple devices are generally disclosed including methods and devices for, in some examples, receiving first data from a first device, the received first data being associated with a first interaction with the online game, receiving a request to utilize a second device and responsive to the received request, transmitting second data to the second device, the second data being associated with a second interaction with the online game, the second interaction related to first interaction but being different from the first interaction.
Abstract:
Technologies are generally described for a social networking service (SNS). In some examples, a method performed under control of a server may include receiving a user input associated with the user responding to content posted in an online forum, determining whether a threshold condition set by the user is satisfied for the user's response to be disclosed with regard to a particular piece of content posted in the online forum, and disclosing the user's response to the particular piece of content posted in the online forum when the threshold condition is determined to be satisfied.
Abstract:
Technologies are generally described for a spoiler alert scheme. In some examples, a spoiler alert system may include an event determination unit configured to determine an event of interest to a user for which a spoiler alert is to be provided, a spoiler identification unit configured to identify one or more posts in an online forum that include spoiler information regarding the determined event of interest, and a spoiler control unit configured to hide the one or more identified posts from the online forum, as displayed to the user.
Abstract:
Technologies are generally described for an access control scheme for an external device. In some examples, an electronic device may detect the external memory connected to the electronic device; set a security code to enable access to the external memory; receive a request to access the external memory; access the external memory in response to entry of the security code; receive a request to disconnect the external memory; and remove a requirement for entry of the security code to enable access to the external memory.
Abstract:
Technologies and implementations for providing an online game experience using multiple devices are generally disclosed including methods and devices for, in some examples, receiving first data from a first device, the received first data being associated with a first interaction with the online game, receiving a request to utilize a second device and responsive to the received request, transmitting second data to the second device, the second data being associated with a second interaction with the online game, the second interaction related to first interaction but being different from the first interaction.
Abstract:
Technologies are generally described for content management. In some examples, a method may include uploading, by an electronic device, to a server of at least one social networking service (SNS), a media file stored in the electronic device; receiving, by the server, one or more user reactions to the media file; transmitting, by the server, to the electronic device, the one or more user reactions; storing, by the electronic device, the one or more user reactions in connection with the media file; and showing, by the electronic device, the one or more user reactions in connection with the media file when a user of the electronic device browses the media file.
Abstract:
Technologies are generally described for privacy protection for a life-log system. In some examples, a method performed under control of a life-log system may include receiving, from a user account, a request to change one or more real life-log data entries relating to a real event that are stored in a first part of a database; removing the one or more real life-log data entries relating to the real event from the first part of the database; and storing, in the first part of the database, one or more misleading life-log data entries relating to a false event corresponding to the real event.
Abstract:
Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a mobile operating server may include determining whether there is an authenticated wireless access point around a mobile device, if there is no authenticated wireless access point, determining whether there is a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device and if there is a non-authenticated wireless access point whose capacity is over the predetermined value, instructing the mobile device to connect to a wireless local area network provided by the non-authenticated wireless access point.
Abstract:
Technologies are generally described for privacy protection for a life-log system. In some examples, a method performed under control of a life-log system may include receiving, from a user account, a request to change one or more real life-log data entries relating to a real event that are stored in a first part of a database; removing the one or more real life-log data entries relating to the real event from the first part of the database; and storing, in the first part of the database, one or more misleading life-log data entries relating to a false event corresponding to the real event.