Abstract:
A computing system is described that receives, at a particular time, notification data, the notification data indicating a threshold amount of time for which the computing system is to delay outputting an alert based on the notification data. The computing system initiates, based on the threshold amount of time, a deferred output of the alert based on the notification data. Responsive to determining that the threshold amount of time has elapsed since the particular time, the computing system outputs the alert based on the notification data.
Abstract:
A computing system is described that receives, at a particular time, notification data, the notification data indicating a threshold amount of time for which the computing system is to delay outputting an alert based on the notification data. The computing system initiates, based on the threshold amount of time, a deferred output of the alert based on the notification data. Responsive to determining that the threshold amount of time has elapsed since the particular time, the computing system outputs the alert based on the notification data.
Abstract:
Techniques for a computing device operating in limited-access states are provided. One example method includes determining, by a computing device, that a notification is scheduled for output by the computing device during a first time period and that a pattern of audio detected during the first time period is indicative of human speech. The method further includes delaying output of the notification during the first time period and determining that a pattern of audio detected during a second time period is not indicative of human speech. The method also includes outputting at least a portion of the notification at an earlier in time of an end of the second time period or an expiration of a third time period.
Abstract:
In some examples, a technique may include outputting information associated with a notification. The notification may be associated with a notification attribute. The technique may further include determining, by a computing device, that a user has perceived the information associated with the notification; and receiving, by the computing device, an indication of at least one physiological parameter representative of a reaction of the user to the information associated with the notification. In some examples, the technique also includes, responsive to receiving the indication of the at least one physiological parameter representative of the reaction of the user to the information associated with the notification, controlling, by the computing device, at least one notification configuration setting related to outputting information associated with other notifications associated with the notification attribute.
Abstract:
A computing device may output, for display at a display device, a graphical user interface. The computing device may receive a plurality of indications of user interaction with the computing device. The computing device may determine a set of one or more time intervals between receiving at least two of the plurality of indications of user interaction with the computing device. The computing device may determine, based at least in part on the determined set of one or more time intervals, a length of time to visually emphasize an alert in the graphical user interface. The computing device may visually emphasize, for the length of time, the alert in the graphical user interface.
Abstract:
Implementations of the present disclosure provide systems and methods for automatically preloading data pertaining to credentials determined to be likely to be used during a particular time interval into a memory utilized by a credential emulator. The systems and methods described herein contemplate identifying a particular time interval by identifying events that may designate the beginning and end of that particular time interval, identifying contextual information relevant to the client device or a user account affiliated with the client device during the time interval, identifying a set of credentials available for loading into the memory utilized by the credential emulator, determining from the set of credentials, a subset composed of individual credentials that are likely to be used during the time interval, and loading data pertaining to individual credentials in the subset into the memory utilized by the emulator.
Abstract:
Methods and systems are provided related to synchronized networks. A synchronized network can include a node and additional nodes. The node can receive a packet including information. The node can determine whether the packet is from the synchronized network. After determining that the packet is from the synchronized network, the node can: send the packet to at least one of the additional nodes, determine whether a synchronized network interface (SNI) is on the node and is associated with the packet, where the SNI includes software executable on the node. After determining that the SNI is on the node and is associated with the packet, the node can generate a view of data in the synchronized network by: determining a user interface (UI) layout associated with the SNI, generating the view based on the UI layout and on the information using the SNI, and provide the view.
Abstract:
A computing system is described that receives notification data associated with a user, and responsive to determining that the user is interacting with a first computing device at a first particular time, outputs, for transmission to the first computing device, the notification data. The computing system determines that the user is interacting with a second computing device at a second particular time, and responsive to determining, based on the second particular time being less than a threshold amount of time after the first particular time, that the user did not view the notification data at the first computing device, outputs, for transmission to the second computing device, the notification data.
Abstract:
A computing system is described that receives notification data associated with a user, and responsive to determining that the user is interacting with a first computing device at a first particular time, outputs, for transmission to the first computing device, the notification data. The computing system determines that the user is interacting with a second computing device at a second particular time, and responsive to determining, based on the second particular time being less than a threshold amount of time after the first particular time, that the user did not view the notification data at the first computing device, outputs, for transmission to the second computing device, the notification data.
Abstract:
A node of a synchronized network can receive a triggering input. The triggering input can be an input related to: receiving a packet from the synchronized network, sending a packet using the synchronized network, utilizing an application of the node, a sensor associated with the node, a user interface associated with the node, a location associated with the node, and/or a status of the node. The node can determine a synchronized network interface (SNI) that is associated with the triggering input and is configured with software for utilizing the synchronized network. The node can determine whether the software of the SNI is uninstalled on the node. After determining that the software of the SNI is uninstalled on the node, the node can receive, install, and execute the software of the SNI to utilize the synchronized network.