Abstract:
One embodiment of a guest browser system, among others, includes a guest browser interface configured to provide an address bar interface for accepting a network address for retrieving a first web page. The guest browser interface is rendered from code of a second web page, where content of the second web page is rendered by an installed web browser. The system further includes a guest browser engine configured to retrieve contents of web pages. The guest browser engine is built from code provided by the second web page and is used to update content of the second web page with content from the first web page. Other systems and methods are also provided.
Abstract:
Methods, computer program products and systems for providing video tracking. The method includes receiving a first signal from a radio frequency identification (RFID) tag. A location of the RFID tag is determined in response to the first signal. An image that includes the location of the RFID tag is recorded. The location of the RFID tag is marked on the image, resulting in a marked image.
Abstract:
Methods, computer program products and systems for providing video tracking. The method includes receiving a first signal from a radio frequency identification (RFID) tag. A location of the RFID tag is determined in response to the first signal. An image that includes the location of the RFID tag is recorded. The location of the RFID tag is marked on the image, resulting in a marked image.
Abstract:
Methods and apparatus are disclosed to apply permissions to applications. A disclosed example apparatus includes an address trust manager to obtain a first network address having a request for address authentication from a first entity, the first network address having a second network address associated with a second entity to execute the application, an address associator to compare the first network address to a trusted address database to determine whether the first network address is trusted, and a shadow environment communicator to generate a signed message based on the comparison of the trusted address database, the address trust manager to transmit the signed message to the second entity with an indication of authorization via the first network address in response to a match in the trusted address database, and transmit the signed message to the second entity with an indication of non-authorization via the first network address in response to a lack of a match in the trusted address database.
Abstract:
Mechanisms for light management include a light emitting diode (LED) light bulb. The LED light bulb includes multiple light emitting diodes (LEDs) configured for illumination in the LED light bulb and includes a battery. A base is configured to fit a standard socket designed for an incandescent light bulb, and the base is configured to operatively connect to an electrical power source. A module is operative to detect a residual voltage of the power source when a control for powering the LED light bulb is powered off. The module is configured to determine that a power outage occurred and operative to switch to battery power from the battery in response to not detecting the residual voltage of the power source.
Abstract:
The disclosed technology is directed towards presenting communications data to a responding entity that are relevant to an emergency situation at an emergency location. The communications data can be obtained from communications (e.g., text messages, transmitted video, voice calls and the like) that involve at least one user device at the situation, including communications that do not involve the responding entity. Users may opt in to such an emergency service to allow access to their communications, whereby their device locations are tracked and known in the event of an emergency. Upon obtaining the communications data, a responder can receive a view of the scene augmented with the communications data. The view can include a three-dimensional and/or two-dimensional representation of the zone/area of the emergency situation. Filtering can be used to eliminate irrelevant communications, and summarization can be used to combine generally redundant communications.
Abstract:
The disclosed technology is directed towards associating a rescue tag with a victim in need of rescue, in which the rescue tag collects condition (biological state) data associated with the victim and provides a location of the rescue tag. The location data is maintained in association with the condition data. A responder makes a request to output the condition data, and in response, the responder's device is presented with an augmented reality display that shows the victim condition data relative to the location data. Multiple victims can be efficiently triaged, with more urgent victims highlighted via augmented reality for more urgent treatment. Filtering as requested by a responder can present augmented reality display for only a subset of the victims. Also described is the use of an aerial vehicle to assist the responders and/or a command center; the aerial vehicle can act as an edge node for efficient communication.
Abstract:
A processing system including at least one processor may capture a video of a preparation area for a consumable item, may identify at least one item in the video, the at least one item comprising at least one of: at least one ingredient of the consumable item, or at least one tool for preparing the consumable item, and may identify annotation content for the at least one item. The processing system may then modify the video to generate a modified video that includes a visual marker associated with the annotation content and present the modified video via a device associated with a user to be served the consumable item.
Abstract:
The disclosed technology is directed towards generating an annotated visual playback of an incident. Upon obtaining notification of an incident, event data occurring in the incident zone and timeframe are obtained (e.g., collected) from sensors proximate the zone. The event data is used to annotate a visual playback captured by one or more cameras, e.g., within a timeframe ranging from some time before the incident occurred to the end of the incident. For example, a video can be presented with overlaid annotation data, each annotation describing an event as it occurred in time, in conjunction with an advancing timestamp overlay showing the time of the video frames. A simulated video, e.g., extended reality video, can also be generated, along with annotations and timeframe data, such as if captured from camera(s) from one or more various different perspectives.
Abstract:
Concepts and technologies disclosed herein are directed to pictograms as digitally recognizable tangible controls. According to one aspect disclosed herein, a user system can include a processing component and a memory component. The memory component can include instructions of a pictogram digitization module. The user system can capture, via a camera component, an image containing a pictogram that is a digitally recognizable tangible manifestation of a digital control. The user system can determine, via the pictogram digitization module, the digital control associated with the pictogram. The user system can implement, via the pictogram digitization module, the digital control. The digital control can include a digital content, an action, or a context. The user system can create, via the pictogram digitization module, a digital interface that includes the digital control. In some embodiments, the pictogram includes a formal pictogram. In other embodiments, the pictogram includes an informal pictogram.