Abstract:
Disclosed herein are example embodiments for base station control for an unoccupied flying vehicle (UFV). For certain example embodiments, at least one machine, such as a base station, may: (i) obtain at least one indicator of at least one flight attribute corresponding to a first UFV; or (ii) transmit to a second UFV at least one indicator of at least one flight attribute corresponding to a first UFV. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Computationally implemented methods and systems include acquiring an offer to facilitate execution of one or more services that utilize a particular portion of a device, in exchange for access to the particular portion of the device, determining whether to accept the offer to facilitate execution of the one or more services and grant access to the particular portion of the device, and facilitating access to the particular portion upon a determination to accept the offer to facilitate the execution of the one or more services. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or drawings and/or elsewhere herein.
Abstract:
Computationally implemented methods and systems include detecting one or more user reactions of a user in response to a display to the user of an augmented view of an actual scene from a real environment, the augmented view that was displayed including one or more augmentations, and correlating the detected one or more user reactions with at least one or more aspects associated with the one or more augmentations that were included in the augmented view that was presented. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring one or more first augmentations for inclusion in a first augmented view of a first scene, displaying the first augmented view including the one or more first augmentations, and transmitting augmentation data associated with the one or more first augmentations to facilitate remote display of one or more second augmentations in a second augmented view of a second scene, the second scene having one or more visual items that are also included in the first scene. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include obtaining visual data of an actual view of a scene from a real environment, determining whether activity-inferring data that infers at least initial occurrence of one or more user activities associated with the scene from the real environment have at least been acquired, and presenting, in response at least in part to determining that the activity-inferring data have at least been acquired, an augmented view of the scene from the real environment, the augmented view including one or more augmentations that have been included into the augmented view based, at least in part, on the activity-inferring data. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or drawings and/or elsewhere herein.
Abstract:
Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-one encrypted data including at least one associated encrypted identifier; encrypting with a level-two encryption key at least a part of the level-one encrypted data to produce level-two encrypted data; receiving a hash of the at least one associated encrypted identifier; associating the hash with the level-two encrypted data; and transmitting the level-two encrypted data and associated hash of the at least one associated encrypted identifier.
Abstract:
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one identifier corresponding to the user to produce at least one encrypted identifier, wherein the at least one encrypted identifier also corresponds to the at least one instance of data for encryption; and transmitting the encrypted identifier to an encryption entity.
Abstract:
Disclosed herein are example embodiments for behavioral fingerprinting with retail monitoring. For certain example embodiments, one or more devices may: (i) communicate for at least one interaction related to a user of a user device in a behavioral fingerprint habitat; or (ii) administer at least an aspect of at least one interaction related to a user of a user device in a behavioral fingerprint habitat. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.