Abstract:
Methods and apparatus are disclosed to apply permissions to applications. A disclosed example apparatus includes an address trust manager to obtain a first network address having a request for address authentication from a first entity, the first network address having a second network address associated with a second entity to execute the application, an address associator to compare the first network address to a trusted address database to determine whether the first network address is trusted, and a shadow environment communicator to generate a signed message based on the comparison of the trusted address database, the address trust manager to transmit the signed message to the second entity with an indication of authorization via the first network address in response to a match in the trusted address database, and transmit the signed message to the second entity with an indication of non-authorization via the first network address in response to a lack of a match in the trusted address database.
Abstract:
Example methods disclosed herein to provide a map to a wireless device include, in response to a request received from the wireless device, processing wireless session records to determine respective status of a plurality of wireless services in a first geographic region associated with the wireless device. Disclosed example methods also include, based on the processing of the wireless session records, generating map data identifying a location of the wireless device, a status of a first one of the wireless services in a second geographic region included in the first geographic region, and a status of a second one of the wireless services in a third geographic region included in the first geographic region. Disclosed example methods further include transmitting the map data to the wireless device.
Abstract:
Example methods disclosed herein to provide a map to a wireless device include, in response to a request received from the wireless device, processing wireless session records to determine respective status of a plurality of wireless services in a first geographic region associated with the wireless device. Disclosed example methods also include, based on the processing of the wireless session records, generating map data identifying a location of the wireless device, a status of a first one of the wireless services in a second geographic region included in the first geographic region, and a status of a second one of the wireless services in a third geographic region included in the first geographic region. Disclosed example methods further include transmitting the map data to the wireless device.
Abstract:
Methods, systems, and devices are disclosed for producing and delivering packetized power within a DC computing environment. Within the DC computing environment a power requirement or request is communicated to a power router. The power router then determines a power source capable of fulfilling the power requirement and then causes the power to be delivered in packetized form. The packetized power is appended to a message header which allows the power packet to be received by the requesting device.
Abstract:
Methods, systems, and products aggregate and distribute changes of state between devices. A plurality of devices communicates with an aggregator. The plurality of devices sends their respective changes of state to the aggregator. The aggregator queries a set of interaction rules to determine how the change of state is disseminated among the plurality of devices.
Abstract:
Methods and systems respectively provide for receiving a wireless signal coverage map request from a wireless device. A map is generated in accordance with the request and provided to the wireless device. The map includes symbology keyed to wireless signal services within a particular geographic area. Such symbology can be indicative of recommended areas and travel routes having particular types of wireless signal coverage, regions of poor or non-existent wireless signal service, areas presently experiencing heavy wireless signal usage, and so on. In this way, a wireless device user can seek to access specific wireless services and/or avoid suspect trouble regions within a geographic area.
Abstract:
A processing system including at least one processor may identify a user viewpoint of a user at a first venue, match a viewpoint at a second venue to the user viewpoint of the user at the first venue, detect a trigger condition to provide visual content of the second venue to the user at the first venue, obtain the visual content of the second venue, wherein the visual content of the second venue is obtained from the viewpoint at the second venue, and provide the visual content of the second venue to an augmented reality device of the user at the first venue, where the augmented reality device presents the visual content of the second venue as a visual overlay within a field of view of the user.
Abstract:
A processing system deployed in a carrier transport vehicle may establish a wireless communication session with a mobile device of a user, assign a zone of the carrier transport vehicle to the user, the zone including a plurality of network-connected devices, obtain a user profile from the mobile device of the user, determine at least one biometric sensor accessible via the mobile device of the user, obtain biometric data of the user from the at least one biometric sensor accessible via the mobile device of the user, determine a condition of the user based upon the biometric data, identify at least one adjustment to at least one of the plurality of network-connected devices in response to the condition of the user that is determined and the user profile, and apply the at least one adjustment to the at least one of the plurality of network-connected devices.
Abstract:
A processing system including at least one processor may monitor a condition of a premises during a time period via at least one sensor, where at least one user is permitted a use of the premises during the time period, detect a change in the condition of the premises during the time period via the at least one sensor, determine a violation of at least one rule relating to the use of the premises by the at least one user, wherein the violation is indicated by the change in the condition, and generate an alert of the violation of the at least one rule relating to the use of the premises by the at least one user.
Abstract:
The disclosed technology is directed towards facilitating communication with an unknown person via a device of the person having an unknown communications address. The presence of a visible person at a location can be determined, and a communications device at or near that location can be detected as a candidate device associated with that person. The device's current location, which can be regularly registered along with its communication address, is matched to the person's visible location. Communication via the device, such as by a responder, whether with the person and/or to obtain information from the device, is based on the registered communication address. The person's identity and other data may be obtainable. For a non-visible person, e.g., underneath an obstruction, the location of a detected device predicts the likely presence of a person near that location. A map may be generated showing locations of multiple detected devices.