摘要:
Techniques to extract data from computer-readable purchase records of a user, cluster the items of interest based on descriptions of the items, and associate descriptive keywords to the clusters, where the keywords represent interests of the user. One or more processes and/or functions may be performed on extracted data, including cluster-specific processes and/or function, including user-based, user interest-based, and/or crowd-based processes and/or function, which may include shopping pattern extraction, item or types of items availability based on time, location and other contextual metric, pricing data of items and expected pricing changes over time and seasonal variations, identification of user preferences, and/or shopping recommendations.
摘要:
The present disclosure is directed to content protection for Data as a Service (DaaS). A device may receive encrypted data from a content provider via DaaS, the encrypted data comprising at least content for presentation on the device. For example, the content provider may utilize a secure multiplex transform (SMT) module in a trusted execution environment (TEE) module to generate encoded data from the content and digital rights management (DRM) data and to generate the encrypted data from the encoded data. The device may also comprise a TEE module including a secure demultiplex transform (SDT) module to decrypt the encoded data from the encrypted data and to decode the content and DRM data from the encoded data. The SMT and SDT modules may interact via a secure communication session to validate security, distribute decryption key(s), etc. In one embodiment, a trust broker may perform TEE module validation and key distribution.
摘要:
A mechanism is described for facilitating dynamically prioritized control of calls over a network according to one embodiment. A method of embodiments includes receiving, at a computing device, a call reporting an emergency, automatically evaluating the received call and the reported emergency, and assigning a priority level to the call based on the evaluation of the call and the emergency. The method may further include placing the call in a first queue based on the assigned priority level. The call may be picked from the first queue and processed based on the assigned priority level. Other embodiments are described and claimed.
摘要:
Various embodiments are generally directed to creating, sharing and various aspects of accessing information that is digitally stored in a data container on one or more computing devices. An apparatus comprises a processor circuit and a storage communicatively coupled to the processor circuit and storing a first sequence of instructions operative on the processor circuit to receive a signal indicating an access to a data container stored in the storage and comprising a protected data and a second sequence of instructions; and execute the second sequence of instructions, the second sequence of instructions operative on the processor circuit to examine security data associated with the apparatus and stored in the storage, and determine whether to grant access to the protected data based on the examination. Other embodiments are described and claimed herein.