Abstract:
Gestures may be performed to control a visual projector. When a device or human hand is placed into a projection field of the visual projector, the visual projector responds to gestures. The human hand, for example, may gesture to rotate a projected image or to correct the projected image. The visual projector may thus manipulate and/or correct the projected image in response to the gesture.
Abstract:
Concepts and technologies for optical environmental filtering with intrusion protection are provided. In an embodiment, a system can include a first intrusion detection frame structure, a second intrusion detection frame structure, a controller unit, and a laser filter frame structure that is disposed between the first intrusion detection frame structure and the second intrusion detection frame structure. The laser filter frame structure can include at least one laser emitter that projects at least one laser beam that forms a laser emission plane between the first light intrusion plane and the second light intrusion plane. The controller unit can activate at least one laser emitter, and in response to detecting an object passing through the first light intrusion plane, deactivate a laser emitter to pause creation of the laser emission plane. The controller can reactivate a laser emitter before the object passes through the second light intrusion plane.
Abstract:
Methods and apparatus for providing access to a service are disclosed. An example method includes analyzing a received request to verify a requesting device, the received request identifying multicast group memberships of the requesting device. Access is provided to the service in response to verifying the requesting device using the multicast group memberships.
Abstract:
Gestures may be performed to control a visual projector. When a device or human hand is placed into a projection field of the visual projector, the visual projector responds to gestures. The human hand, for example, may gesture to rotate a projected image or to correct the projected image. The visual projector may thus manipulate and/or correct the projected image in response to the gesture.
Abstract:
Hand gestures may be performed to control a visual projector. When a human hand is placed into a projection field of the visual projector, the visual projector responds to hand gestures performed by the human hand. The human hand, for example, may gesture to rotate a projected image or to correct the projected image. The visual projector may thus manipulate and/or correct the projected image in response to the gesture performed by the human hand.
Abstract:
Methods and apparatus are disclosed to apply permissions to applications. A disclosed example apparatus includes an address trust manager to obtain a first network address having a request for address authentication from a first entity, the first network address having a second network address associated with a second entity to execute the application, an address associator to compare the first network address to a trusted address database to determine whether the first network address is trusted, and a shadow environment communicator to generate a signed message based on the comparison of the trusted address database, the address trust manager to transmit the signed message to the second entity with an indication of authorization via the first network address in response to a match in the trusted address database, and transmit the signed message to the second entity with an indication of non-authorization via the first network address in response to a lack of a match in the trusted address database.
Abstract:
Methods and apparatus for providing access to a service are disclosed. An example apparatus includes at least one processor, and memory including machine readable instructions that, when executed, cause the at least one processor to perform operations including, in response to receipt of a first network communication, retrieve a first list identifying multicast group memberships of a device existing at a first time, the first list retrieved from a storage device based on an identifier in the first network communication, the first network communication including a second list identifying multicast group memberships of the device existing at a second time later than the first time. The device is authenticated based on a comparison of the first list to the second list. A second network communication is transmitted indicating the device has been authenticated in response to the authentication.
Abstract:
A method of aggregating medical information can include receiving, at a remote aggregation system, individual syndromes collected by mobile personal medical devices associated with respective bodies as the mobile personal medical devices move within an environment, aggregating the individual syndromes at the remote aggregation system, and determining whether an environmental syndrome exists for at least some of the individual syndromes. Related systems and computer program products are also disclosed.
Abstract:
A method of aggregating medical information can include receiving, at a remote aggregation system, individual syndromes collected by mobile personal medical devices associated with respective bodies as the mobile personal medical devices move within an environment, aggregating the individual syndromes at the remote aggregation system, and determining whether an environmental syndrome exists for at least some of the individual syndromes. Related systems and computer program products are also disclosed.
Abstract:
Methods and apparatus for providing access to a service are disclosed. An example apparatus includes at least one processor, and memory including machine readable instructions that, when executed, cause the at least one processor to perform operations including, in response to receipt of a first network communication, retrieve a first list identifying multicast group memberships of a device existing at a first time, the first list retrieved from a storage device based on an identifier in the first network communication, the first network communication including a second list identifying multicast group memberships of the device existing at a second time later than the first time. The device is authenticated based on a comparison of the first list to the second list. A second network communication is transmitted indicating the device has been authenticated in response to the authentication.