Abstract:
Techniques for utilizing different versions of a same font when rendering subsequent portions of a content item. For instance, envision that a user requests to open an electronic book. In response to this request, a display controller may display the first page of the electronic book using a flashing update and, therefore, may display the text using a regular weight of a particular font. However, when the user subsequently requests to turn to the second page of the electronic book, the display controller (utilizing a non-flashing update) may update the display using a version of the same font having a lesser weight. Given that some level of bleeding with likely occur when using the non-flashing update, the lesser weight coupled with the bleeding may result in text that approximates the weight of the text of the first page of the electronic book.
Abstract:
Systems and approaches are provided for automating privacy control for a computing device based on a privacy or security context of the device. The privacy or security context of the computing device can be determined by analyzing sensor data or other input data captured by the device. The sensor and other input data can provide information such as a location of the computing device or the presence of other persons within the vicinity of the device to indicate whether the user is situated within a private or secure setting or a public or unsecure setting. A privacy or security control can be updated based on the determined privacy or security context, such as modifying a manner of displaying a pin or password during entry, elements of a home screen of the computing device, or preview content of user applications.
Abstract:
An adaptive navigation system anticipates a user's interactions with a device, modifying the device in the future based on past user movements and interactions. The system records a user's movement patterns and correlates movement patterns with how the user interacts with the device. When the movement patterns recur, the system modifies at least one behavior of the device based upon past interaction of the user with the device.
Abstract:
Users can switch between applications using contextual interface elements. These elements can include icons for applications determined to likely be accessed by the user for a current context. Information is gathered to determine the current context, then information such as patterns of historical usage are utilized to determine and rank the applications by likelihood of use. Different contexts can include different icons, and a given context can include different icons for different points in time or locations. A user can access a contextual interface element by performing a swipe motion, for example. The user can continue the motion to an area associated with an icon of interest, and perform an action such as a tap or release to cause the associated application to be launched. Such an approach enables a user to quickly and easily launch another application independent of the application currently active on the device.
Abstract:
Users can switch between applications using contextual interface elements. These elements can include icons for applications determined to likely be accessed by the user for a current context. Information is gathered to determine the current context, then information such as patterns of historical usage are utilized to determine and rank the applications by likelihood of use. Different contexts can include different icons, and a given context can include different icons for different points in time or locations. A user can access a contextual interface element by performing a swipe motion, for example. The user can continue the motion to an area associated with an icon of interest, and perform an action such as a tap or release to cause the associated application to be launched. Such an approach enables a user to quickly and easily launch another application independent of the application currently active on the device.
Abstract:
A content item to be displayed via a display of an electronic device may be associated with a first set of grey values or a set of color values. The electronic device may generate, maintain, or at least have access to one or more mappings that map the set of color values and/or the first set of grey values to a second set of grey values. Based on the one or more mappings, the electronic device may convert a color value of the set of color values or a first grey value of the first set of grey values to a second grey value of the second set of grey values. The content item may then be displayed utilizing the second grey value.
Abstract:
A content item to be displayed via a display of an electronic device may be associated with a first set of grey values or a set of color values. The electronic device may generate, maintain, or at least have access to one or more mappings that map the set of color values and/or the first set of grey values to a second set of grey values. Based on the one or more mappings, the electronic device may convert a color value of the set of color values or a first grey value of the first set of grey values to a second grey value of the second set of grey values. The content item may then be displayed utilizing the second grey value.
Abstract:
Techniques are described for determining height, weight, or other characteristics of a user based on processed sensor data. The sensor data may include data collected by sensors on the user's computing device or other computing devices, or data collected by stationary, external sensors. Different types of sensor data may be processed to estimate at least one physical characteristic of the user, such as the user's height, weight, apparel size, age, and so forth. The estimated characteristics may be employed to perform actions based on the user's identity or category, to customize content delivery for the user, or for other purposes.
Abstract:
In some examples, an electronic device may include one or more recognition devices able to be used to recognize a current user. If the electronic device recognizes that a primary user, such as an owner, is currently using the electronic device, the electronic device may allow access to all of the primary user's private information and all of the features of the electronic device. On the other hand, when the electronic device determines that the current user is an unknown user, or that the current user is a known user who is authorized to access only limited information or features of the electronic device, the electronic device may send a communication to restrict the current user from accessing private information of the primary user. In some cases, the electronic device may enable the primary user to designate which items known users and/or unknown users may access.
Abstract:
A system and method for identifying a user of a device includes comparing audio received by a device with acoustic fingerprint information to identify a user of the device. Image data, video data and other data may also be used in the identification of the user. Once the user is identified, operation of the device may be customized based on the user. Further, once the user is identified, data can be associated with the user, for example, usage data, location data, gender data, age data, dominant hand data of the user, and other data. This data can then be used to further customize the operation of the device to the specific user.