Abstract:
Technologies are generally described for matching sponsored game content to location by genre and playability. In some examples, a search system for finding real-environment matched gaming content for a user based at least partially on analyzed properties of potential locations may employ game script/flow information and match against local features from map data to screen content for which a game plot can be executed across appropriate areas and transitions or other physical requirements. Additionally, a broker server system may enable businesses to advertise or sponsor a game in order to get the game set up in their location. A keyword auction or similar process may be used during keyword related game organization that is also within specific geographic locations such that the game is set up with the auction winner's location as a plot related-location.
Abstract:
Technologies are described herein to manage the replacement of routing rules. Some example technologies may receive a request to replace one or more active rules in a routing device with one or more stored rules. Each of the active rules and the stored rules may specify a routing rule that specifies how to route packets within a network. The active rules may be routing rules that are actively being used by the routing device. The stored rules may be routing rules that are not currently in use by the routing device. A determination may be made as to whether a number of active rule replacements for the routing device exceeds a threshold. In response to determining that the number of the active rule replacements exceeds the threshold, the request to replace the one or more active rules in the routing device may be denied.
Abstract:
Technologies are described herein for optimizing resource utilization in a collection of devices having hierarchical network layers. Some example technologies may identify packets exchanged between processes executed on collections of server computers. The hierarchical network layers may couple the collections of server computers. The technologies may determine virtual machine groups based on the identified packets. Each of the virtual machine groups may identify one or more virtual machines configured on the collections of server computers to execute one or more processes. The virtual machine groups may be configured to increase data traffic in a lower layer in the hierarchical network layers and to decrease the data traffic in a higher layer in the hierarchical network layers. The technologies may relocate the virtual machines between the collections of server computers according to the virtual machine groups.
Abstract:
Technologies are presented for distributing user interface elements and controls among devices. A user may select an element and/or control of a user interlace (UI) of a first application displayed on a first device for shifting to one or more other devices. The additional display area at the first device treed up by the shift may be filled with additional application content or UI elements. The shifted element and/or control may remain usable on the one or more other devices the element and/or control shifted to. Overall, a user may be able to remove and redirect application control elements while viewing additional content on the first device in a fast and transparent process.
Abstract:
Technologies are generally described for systems, devices and methods effective to generate a message that may be sent to a social network. Power information from an electronic device may be detected by a power detector and received by a processor. For example, a power consumption profile of an appliance may be detected. The processor may classify the power information to produce descriptive data. For example, the processor may determine that an oven has been turned on for a period of time. The processor may generate the message by applying one or more rules to the descriptive data. For example, the processor may generate a message relating to consumption of dinner based on the determination that the oven has been turned on.
Abstract:
Technologies related to continuous world switch security are generally described. In some examples, a world switch indicator may indicate whether continuous world switch security is on or off for a cloud customer. A hypervisor world switch security setting may be activated and deactivated, according to the world switch indicator, to optionally allow world switches and not context switches between virtual machines executed by a cloud server. Continuous world switch security may optionally be controlled by a cloud customer. Load balancing, cloud customer billing and other techniques are also disclosed to accommodate the activation/deactivation of continuous world switch security.
Abstract:
Technologies related to intermediary graphics rendition are generally described. In some examples, an intermediary computing device may store graphics models in a model store. A server computing device may generate and send a compositing flow to the intermediary computing device. The compositing flow may comprise model identifiers and model rendering information. The intermediary computing device may retrieve models identified in the compositing flow from the model store, and provide the identified models and model rendering information to a Graphics Processing Unit (GPU) for rendering. The GPU may render graphics for delivery via a network to a client device.
Abstract:
Technologies are described for display of a merged image on a display. A processor may receive first data that relates to a first image of a real object and second data that relates to a second image of a virtual object. The second image, if displayed, may overlap, in an overlap region, at least part of the first image if the first image were displayed. The processor may identify an overlap part in the first data that corresponds to the overlap region, clip the overlap part from the first data to produce clipped data, and blur the clipped data to produce blurred data. The processor may subtract the clipped data from the blurred data to produce an additive blur component, add the additive blur component to the second data to produce merged data, and generate the merged image to be displayed on the display based on the merged data.
Abstract:
Technologies are generally described that relate to facilitating evaluation of payment fencing information and determination of rewards. An example method may include receiving, by a device comprising a processor, first electronic information indicative of a purchase for travel by a first entity; and determining second electronic information indicative of a rebate associated with the travel, wherein the determining is based on receipt of payment fencing information related to the travel. In some embodiments, the method includes determining the level of completeness, quality and/or precision of the payment fencing information. For example, the completeness, quality and/or precision can be determined based on a predictable travel range of the first entity or a corresponding travel uncertainty of the first entity.
Abstract:
Technologies are generally described for a three dimensional user interface in augmented reality. In some examples, a method for generating a virtual object in a display area may include generating a first virtual object in the display area with use of at least two viewing cones generated by a display. The method may further include receiving spatial data that relates to a location of a real object in the display area and determining that the real object is interfering with at least one of the viewing cones. The method may further include generating a second virtual object corresponding to the first virtual object. The second virtual object may be located between the display and the location of the real object.