Abstract:
A system includes a first mobile device configured to initiate communication with at least one other mobile device. The first mobile device includes a status indicator configured to provide a persistent visual indication to a user of the status of a mute function of the first user device during the active communication. The first mobile device further includes a user interface configured to receive predefined user input and allow the user to toggle between mute and un-mute states based on the user input regardless of whether a display of the device is shut off and/or the user interface is locked.
Abstract:
Apparatuses, methods, and systems to assist a visually-impaired user. Embodiments include a 3D depth camera to be worn or co-located with the visually-impaired user to collect data to recognize an object in an environment and to collect data to locate the object relative to the visually-impaired user in the environment; and a speech-based interaction device to communicate to the visually-impaired user recognition and location of the object based on the data collected by the 3D depth camera. Embodiments may include use of a haptic feedback device to provide tactile feedback to the visually-impaired user to positively or negatively reinforce a location of the visually-impaired user relative to the object to allow the user to grasp the object. Other embodiments may also be described and claimed.
Abstract:
A system, devices, and methods for providing a personalized search library based on continual concept correlation include a client computing device and a personalized content server. Content events representing content accessed or manipulated by a user of the client computing device are continually generated. Content associated with the content events is continually parsed and analyzed to extract main concepts. The extracted concepts are correlated and weighted into a concept model, based on the order of the content events. The concept model parallels the structure of the user's memory. Data sources are continually searched for content relevant to a current context of the concept model. Relevant content is indexed according to the concept model. The relevant content may be made available to the user upon request or proactively. Relevant content may be cached for future use by the user. Other embodiments are described and claimed.
Abstract:
Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password.
Abstract:
Technologies for handling a call based on user identification include determining a personal profile identification for a user of a communal mobile communication device and initiating a call to a personal communication device using a phone number of the personal communication device and the personal profile identification. The personal communication device may apply a call treatment to the incoming call based on the personal profile identification. Additionally, the personal communication device may originate a call to a call recipient of the communal mobile communication device using a personal profile identification to identify the call recipient. The communal mobile communication device may apply a call treatment to the incoming call based on the personal profile identification.
Abstract:
Technologies for handling a call based on user identification include determining a personal profile identification for a user of a communal mobile communication device and initiating a call to a personal communication device using a phone number of the personal communication device and the personal profile identification. The personal communication device may apply a call treatment to the incoming call based on the personal profile identification. Additionally, the personal communication device may originate a call to a call recipient of the communal mobile communication device using a personal profile identification to identify the call recipient. The communal mobile communication device may apply a call treatment to the incoming call based on the personal profile identification.
Abstract:
System and techniques for computer vision assisted item search are described herein. A composite image, including visual data and depth data, may be obtained. The composite image may be filtered to isolate a clothing article represented in the composite image. A classifier may be applied to the depth data to produce a set of clothing attributes for the clothing article. The clothing attributes may then be provided to a remote device.
Abstract:
An embodiment of a semiconductor apparatus may include technology to receive a request to modify a configuration of a persistent storage media, and repurpose a region of the persistent storage media from a first number of bits per cell to a second number of bits per cell in response to the request. Other embodiments are disclosed and claimed.
Abstract:
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTP.
Abstract:
Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password.