Abstract:
Technologies for light exposure analysis include a computer configured to collect light data of an environment and a remote computer communicatively coupled to the computer. The remote computer is configured to receive/retrieve health information for one or more users and analyze the health information to generate a health profile for each of the one or more users. Additionally, the remote computer is configured to determine whether any correlations exist between the health profiles and the light data. The remote computer is further configured to analyze the collected light data against one or more health profiles to determine a desired lighting condition for a user based at least in part on the correlations between the health profiles and the light data. Other embodiments are described and claimed.
Abstract:
Technologies for adaptive audio communications include a telecommunications device configured to collect session data of a communication session that includes an audio stream between a user of the telecommunications device and at least one other user of a remote telecommunications device. The telecommunications device is further configured to determine a session context of the communication session based on the collected session data, determine whether the session data includes an anomaly, and adjust, in response to a determination that the anomaly was detected, at least one of a portion of the audio stream of the communication session and a setting of the telecommunications device based on the anomaly. Other embodiments are described and claimed.
Abstract:
Embodiments of the present invention provides fiberizable glass compositions formed from batch compositions comprising amounts of one or more glassy minerals, including perlite and/or pumice.
Abstract:
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTP.
Abstract:
Methods, apparatus, systems and articles of manufacture are disclosed to pair devices to an in-body network. An example apparatus disclosed herein includes a device capability manager to identify remote sensors associated with a candidate medical device, an encryption engine to provide the candidate medical device with hashing instructions to be applied to input values from selected ones of the remote sensors, a measurement engine to acquire input values from local sensors corresponding to the selected ones of the available remote sensors during a measurement schedule, the encryption engine to apply the hashing instructions to the input values from the local sensors, and a pairing engine to authorize the candidate medical device when an encryption key associated with the remote sensors includes a threshold indication of parity with an encryption key associated with the local sensors.
Abstract:
Methods, systems, apparatus and articles of manufacture are disclosed to secure devices. An example disclosed apparatus includes a platform detector to determine when the device is within a threshold proximity to a platform, a device locking manager to initiate a locking service for the device when within the threshold proximity, and a device tampering manager to initiate a tampering remedy in response to detecting an indication of tampering.
Abstract:
An embodiment includes a method executed by at least one processor comprising: an out-of-band cryptoprocessor receiving security credentials from a battery, which is included in a mobile computing node that comprises the at least one processor, while the mobile computing node is engaged in at least one of (a) booting, and (b) exchanging the battery after booting and during run-time; the cryptoprocessor accessing an authentication key; and the cryptoprocessor successfully authenticating the battery, via out-of-band processing, based on the security credentials and the authentication key. In an embodiment the security credentials are included in a certificate. Other embodiments are described herein.
Abstract:
Various systems and methods for organizing knowledge are described herein. A context of a browsing session of a plurality of online resources is identified. User browsing behavior during browsing of the plurality of online resources is tracked. Using a computing device, a relevance metric of the plurality of online resources is determined using the user browsing behavior, with the relevance metric measuring a relevance of the plurality of online resources in view of the context. The relevance metric, an indicia of the context, and the plurality of online resources are stored in a database on the computing device.
Abstract:
Systems, devices, and methods used to provide real-time product information for retail products and services are generally disclosed herein. One example embodiment includes a referral application operating on a smartphone, configured to correlate data from multiple sources and provide context-aware recommendations and information relevant to a product or service being evaluated by a consumer in the physical shopping environment (such as a retail store). For example, the data may be obtained from a retailer's product information database, a retailer's competitor information database, an advertiser information database, an Internet-hosted service, a social network, or similar internal or external information sources. The real-time product information may be correlated, aggregated, and displayed to the user to either facilitate the retail purchase in the store, or encourage another online or retail purchase. Techniques for providing location-based advertisements and tailored product offerings based on the user's shopping activity are also described herein.
Abstract:
Embodiments for anomaly detection on a web client are generally described herein. A processor on the web client is monitored, where a web browser is installed on the web client, with the web browser arranged to render a web page, the web page including content originating from a plurality of origins. A request from the web page to store data on the web client is intercepted, with the request originating from a particular origin of the plurality of origins. The request is analyzed and approved or denied based on the particular origin.