Abstract:
Technologies are generally described for providing instructional media for assembly of a product from multiple components. In some examples, a standalone or web-based application for assisting with assembly of items may be informed of the state of the ongoing unpacking and/or assembly through optically, wirelessly, or comparably readable tags associated with the individual components of a disassembled item. Based on received data on state of assembly and which parts a user is accessing, the application may select appropriate instructional media, including detection of when assembly has gone wrong in order to coach the user through the assembly process and/or corrections.
Abstract:
Technologies are generally described to implement intrusion detection based on smart power background. In some examples, upon detection of an attempt to access a resource, a power line ambiance may be determined at a location of a device on which the attempt to access the resource is executed. The power line ambiance may be based on a connection of the device and/or one or more other devices at the location to a power line. The captured/received power profiles may identify device signatures enabling generation of a digest of the location. An intrusion detection system (IDS), may receive the digest of the location and compare the digest to previous digests associated with an authorized client of the resource to evaluate an authenticity of the attempt. If the authenticity of the attempt is suspicious, the IDS may elevate security by employing one or more verification levels and/or one or more authentication techniques.
Abstract:
Technologies are described herein to use snapshot backups for licensing. Some example technologies may access a snapshot backup that is taken during an execution of a virtual machine on a server. One or more snapshot backups may be examined to detect applications that executed on the server at a time the snapshot backup was taken. A determination may be made as to what applications that were identified are subject to a license. Licensing information may be provided that includes information associated with the one or more of the applications that are subject to the license.
Abstract:
Technologies are generally described for systems, devices and methods effective to allow a network element to retrieve a control command. In some examples, a network controller device may associate an identifier with the control command. The network controller device may send the identifier and the associated control command over a first network with a first level of security to a computing device. The network controller device may send an activation signal to the network element over a second network with a second level of security different from the first level of security. The network controller device may send the identifier to the network element over the second network. The identifier may be effective to allow the network element to retrieve the control command.
Abstract:
An antenna relay system for facilitating wireless communication between mobile terminals on a high-speed rail vehicle and stationary base stations with substantially reduced Doppler shift effects comprises matched traveling wave directional antennas mounted to a high-speed rail vehicle and positioned collinearly alongside the railway. Both antennas continually transmit and receive at a fixed angle relative to the motion of the train so as to circumvent the Doppler shift. The signal transmitted or received by the stationary antenna is conducted to a nearest node for communication with an access network.
Abstract:
Technologies are generally described for modifying sound output in a personal communication device. Example devices described herein may include one or more of a communication unit, an audio processor, and/or a sound leakage detector. A communication signal may be received from the other party during personal communication by the communication unit. The communication signal may be converted by the audio processor into receiver sound for output by a receiver speaker. The sound leakage detector may provide a sound leakage indication if the sound leakage detector receives an input indicating a leakage of the receiver sound being output by the receiver speaker. Further, the audio processor may modify the receiver sound based on the sound leakage indication.
Abstract:
Technologies are generally described to redirect local storage for embedded applications. In some examples, a computing device such as a redirection router, coupled to network-attached storage, may detect a request for an application being delivered from a server to a destination device such as a ubicomp device and intercept the requested application. The redirection router may determine whether the destination device has sufficient local storage. In response to determination that the destination device does not have sufficient local storage or a predefined configuration such as requesting device being configured for local storage, a reference to the client-side storage associated with the application may be replaced with a link, to the network-attached storage prior to delivery of the application. Subsequent retrievals of the application or portions thereof may be from the network-attached storage directly or via the redirection router.
Abstract:
Technologies are generally described to store data in single-level memory using rank modulation. In some examples, data to be encoded to single-level memory may be represented with a bit ranking for a group of bits. A program vector may then be determined from the bit ranking and partial program characteristics associated with the memory group(s). The memory group(s) may then be programmed according to the program vector. The encoded data may be subsequently retrieved by performing a series of partial programming operations on the memory group(s) to recover the bit ranking and derive the data represented.
Abstract:
Devices, films, and methods for the detection of target molecules are provided. The devices, films and methods can include graded layers and a vibration detecting unit. The vibration detecting unit can be a convex or an inverse mesa vibration detecting unit.