Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a processing system that analyses, without user intervention, content of a first message directed from equipment of a sending user to equipment of a receiving user, to identify a task. The processing system determines that the receiving user is unable to perform the task according to biometric data of the receiving user. The biometric data is selected from one of heart rate, blood pressure, respiratory rate, and combinations thereof. According to the content of the first message and the biometric data obtained from the receiving user, the processing system determines that the task should be delegated to another user, and responsive thereto, provides a second message associated with the task to equipment of the other user. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
Abstract:
A processing system including at least one processor may obtain a parking request for a vehicle to park at a parking facility and may offer a plurality of parking spots of the parking facility for the vehicle, where at least one of the plurality of parking spots that is offered is a parking spot that is predicted to be available, and where the offering includes presenting information regarding predicted adjacent parking spot occupancy of the at least one of the plurality of parking spots for a duration of an intended stay of the vehicle at the parking facility. The processing system may then obtain a selection of a parking spot from among the plurality of parking spots and reserve the parking spot for the vehicle.
Abstract:
A processing system including at least one processor may transmit a notification of a presence of an emergency service vehicle to a plurality of entities, obtain, from at least a first entity of the plurality of entities, at least a first acknowledgement of the presence of the emergency service vehicle, determine that at least a second acknowledgement is not obtained from at least a second entity of the plurality of entities, and present information associated with the at least the second entity to a device of the emergency service vehicle.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a processing system that analyses, without user intervention, content of a first message directed from equipment of a sending user to equipment of a receiving user, to identify a task. The processing system determines that that the receiving user is unable to perform the task according to biometric data of the receiving user. The biometric data is selected from one of heart rate, blood pressure, respiratory rate, and combinations thereof. According to the content of the first message and the biometric data obtained from the receiving user, the processing system determines that the task should be delegated to another user, and responsive thereto, provides a second message associated with the task to equipment of the another user. Other embodiments are disclosed.
Abstract:
A method includes transmitting, from a first device, a message indicating that the first device is available to share a resource. The method includes receiving, at the first device, a request to use the resource, the request received from a second device, where the request includes identification information. The method includes, based on a determination that the second device is unknown to the first device, determining whether the second device is authenticated based on the authentication information. The method includes receiving, at the first device from the second device, settings information associated with the resource and adjusting a setting of the first device based on the settings information. The method also includes, based on determining that the second device is authenticated, sharing the resource of the first device with the second device.
Abstract:
Concepts and technologies are disclosed herein for predictive determination of actions. According to one aspect of the concepts and technologies disclosed herein, a user device can receive input via a user input interface. The user input interface is application agnostic. The user device can analyze the input to determine an action option. The action option can include an action to be performed by the user device if selected. The user device also can present the action option for selection.
Abstract:
Wireless pairing is automatically performed based on purchase. By providing a unique identifier and/or account number (such as a credit card number), a wireless device is automatically paired to a wireless network.
Abstract:
A method, computer-readable storage device and apparatus for establishing an ad hoc communication with an unknown contact are disclosed. For example, the method receives an authentication token from a recipient endpoint device for authentication of an unsolicited message from a sender endpoint device, wherein the recipient endpoint device is an unknown contact to the sender endpoint device and the unsolicited message is sent over an open communications protocol, authenticates the authentication token, and sends a confirmation that the authentication token is authenticated to the recipient endpoint device to allow the recipient endpoint device to establish a connection to the sender endpoint device to begin the ad hoc communication.
Abstract:
Providing and using a digital asset delivery service can include obtaining a digital asset delivery request that identifies a digital asset that is to be provided to a recipient device, the recipient device, and delivery requirements associated with providing the digital asset to the recipient device. A data source and a network resource via which the data source is to provide the digital asset to the recipient device can be determined, where the data source and the network resource are capable of satisfying the delivery requirements. A ledger that includes instructions for constructing the digital asset at the recipient device can be provided to the recipient device. Delivery of the digital asset to the recipient device by the data source can be triggered, and delivery of the digital asset to the recipient device by the data source can be tracked using a token.