摘要:
Embodiments include an article of manufacture, apparatus, device, system, computer-program product, and method. In an embodiment, an article of manufacture includes a writing surface having at least two regions that accept handwriting. Each region of the at least two regions that accept handwriting respectively includes a unique user-understandable identifier and a unique machine-distinguishable identifier keyed to a data receptor.
摘要:
A computationally implemented method includes, but is not limited to: determining that a computing device that was presenting one or more portions of one or more items and that was in possession of a first user has been transferred from the first user to a second user; and marking, in response to said determining, the one or more portions of the one or more items to facilitate the computing device in returning to the one or more portions upon the computing device being at least transferred back to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
In certain aspects, designating an attribute of at least one shared image at least partially with a designating shared image device that can be utilized to capture an image with at least one capturing shared image device. In other aspects, synchronizing a capturing shared image device to a sharing session in a manner that at least partially allows conveying between the capturing shared image device with at least another shared image device at least some shared images captured during the sharing session.
摘要:
A computationally implemented system and method that is designed to, but is not limited to: determining which of a plurality of users detected in proximate vicinity of a computing device has primary control of the computing device; and providing a particular level of access, via the computing device, to one or more items, the particular level of access to be provided to the one or more items being in response, at least in part, to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
In one aspect, a method related to data management. In addition, other method, system, and program product aspects are described in the claims, drawings, and/or text forming a part of the present application.
摘要:
Various methods and systems include exemplary implementations for a security-activated operational component. Possible embodiments include but are not limited to obtaining access to an object data file configured to implement various functional operation regarding one or more objects; verifying validity of an authorization code associated with the object data file; and controlling operation of the operational component to enable or prevent its activation pursuant to the authorization code in accordance with one or more predetermined conditions.
摘要:
A computationally implemented method includes, but is not limited to: determining that a computing device that was presenting an item has been transferred from a first user to a second user; and presenting, via the computing device, one or more highlighted portions of the item, the one or more highlighted portions being highlighted in response, at least in part, to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
摘要:
A system comprising includes a first device, a second device, and logic to enable the first and second devices to pair as a result of at least one sound.