Abstract:
A system includes a first mobile device configured to initiate communication with at least one other mobile device. The first mobile device includes a status indicator configured to provide a persistent visual indication to a user of the status of a mute function of the first user device during the active communication. The first mobile device further includes a user interface configured to receive predefined user input and allow the user to toggle between mute and un-mute states based on the user input regardless of whether a display of the device is shut off and/or the user interface is locked.
Abstract:
Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented. Other embodiments are described and claimed.
Abstract:
Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented.
Abstract:
Technologies for managing sensor malfunctions in a compute system include detecting a malfunctioning sensor of the compute system and determining a sensor function performed by the malfunctioning sensor. In response to detection of the malfunctioning sensor, a different sensor of the compute system is selected to perform the sensor function of the malfunctioning sensor. The selected sensor may be of a different sensor type relative to the sensor type of the malfunctioning sensor. The compute system subsequently performs the sensor function of the malfunctioning sensor using the selected sensor. To do so, the compute system may increase, modify, or adjust the manner in which the sensor data from the selected sensor is processed.
Abstract:
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTP.
Abstract:
Apparatuses, methods and storage medium associated with providing mobile cloud proxy service to mobile client devices are disclosed. In embodiments, a mobile cloud proxy device may include a cloud proxy server to provide the cloud proxy service to the mobile client devices while the mobile client devices are within a mobile cloud proxy service area serviced by the cloud proxy server. The cloud proxy server may include a device and service area management module to manage the mobile cloud proxy service area and the one or more mobile client devices, and a policy and service management module to manage and provide the mobile cloud proxy service in accordance with one or more cloud proxy service policies. Other embodiments may be disclosed and/or claimed.
Abstract:
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTP.
Abstract:
Technologies for controlling vision correction of a wearable computing device includes controlling an opacity of an adjustable lens of the wearable computing device to generate a viewing port through the adjustable lens such that a region defined by the viewing port has an opacity less than a remaining region of the adjustable lens. For example, the opacity of the adjustable lens may be increased except for the region defined by the viewing port. In use, the wearable computing device may adjust the location, size, and/or shape of the viewing port based on a predefined prescription, the direction of the user's gaze, the user's viewing context, and/or other criteria. Additionally or alternatively, an image may be displayed on an external display surface of the adjustable lens. The wearable computing device may include multiple adjustable lens, each of which may be controlled in a similar manner.
Abstract:
Embodiments of apparatus and methods for providing recommendations based on environmental data and associated contextual information are described. In embodiments, an apparatus may include a data collector to receive environmental data and an analysis module to identify a behavioral model of the first user based at least in part on the environmental data associated contextual information of the first user. The apparatus may further include a recommendation module to provide a recommendation to the first user based at least in part on the behavioral model of the first user and/or environmental data for a second user. Other embodiments may be described and/or claimed.
Abstract:
Technologies are presented that provide contextually interactive apparel in practical implementations and applications. A method for directing a change in an interface of a wearable device may include detecting a trigger and providing a change command to an interface controller of a wearable device based on the trigger. The interface controller may direct a change (e.g., a change in visual pattern, audio, etc.) in an interface of the wearable device, based on the change command, that is perceivable by persons in proximity of the wearable device. The providing the change command may include providing one or more change commands to a plurality of wearable devices in a choreographed manner. The method may further include determining other wearable devices that exist and/or are being concurrently worn within a predetermined proximity of the wearable device, and providing information regarding the other wearable devices.