摘要:
Disclosed is a novel system and method for maintaining computing functionality when a client device must be used in a low-power state. More particularly, when a client device is placed in a low-power state, sleep mode, or even shut-down, this method transfers aspects of the machine state onto a virtual machine in the cloud. This virtual machine may then function as a partial or full emulator of the user's client machine and thus can be: 1) accessed; and 2) communicated with by the machine's owner or others who use the machine. As long as the client device is shutdown, the cloud continues to temporarily function as the user's machine. Numerous embodiments are disclosed including a “hybrid decomposition feature” in which the data on the client machine is prioritized and then transfer to a server, typically a virtual emulator, component by component or piecemeal manner or manner.
摘要:
Disclosed is a novel system and method for maintaining computing functionality when a client device must be used in a low-power state. More particularly, when a client device is placed in a low-power state, sleep mode, or even shut-down, this method transfers aspects of the machine state onto a virtual machine in the cloud. This virtual machine may then function as a partial or full emulator of the user's client machine and thus can be: 1) accessed; and 2) communicated with by the machine's owner or others who use the machine. As long as the client device is shutdown, the cloud continues to temporarily function as the user's machine. Numerous embodiments are disclosed including a “hybrid decomposition feature” in which the data on the client machine is prioritized and then transfer to a server, typically a virtual emulator, component by component or piecemeal manner or manner.
摘要:
An approach to providing a group alarm clock wherein the next group alarm is specified by a group member acknowledging a previous group alarm. The approach allows members to join a group alarm clock and provide alarm preferences to the group alarm clock. When the approach determines that the conditions of activating a group alarm are met, the group alarm is sent to the group members. The first group member to acknowledge the group alarm selects the alarm for the next round and is removed from the group. Iterations of group alarms continue until the group alarm clock no longer has any members.
摘要:
A method for recommending products. The method may include receiving an identification element associated with an image or a visual code captured by a user. The method may include identifying a first item associated with the identification element, whereby the first item is a product or a service. The method may include identifying at least one of a tag and a keyword associated with the first item. The method may include identifying social media interactions within a social media network that reference at least one of the first item, the tag, and the keyword, whereby the social media network is associated with the user. The method may further include identifying a second item referenced in the social media interactions, whereby the second item is a product or a service. The method may also include determining a score for the second item based on an algorithm.
摘要:
A computer-implemented method for managing an authentication policy for a user on a network of an organization includes determining at least one social media attribute of the user, and a social media risk value is assigned based on the at least one social media attribute of the user. The method further includes determining at least one network activity risk attribute of the user, and a network activity risk score is assigned based on the at least one network activity risk attribute. A current risk assessment score of the user is calculated based on the social media risk value and the network activity risk value. An authentication policy for the user is determined based on the current risk assessment score.
摘要:
Embodiments of the present invention relate to an approach for resolving and/or implementing policies based on layers of a network stack (e.g., cloud computing stack). Specifically, for a given policy that is being resolved, the system first evaluates the applicability of the policy to each layer in the network stack. For a given policy, the system then evaluates the relative effectiveness of applying the policy to achieve the overall goal of the policy. Based on the best fit evaluation of the relative comparison, the system then decides how and where the policy is enacted (e.g., determines a protocol for implementing the policy).
摘要:
A tool for credential validation using multiple computing devices. The tool select at least one challenge question. The tool selects two or more user owned devices, wherein selecting the two or more user owned devices includes querying a database for each user owned device associated with a user account. The tool presents the at least one challenge question to the two or more user owned devices. The tool determines whether the at least one response received from the two or more user owned devices is a correct response relative to the at least one challenge question.
摘要:
An approach is provided for pooling bandwidth provided by mobile devices in an ad hoc group. Based on information in data plans provided by wireless carriers to the mobile devices, amounts of data that will be unused at the end of respective billing cycles are estimated. Based on the estimated amounts, contributions of data from the mobile devices are determined. Based on capabilities of the mobile devices, time periods during which the respective mobile devices are subscripted for providing at least some of the respective contributions of data are determined. Hand-offs among the mobile devices are coordinated to provide a cooperative usage of the bandwidth among the mobile devices which minimizes redundant streaming or downloading of content to more than one of the mobile devices. The streamed or downloaded content is presented to the ad hoc group of mobile devices.
摘要:
Communicating with isolated mobile devices in indoor positioning systems is provided. Information is received from a first mobile device connected to both a first network of a designated environment and a second mobile device that is not connected to the first network. The information includes one or more identifiers of the second mobile device. An estimated location of the second mobile device is determined based, at least in part, on the information received from the first mobile device.
摘要:
The present invention provides discrete, depleting chips for allocating computational resources for obtaining desired service level characteristics, wherein discrete chips deplete from a maximum allocated amount but may, in an optional implementation, be allowed to be replenished through the purchase of additional chips. A number of chips are assigned to a requestor/party, known as a business unit (BU), which could be a department, or group providing like-functionality services. In one implementation, the chips themselves could represent base monetary units integrated over time.