摘要:
Various systems and methods for customizing training data for an artificial intelligence (AI) or machine-learning (ML) model are disclosed. A set of data is identified from a plurality of sets of data used to train the AI or ML model. The set of data is identified based on a set of metadata associated with the set of data indicating an association between the set of data and a jurisdiction of a digital services tax (DST). Based on the identifying, the plurality of sets of data is modified by removing or reducing reliance upon the set of data. The AI or ML model is retrained based on the modified plurality of sets of data. The retrained AI or ML model is provided for deployment in an individual autonomous agent.
摘要:
Various aspects of methods, systems, and use cases for trust-based orchestration of an edge node. An edge node may be configured for trust-based orchestration in an edge computing environment, where the edge node includes a transceiver to receive an instruction to perform a workload, the instruction from an edge orchestrator, the edge node being in a group of edge nodes managed with a ledger; and a processor to execute the workload at the edge node to produce a result, wherein the execution of the workload is evaluated by other edge nodes in the group of edge nodes to produce a reputation score of the edge node, where the transceiver is to provide the result to the edge orchestrator.
摘要:
Technologies for anonymizing sensor data of an Internet-of-Things (IOT) sensor cloud include receiving sensor data from an IOT sensor of the sensor cloud and determining a mapping for the sensor data that identifies one or more processes to be applied to the sensor data to convert the sensor data to synthetic data, which includes less personal identifiable characteristics of the user than the sensor data. The sensor data is synthesized using the determined mapping to generate the synthetic data, which is subsequently transmitted to a remote service for processing. Responses from the remote service may be de-synthetized to produce personalized responses for the user using the determined mapping.
摘要:
A request for content is sent via a client device. The client device negotiates with a server content provider regarding the layout of the content using a dynamically configurable content layout profile describing layout preferences for content. When the content is received from the server content provider, the content is displayed according to the dynamically configurable content layout profile. The server may format the content in accordance with the profile and send the formatted content to the client device via a network. A user of the device may modify the profile dynamically to specify a different layout and receive reformatted content.
摘要:
The present disclosure provides systems and methods for stream-based media management. A device may be configured to receive information streams including displayable content and to at least display the displayable content. For example, a stream manager in the device may be configured to control how the displayable content is displayed on a display in the device based on activity detected in the information streams. The activity may be defined by user preferences as trigger activities. For example, upon detecting a trigger activity in an information stream, the stream manager may cause the displayable content to be displayed or hidden, may cause the manner in which the displayable content is displayed (e.g., size, shape, order, etc.) to be altered, or may cause a visible or audible alert to be generated.
摘要:
In one embodiment, a processor comprises: a first logic to receive a random number associated with a user of a first computing system, generate a first pseudo random number seed based on the random number, the first pseudo random number seed associated with a first account of the user, and generate a sequence of pseudo random number seeds based on the first pseudo random number seed, where a first leaf of the sequence of pseudo random number seeds comprises a one time value associated with the first account; and a communication logic to communicate the one time value to a second computing system associated with a merchant, where a credit entity is to authorize a transaction occurring at a first time quantum based at least in part on the one time value. Other embodiments are described and claimed.
摘要:
Embodiments of methods, apparatuses, and storage mediums associated with controlling content capture of prohibited content on remote devices, are disclosed. In embodiments, components of a remote device may receive image data of an image captured by the remote device and analyze the image data to determine whether the image includes prohibited content. In embodiments, the remote device may conditionally display or persistently store the image data, based at least in part on a result of the analysis.
摘要:
Embodiments are disclosed herein for inter-computing device negotiation. In some embodiments, a first computing device may determine that a second computing device is within a predetermined proximity of the first computing device, and may cause the transmission of negotiation initiation data to the second computing device in response to the determination. The first computing device may receive negotiation response data provided by the second computing device, and may determine that the negotiation response data meets negotiation evaluation criteria. In response, the first computing device may cause the transmission of a confirmation message to the second computing device. Other embodiments may be disclosed and/or claimed.
摘要:
Methods and systems may provide for conducting an authentication of an external card associated with a borrower of a device, and tracking a usage of the device by the borrower if the authentication of the external card is successful. In addition, the usage may be reported to a billing service. The usage may be billed according to a fee based policy so that payment for the usage may be obtained from the borrower of the device rather than the owner of the device.
摘要:
A method of operating an electronic device comprises detecting access to private information stored in memory of the electronic device. The detecting is performed by a privacy management module downloadable to the electronic device as object code for execution on the electronic device and the access is performed by a client application program. The method further comprises tracking, using the privacy management module, the private information being accessed by the client application program, and reconfiguring the electronic device, using the privacy management module, to change the access to the private information by the client application program according to at least one privacy access policy stored in the electronic device.