Abstract:
A processing system may obtain first content including human language via a computing network. The processing system may next identify an assertion in the first content and identify one or more content sources containing second content relating to the assertion. The processing system may then determine whether the second content relating to the assertion corroborates or contradicts the assertion, and may present the first content with an indication of whether the second content corroborates or contradicts the assertion.
Abstract:
A processing system including at least one processor of an autonomous vehicle may detect that the autonomous vehicle is or will be in an unoccupied state after conveying at least one user to a location, obtain a set of local rules associated with the location, and obtain at least a first constraint associated with at least one third-party service provider associated with the location. The processing system may then execute at least one navigation action of the autonomous vehicle that is in compliance with the set of the local rules, the at least the first constraint, and at least a second constraint of the at least one user.
Abstract:
A processing system including at least one processor may detect at least one dark zone in a vicinity of a user, determine at least one lighting feature for an illumination of the at least one dark zone in accordance with a user profile of the user, identify at least one light source to provide the illumination of the at least one dark area in accordance with the at least one lighting feature that is determined, and transmit an instruction to the at least one light source to provide the illumination of the at least one dark zone in accordance with the at least one lighting feature that is determined.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a processor that can maintain a first virtual task list associated with one of a sending user or a receiving user. A first message originating at equipment of the sending user is received and content of the first message is analyzed to determine a task. Behavior information is obtained associated with one of the sending user, the receiving user or both, and first virtual task list is adjusted to obtain a modified virtual task list according to the content of the first message and the behavior information. A second message is provided to one of the receiving user or another user according to the modified virtual task list. Other embodiments are disclosed.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a processor that can maintain a first virtual task list associated with one of a sending user or a receiving user. A first message originating at equipment of the sending user is received and content of the first message is analyzed to determine a task. Behavior information is obtained associated with one of the sending user, the receiving user or both, and first virtual task list is adjusted to obtain a modified virtual task list according to the content of the first message and the behavior information. A second message is provided to one of the receiving user or another user according to the modified virtual task list. Other embodiments are disclosed.
Abstract:
A method includes transmitting, from a first device, a message indicating that the first device is available to share a resource. The method includes receiving, at the first device, a request to use the resource. The request is received from a second device and includes authentication information. The method includes, based on a determination that the second device is unknown to the first device, determining whether the second device is authenticated based on the authentication information. The method also includes, based on determining that the second device is authenticated, sharing the resource of the first device with the second device.
Abstract:
A processing system including at least one processor of an autonomous vehicle may detect that the autonomous vehicle is or will be in an unoccupied state after conveying at least one user to a location, obtain a set of local rules associated with the location, and obtain at least a first constraint associated with at least one third-party service provider associated with the location. The processing system may then execute at least one navigation action of the autonomous vehicle that is in compliance with the set of the local rules, the at least the first constraint, and at least a second constraint of the at least one user.
Abstract:
Concepts and technologies disclosed herein are directed to enhancing data privacy and owner capture of data value. According to one aspect disclosed herein, an obfuscation and orchestration proxy system can receive a request for a service. The request can originate from a user. The user can be associated with user data. The obfuscation and orchestration proxy system can determine a business flow to be used to provide the service. The business flow can identify a disaggregated provider component to provide, at least in part, the service. The obfuscation and orchestration proxy system can provide a portion of the user data to the disaggregated provider component. The obfuscation and orchestration proxy system can reveal a further portion of the user data to the disaggregated provider component. The obfuscation and orchestration proxy system can obfuscate the portion of the user data for data passthrough to one or more other disaggregate provider components.
Abstract:
A processing system including at least one processor may gather first imaging data associated with an infrastructure item via at least a first imaging device, where the first imaging data represents a first condition of the infrastructure item, and gather second imaging data associated with the infrastructure item via at least a second imaging device, where at least one of the at least the first imaging device or the at least the second imaging device is mounted on a vehicle, and where the infrastructure item is visible from a road on which the vehicle operates. The processing system may then determine a second condition of the infrastructure item in accordance with the second imaging data, where the second condition comprises a potentially unsafe condition of the infrastructure item, and generate a report of the potentially unsafe condition of the infrastructure item in response to the determining.
Abstract:
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.