摘要:
A system that incorporates teachings of the present disclosure may include, for example, a processor that can maintain a first virtual task list associated with one of a sending user or a receiving user. A first message originating at equipment of the sending user is received and content of the first message is analyzed to determine a task. Behavior information is obtained associated with one of the sending user, the receiving user or both, and first virtual task list is adjusted to obtain a modified virtual task list according to the content of the first message and the behavior information. A second message is provided to one of the receiving user or another user according to the modified virtual task list. Other embodiments are disclosed.
摘要:
A system that incorporates teachings of the present disclosure may include, for example, a processor that can maintain a first virtual task list associated with one of a sending user or a receiving user. A first message originating at equipment of the sending user is received and content of the first message is analyzed to determine a task. Behavior information is obtained associated with one of the sending user, the receiving user or both, and first virtual task list is adjusted to obtain a modified virtual task list according to the content of the first message and the behavior information. A second message is provided to one of the receiving user or another user according to the modified virtual task list. Other embodiments are disclosed.
摘要:
A method includes transmitting, from a first device, a message indicating that the first device is available to share a resource. The method includes receiving, at the first device, a request to use the resource. The request is received from a second device and includes authentication information. The method includes, based on a determination that the second device is unknown to the first device, determining whether the second device is authenticated based on the authentication information. The method also includes, based on determining that the second device is authenticated, sharing the resource of the first device with the second device.
摘要:
A system that incorporates teachings of the present disclosure may include, for example, a processing system that analyses, without user intervention, content of a first message directed from equipment of a sending user to equipment of a receiving user, to identify a task. The processing system determines that the receiving user is unable to perform the task according to biometric data of the receiving user. The biometric data is selected from one of heart rate, blood pressure, respiratory rate, and combinations thereof. According to the content of the first message and the biometric data obtained from the receiving user, the processing system determines that the task should be delegated to another user, and responsive thereto, provides a second message associated with the task to equipment of the other user. Other embodiments are disclosed.
摘要:
A system that incorporates teachings of the present disclosure may include, for example, a processing system that analyses, without user intervention, content of a first message directed from equipment of a sending user to equipment of a receiving user, to identify a task. The processing system determines that that the receiving user is unable to perform the task according to biometric data of the receiving user. The biometric data is selected from one of heart rate, blood pressure, respiratory rate, and combinations thereof. According to the content of the first message and the biometric data obtained from the receiving user, the processing system determines that the task should be delegated to another user, and responsive thereto, provides a second message associated with the task to equipment of the another user. Other embodiments are disclosed.
摘要:
A method includes transmitting, from a first device, a message indicating that the first device is available to share a resource. The method includes receiving, at the first device, a request to use the resource, the request received from a second device, where the request includes identification information. The method includes, based on a determination that the second device is unknown to the first device, determining whether the second device is authenticated based on the authentication information. The method includes receiving, at the first device from the second device, settings information associated with the resource and adjusting a setting of the first device based on the settings information. The method also includes, based on determining that the second device is authenticated, sharing the resource of the first device with the second device.
摘要:
Concepts and technologies are disclosed herein for predictive determination of actions. According to one aspect of the concepts and technologies disclosed herein, a user device can receive input via a user input interface. The user input interface is application agnostic. The user device can analyze the input to determine an action option. The action option can include an action to be performed by the user device if selected. The user device also can present the action option for selection.
摘要:
Wireless pairing is automatically performed based on purchase. By providing a unique identifier and/or account number (such as a credit card number), a wireless device is automatically paired to a wireless network.
摘要:
A method, computer-readable storage device and apparatus for establishing an ad hoc communication with an unknown contact are disclosed. For example, the method receives an authentication token from a recipient endpoint device for authentication of an unsolicited message from a sender endpoint device, wherein the recipient endpoint device is an unknown contact to the sender endpoint device and the unsolicited message is sent over an open communications protocol, authenticates the authentication token, and sends a confirmation that the authentication token is authenticated to the recipient endpoint device to allow the recipient endpoint device to establish a connection to the sender endpoint device to begin the ad hoc communication.
摘要:
Concepts and technologies are disclosed herein for predictive determination of actions. According to one aspect of the concepts and technologies disclosed herein, a user device can receive input via a user input interface. The user input interface is application agnostic. The user device can analyze the input to determine an action option. The action option can include an action to be performed by the user device if selected. The user device also can present the action option for selection.