Abstract:
Technologies are generally described for a social networking service (SNS). In some examples, a method performed under control of a server may include receiving a user input associated with the user responding to content posted in an online forum, determining whether a threshold condition set by the user is satisfied for the user's response to be disclosed with regard to a particular piece of content posted in the online forum, and disclosing the user's response to the particular piece of content posted in the online forum when the threshold condition is determined to be satisfied.
Abstract:
Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a mobile operating server may include determining whether there is an authenticated wireless access point around a mobile device, if there is no authenticated wireless access point, determining whether there is a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device and if there is a non-authenticated wireless access point whose capacity is over the predetermined value, instructing the mobile device to connect to a wireless local area network provided by the non-authenticated wireless access point.
Abstract:
Technologies are generally described for a link preview generation scheme. In some examples, a method performed under control of a user device may include obtaining preview information associated with a link included in an electronic message; generating at least one link loading attribute regarding the link based on, at least in part, the preview information; and displaying the at least one link loading attribute on a display unit of the user device.
Abstract:
Technologies are generally described that relate to managing and/or generating sensor data. An example method may include receiving output data generated by a pressure sensor. The method may also include determining surface data, indicative of a surface type associated with a force applied to a surface of the pressure sensor, based on the output data. Furthermore, the method may include adjusting the output data based on the surface data to facilitate generating adjusted output data indicative of an adjusted pressure value generated by the pressure sensor.
Abstract:
Technologies are generally described for an access control scheme for an external device. In some examples, an electronic device may detect the external memory connected to the electronic device; set a security code to enable access to the external memory; receive a request to access the external memory; access the external memory in response to entry of the security code; receive a request to disconnect the external memory; and remove a requirement for entry of the security code to enable access to the external memory.
Abstract:
Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a mobile operating server may include determining whether there is an authenticated wireless access point around a mobile device, if there is no authenticated wireless access point, determining whether there is a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device and if there is a non-authenticated wireless access point whose capacity is over the predetermined value, instructing the mobile device to connect to a wireless local area network provided by the non-authenticated wireless access point.
Abstract:
Technologies are generally described for privacy protection for a life-log system. In some examples, a method performed under control of a life-log system may include receiving, from a user account, a request to change one or more real life-log data entries relating to a real event that are stored in a first part of a database; removing the one or more real life-log data entries relating to the real event from the first part of the database; and storing, in the first part of the database, one or more misleading life-log data entries relating to a false event corresponding to the real event.
Abstract:
Technologies are generally described for video encoding for real-time streaming based on audio analysis. In one example, a method includes analyzing, by a system comprising a processor, audio data representative of audio content associated with a video comprising video frames. The method also includes selecting a set of the video frames based on a determination that each video frame of the set of the video frames satisfies a defined condition associated with the audio content. Further, the method includes video encoding at least one video frame of the set of the video frames as an intra frame based on the audio analysis.