Abstract:
The disclosed technology includes switching between a normal or standard-lens UI and a panoramic or wide-angle photography UI responsive to a zoom gesture. In one implementation, a user gesture corresponding to a “zoom-out” command, when received at a mobile computing device associated with a minimum zoom state, may trigger a switch from a standard lens photo capture UI to a wide-angle photography UI. In another implementation, a user gesture corresponding to a “zoom-in” command, when received at a mobile computing device associated with a nominal wide-angle state, may trigger a switch from a wide-angle photography UI to a standard lens photo capture UI.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
A computer-implemented technique includes establishing, at a first computing device including one or more processors, a near field communication (NFC) link with a second computing device. The technique includes identifying, at the first computing device, an application having a foreground designation in an operating system of the first computing device, the identifying being performed upon establishment of the NFC link with the second computing device. The technique includes determining, at the first computing device, an identifier for the application, wherein the identifier uniquely identifies the application at a source external to the first computing device. The technique also includes transmitting, from the first computing device, the identifier for the application via the NFC link to the second computing device.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
In accordance with an example embodiment of the disclosure, a non-transitory, machine-readable storage medium may have stored thereon a computer program having at least one code section. The at least one code section may be executable by a first electronic processing device for causing the first electronic processing device to execute context pertinent responses based on at least one status query electronically communicated to the first electronic processing device from a second electronic processing device. The at least one code section may control the first device to perform examining the query to determine a pertinent context. A query processing device may be queried via the first device. Responsive to the querying, context pertinent information may be received based on at least one database of stored context pertinent information. A context pertinent response may be executed based on the obtained context pertinent information.
Abstract:
Generally, aspects of the present disclosure are directed to techniques for determining a transport mechanism to transfer data peer-to-peer between computing devices. One or more alternative transport mechanisms supported by both a first computing device and a second computing device may be determined. The first computing device may determine whether to use one of near-field communication (NFC) and one of the one or more alternative transport mechanisms as a transport mechanism to transfer data between the first computing device and the second computing device based at least in part on at least one attribute of the data to be transferred. Data may be transferred between the first computing device and the second computing device using the transport mechanism.
Abstract:
A computer-implemented method can include establishing, at a mobile computing device having a processing device, a near-field communication (NFC) session with a second device when the second device is within a communication range of the mobile computing device. When the second device is determined to have exited the communication range of the mobile computing device, the method can a) interrupt the NFC session, b) determine a reentry direction to move the mobile computing device in relation to the second device in order to bring the second device back within the communication range, c) start a timer, d) determine whether the second device reenters the communication range before the timer exceeds a threshold, and e) provide an instruction to a user to move the mobile computing device in the reentry direction when the second device has not reentered the communication range and the timer exceeds the threshold.
Abstract:
A first client device performs a handoff operation to a second client device by transmitting application information, associated with a first application, to the second client device when the first client device is positioned within a predefined proximity of the second client device. The first application has a first client device user interface state when the handoff operation is performed. Further, the first client device, in response to receiving from another client device application information associated with a second application executed by the other first client device, executes a third application corresponding to the second application with a user interface state corresponding to a user interface state of the other client device.
Abstract:
A method, computer program product, and system is described. An aspect of an image is identified. One or more other images are identified based upon, at least in part, the one or more other images including one or more other aspects similar to the identified aspect of the image. One or more image filters associated with the one or more other images, including a first image filter, are identified. The first image filter is applied to the image.
Abstract:
The disclosed technology includes switching between a normal or standard-lens UI and a panoramic or wide-angle photography UI responsive to a zoom gesture. In one implementation, a user gesture corresponding to a “zoom-out” command, when received at a mobile computing device associated with a minimum zoom state, may trigger a switch from a standard lens photo capture UI to a wide-angle photography UI. In another implementation, a user gesture corresponding to a “zoom-in” command, when received at a mobile computing device associated with a nominal wide-angle state, may trigger a switch from a wide-angle photography UI to a standard lens photo capture UI.