Abstract:
An example in accordance with the present disclosure includes receiving, from a node, information associated with a machine-readable identifier; accessing a profile associated with the machine-readable identifier from the storage medium; and configuring a device associated with the node based on the profile.
Abstract:
Techniques for selecting an interaction scenario based on an object are described in various implementations. A method that implements the techniques may include receiving, at a computer system and from an image capture device, an image that depicts a viewing area proximate to a presentation device. The method may also include processing the image, using the computer system, to detect a user in the viewing area presenting an object in a manner that indicates desired interaction with the presentation device. The method may also include selecting, using the computer system, an interaction scenario for presentation on the presentation device based on the object.
Abstract:
Visual analytics for multivariate session data using concentric rings with overlapping periods includes displaying an interactive graph in a display. The interactive graph includes at least a portion of multiple concentric rings where each one of at least some of the multiple concentric rings represents periodic time units. At least some of the multiple concentric rings are divided into cells where the cells represent smaller time periods than the time units. A color of each of the cells represents a value of a metric. Also, an overlapping period ring displayed with the multiple concentric rings where the overlapping period ring comprises segments that represent overlapping metrics from the cells of the concentric rings that correspond with the segments.
Abstract:
Visual analytics for multivariate session data using concentric rings with overlapping periods includes displaying an interactive graph in a display. The interactive graph includes at least a portion of multiple concentric rings where each one of at least some of the multiple concentric rings represents periodic time units. At least some of the multiple concentric rings are divided into cells where the cells represent smaller time periods than the time units. A color of each of the cells represents a value of a metric. Also, an overlapping period ring displayed with the multiple concentric rings where the overlapping period ring comprises segments that represent overlapping metrics from the cells of the concentric rings that correspond with the segments.
Abstract:
Techniques for selecting an interaction scenario based on an object are described in various implementations. A method that implements the techniques may include receiving, at a computer system and from an image capture device, an image that depicts a viewing area proximate to a presentation device. The method may also include processing the image, using the computer system, to detect a user in the viewing area presenting an object in a manner that indicates desired interaction with the presentation device. The method may also include selecting, using the computer system, an interaction scenario for presentation on the presentation device based on the object.
Abstract:
An example for synchronizing data in accordance with aspects of the present disclosure includes monitoring a set of attributes at a plurality of devices on a network, selecting a group of data based on the monitored set of attributes for synchronization, assigning priority levels to each selected data and each device, prioritizing synchronization operations to be performed on the group of selected data based on the priority levels, and synchronizing the group of selected data in accordance with the prioritization of the synchronization.
Abstract:
According to an example, a method for virtual private network (VPN) access control includes receiving a request from an application on a user device to access a remote computer network asset, and determining, by a processor, an authorization of the application to access the remote computer network asset based on a policy. In response to a determination that the application is authorized to access the remote computer network asset, the method includes setting a VPN connection between the user device and a remote computer network including the remote computer network asset, and routing traffic from the application to the remote computer network asset via the VPN. In response to a determination that the application is not authorized to access the remote computer network asset, the method includes routing traffic from the application to a network different than the remote computer network.