摘要:
A method is described to facilitate behavioral nudging. The method includes receiving sensory data from one or more wearable devices, determining a context for a user wearing the one or more wearable devices based on the sensory data, determining a mechanism to nudge the user to reinforce user behavior based on stored preferences and policies and transmitting a nudging stimulus to at least one of the wearable devices via the determined mechanism to provide a notification to the user.
摘要:
A mechanism is described for dynamically facilitating curator-controlled message delivery experiences at computing devices according to one embodiment. A method of embodiments, as described herein, includes detecting a computing device at a location, and determining proximity of the computing device from one or more computing devices at or around the location, where the location may relate to an event. The method may further include creating a proximity map including plotting of the computing device and the one or more computing devices, and generating a message for the computing device based on one or more of the proximity map, and communicating the message to at least one of the computing device and the one or more computing devices for presentation.
摘要:
Techniques to project an image from a wearable computing device are provided. A wearable computing device including a projector configured to project an image into a user field of view based on output from one or more sensors and/or images captured by a camera. The wearable computing device can also include a touch input device. The wearable computing device can project an image responsive to a users touch based on signals received from the touch input device.
摘要:
Technologies for controlling degradation of a sensor mote including detecting a trigger event and initiating degradation of at least a portion of the sensor mote in response to the trigger event. The trigger event may be embodied as any type of event detectable by the sensor mote such as a trigger signal, particular sensed data, expiration of a reference time period, completion of a task, and so forth. The sensor mote may imitate the degradation by, for example, controlling a valve to release a chemical stored in the sensor mote or allow a substance into the sensor mote.
摘要:
Systems and methods for determining a foreground application and at least one background application from multiple graphics applications executing within an execution environment are disclosed. Pixel data rendered by the foreground application may be displayed in the execution environment while a rendering thread of the background application may be paused.
摘要:
Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.
摘要:
Technologies for managing device functions of an ingestible computing device include determining whether adaptation of a device function of the ingestible computing device is required based on sensor data generated by the ingestible computing device. If device function adaption is determined to be required, the ingestible computing device determines a new device function to be performed, obtains program code modules to perform the new device function, and locally compiles the new program code modules to generate executable code. The ingestible computing device may execute the executable code to cause the ingestible computing device to begin performing the new device function. The ingestible computing device may obtain the program code modules from a local function database or via an authenticated wireless communication.
摘要:
Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.
摘要:
In one embodiment, the present invention includes an apparatus having a first processor to execute instructions, a subordinate processor coupled to the first processor, and multiple physical devices coupled to the subordinate processor. The physical devices may each correspond to a different network communication protocol, and may each include a physical unit to forward packets to the subordinate processor while the system is in a low power mode. The subordinate processor may remain enabled during the low power mode and may include media access control functionality for handling incoming packets of different physical devices. Other embodiments are described and claimed.
摘要:
An apparatus to facilitate compute optimization is disclosed. The apparatus includes sorting logic to sort processing threads into thread groups based on bit depth of floating point thread operations.