Abstract:
In various example embodiments, devices including a wearable device may be associated to share information and coordinate data between the devices as part of a coordination between relationship wearables. For example, a first wearable device and a second device, each associated with different users, may provide data to a history analysis module. The history analysis module may analyze this data for coordinated relationship patters made up of repeated events Coordinated relationship data may be generated by this analysis, and then used by a current data analysis module to analyze an incoming stream of current data from at least one of the devices. When a repeated status value is identified within the current data stream, a coordination communication may be initiated.
Abstract:
A method and a system a thermal context manager (hereinafter "TCM") detects a thermal state and a position of a computing device. Based on the detected thermal state(s) and the detected position(s) of the computing device, the TCM initiates an action associated with the computing device. The TCM continually monitors the computing device in order to create a thermal state profile of the computing device. To create the thermal state profile, the TCM stores data representing each detected instance of the thermal state of the computing device and data representing each detected position of the computing device.
Abstract:
Devices, systems, and methods for detecting user devices to determine a state of a watched show are provided. A digital video recorder (DVR) is configured to store a media file associated with a media program. The DVR detects one or more user devices within a predetermined vicinity while the media program is being played. The DVR identifies users who are interested in the media program. The DVR tracks a watch status associated with the media program indicating which users have watched or are watching the media program based on the detected user devices. For stored media files, the DVR determines whether to delete the media file based on whether all users who are interested in the media program have completed watching the media program. The DVR may track user activity and/or vital signs based on sensor data from wearable devices, for example, to determine user reaction and/or user interests.
Abstract:
There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi router, may provide a secure wireless network requiring access credentials to access the network. For example, the network may be password protected to prevent unauthorized used. Additionally, the network may have various levels of use, such as access depending on a security clearance for a user or data transfer and usage rates. Each of the various levels of use may require a separate access credential. A wireless beacon may be configured to connect to user devices that are near or within an area covered by the network. The connection between a user device and the beacon may be utilized to determine the proper access credential for the user device and push the access credential to the user device.
Abstract:
A system and/or method may be provided to install applications based on location. In particular, a location of a user device may be detected. Based on the location of the user device, one or more applications may be selected to be installed automatically on the user device. Further, when the user device departs from the location, the application may automatically be uninstalled. Thus, applications may be installed and/or uninstalled on the user device based on the location of the user device. The automatically installed application may provide functionality or information associated with the location that triggered the installation. For example, a merchant's store may be associated with the merchant's application which may be installed automatically on devices of customers who enter the merchant's store.
Abstract:
A method may include detecting a first wireless device configured to perform short-range wireless communications and detecting a second wireless device configured to perform short-range wireless communications. The method may also include determining one or more short-range wireless connection priorities with respect to a first pairing and a second pairing. The first pairing may be with respect to short-range wireless communications between the first wireless device and a third wireless device configured to perform short-range wireless communications. The second pairing may be with respect to short-range wireless communications between the second wireless device and the third wireless device. The method may further include managing the first pairing and the second pairing based on the one or more short-range wireless connection priorities.
Abstract:
Systems and methods of site traffic control are disclosed. In some example embodiments, a first request for an online service to perform an operation is received from a first user on a first client device, and at least one overload condition for the online service is detected, or otherwise determined, with the overload condition(s) corresponding to a first request time of the first request. A first token and a first return time parameter for the first user are determined based on the determination of the overload condition, and the first token is stored in association with the first return time parameter. The first token and the first return time parameter are transmitted to the first client device.