Abstract:
Systems and methods of site traffic control are disclosed. In some example embodiments, a first request for an online service to perform an operation is received from a first user on a first client device, and at least one overload condition for the online service is detected, or otherwise determined, with the overload condition(s) corresponding to a first request time of the first request. A first token and a first return time parameter for the first user are determined based on the determination of the overload condition, and the first token is stored in association with the first return time parameter. The first token and the first return time parameter are transmitted to the first client device.
Abstract:
Devices, systems, and methods for detecting user devices to determine a state of a watched show are provided. A digital video recorder (DVR) is configured to store a media file associated with a media program. The DVR detects one or more user devices within a predetermined vicinity while the media program is being played. The DVR identifies users who are interested in the media program. The DVR tracks a watch status associated with the media program indicating which users have watched or are watching the media program based on the detected user devices. For stored media files, the DVR determines whether to delete the media file based on whether all users who are interested in the media program have completed watching the media program. The DVR may track user activity and/or vital signs based on sensor data from wearable devices, for example, to determine user reaction and/or user interests.
Abstract:
There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi router, may provide a secure wireless network requiring access credentials to access the network. For example, the network may be password protected to prevent unauthorized used. Additionally, the network may have various levels of use, such as access depending on a security clearance for a user or data transfer and usage rates. Each of the various levels of use may require a separate access credential. A wireless beacon may be configured to connect to user devices that are near or within an area covered by the network. The connection between a user device and the beacon may be utilized to determine the proper access credential for the user device and push the access credential to the user device.
Abstract:
A system and/or method may be provided to install applications based on location. In particular, a location of a user device may be detected. Based on the location of the user device, one or more applications may be selected to be installed automatically on the user device. Further, when the user device departs from the location, the application may automatically be uninstalled. Thus, applications may be installed and/or uninstalled on the user device based on the location of the user device. The automatically installed application may provide functionality or information associated with the location that triggered the installation. For example, a merchant's store may be associated with the merchant's application which may be installed automatically on devices of customers who enter the merchant's store.
Abstract:
A smart refrigerator system includes compartments for storing food items and one or more tag readers. The smart refrigerator system may read a tag coupled to a food item using one of one or more tag readers. The smart refrigerator system may determine an identity of the food item, an associated date of the food item, and/or a compartment containing the food item. The smart refrigerator system may track item information that includes the identity of the food item, a state of the food item, and/or a compartment location of the food item. The smart refrigerator system may receive item usage information indicating when a user plans to use the food item and change a temperature of the food item. The smart refrigerator system may also generate a notification regarding freshness and/or a spoilage level of the food item and present it to the user.
Abstract:
A method and a system a thermal context manager (hereinafter "TCM") detects a thermal state and a position of a computing device. Based on the detected thermal state(s) and the detected position(s) of the computing device, the TCM initiates an action associated with the computing device. The TCM continually monitors the computing device in order to create a thermal state profile of the computing device. To create the thermal state profile, the TCM stores data representing each detected instance of the thermal state of the computing device and data representing each detected position of the computing device.