Abstract:
An electronic device with one or more processors and memory includes a procedure for sharing information with a third party recipient. In some embodiments, the device receives a speech input from a first user, the speech input specifying a second user different from the first user, and an information item to be shared with the second user. In response to the speech input, the device initiates a background process during which a digital assistant searches for the information item and causes the information item to be sent to the second user without further review and instruction from the first user.
Abstract:
In one or more embodiments, a first device such as a mobile phone can establish a wireless connection with second device, and the second device can act as a bridge between the first device and a peripheral device, such as a printer, so that the first device need not establish a secure pairing or other type of direct connection with the peripheral device. The second device provides a profile of the peripheral to the first device. The first device can then use the profile to access the peripheral device via the second device, with the second device passing data between the first device and the peripheral identified by the profile. This bridging feature simplifies the process of using the peripheral devices, since no secure pairing or other configuration procedure is needed to enable the first device to access the peripheral.
Abstract:
An electronic device with one or more processors and memory includes a procedure for sharing information with a third party recipient. In some embodiments, the device receives a speech input from a first user, the speech input specifying a second user different from the first user, and an information item to be shared with the second user. In response to the speech input, the device initiates a background process during which a digital assistant searches for the information item and causes the information item to be sent to the second user without further review and instruction from the first user.
Abstract:
A method includes outputting an alert corresponding to an information item. In some implementations, the alert is a sound. In some implementations, the alert is ambiguous (e.g., the sound indicates several possible information items). The method further includes receiving a speech input after outputting the alert. The method further includes determining whether the speech input includes a request for information about the alert. The method further includes, in response to determining that the speech input includes a request for information about the alert, providing a first speech output including information about the alert.
Abstract:
Disclosed herein is a technique for preventing words from spanning across message blocks of a short message service (SMS) message. An SMS message is generated at a source wireless device, and an SMS manager, executing on the source wireless device, determines whether any words in the SMS message span across two or more message blocks of the SMS message. When so determined, the SMS manager attempts to shift characters of the SMS message across the message blocks to eliminate any word spanning. When the attempt to shift the characters between message blocks requires at least one additional message block to transmit the complete SMS message, the SMS manager gathers information about the destination wireless device to determine whether it is necessary to carry out the aforementioned shifting prior to sending the message blocks. The SMS manager then transmits the message blocks either unmodified or modified (i.e., shifted).
Abstract:
A method for adaptive data connection retry by a wireless communication device is provided. The method can include detecting a failed attempt by the wireless communication device to establish a data connection for an application. The method can further include selecting a data retry pattern having a predefined association with the application from a set of predefined data retry patterns. The set of predefined data retry patterns can be defined based at least in part on application usage data collected by a network entity from wireless communication devices. The method can additionally include retrying data connection establishment in accordance with the selected data retry pattern.
Abstract:
In one or more embodiments, a first device such as a mobile phone can establish a wireless connection with second device, and the second device can act as a bridge between the first device and a peripheral device, such as a printer, so that the first device need not establish a secure pairing or other type of direct connection with the peripheral device. The second device provides a profile of the peripheral to the first device. The first device can then use the profile to access the peripheral device via the second device, with the second device passing data between the first device and the peripheral identified by the profile. This bridging feature simplifies the process of using the peripheral devices, since no secure pairing or other configuration procedure is needed to enable the first device to access the peripheral.
Abstract:
Disclosed herein is a technique for a location adaptive electronic calendar system. In particular, the location adaptive electronic calendar system is configured to dynamically analyze and track location information associated with users who utilize the location adaptive electronic calendar system. In turn, the location information associated with the users is compared against both proposed and scheduled meetings in order to provide various useful features and information to the user.
Abstract:
A speech output to be provided to a user of a device is received. Thereafter, it is determined if the device is currently receiving speech input from a user. Upon determining that the device is not currently receiving speech input from the user, the speech output to the user is provided. On the other hand, upon determining that the device is receiving speech input from the user it is determined if provision of the speech output is urgent. When the speech output is urgent, the speech output is provided to the user. When the speech output is not urgent, provision of the speech output to the user is stayed.