Abstract:
Adjusting network bandwidth is provided. An indication that a client device corresponding to a user is using a level of bandwidth of a network that the computer and client device are connected to is received. An indication via a set of biometric sensors communicatively coupled to the client device that the user is experiencing an increased stress level also is received. The level of bandwidth allocated to the client device of the user is increased based on the received indication that the user is experiencing the increased stress level.
Abstract:
In an approach for notifying a user of a location of a device, a processor receives a first location of a first device. A processor determines that the first device has been separated from a user of the first device. A processor determines a second device located at, within a first predetermined threshold, the first location. A processor sends a first notification to the second device, wherein the notification includes, at least, that the first device is located nearby.
Abstract:
A computer-implemented method includes receiving a request. The request is for an alarm. The alarm is emitted from a mobile device. The mobile device is powered by a battery. The battery has a battery level. The method includes receiving a battery level threshold. The method is responsive to the battery level being below the battery level threshold. The method includes identifying an alternative alarm device. The alternative alarm device is enabled with an electronic control channel. The method includes generating an alternative alarm. The method includes sending the alternative alarm to the alternative alarm device via the electronic control channel.
Abstract:
Locating misplaced mobile computing devices through transmission of location information. Mobile computing devices periodically request information from surrounding mobile computing devices to more accurately identify the location where a mobile computing device was misplaced.
Abstract:
An approach is provided for controlling a first application's access of a second application of a mobile device. Based on first and second icons representing the first and second applications, respectively, having been placed into a graphical element displayed by the mobile device, an attribute included in attributes assigned to the graphical element is obtained. The attribute specifies an exchange of information permitted between the first and second applications. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.
Abstract:
An approach is provided for controlling a first application's access of a second application of a mobile device. Attributes are assigned to a graphical element displayed by the mobile device. Manipulations of first and second icons representing first and second applications, respectively, are detected as placing the first and second icons into the graphical element. One of the assigned attributes specifying an exchange of information permitted between the first and second applications is obtained. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.
Abstract:
A wearable computing device receives user preferences, wherein the user preferences include information detailing one or more types of information to display based on one or more criteria being satisfied. The wearable computing device determines information to display on the wearable computing device based on the user preferences. The wearable computing device displays the determined information.
Abstract:
A wearable computing device receives user preferences, wherein the user preferences include information detailing one or more types of information to display based on one or more criteria being satisfied. The wearable computing device determines information to display on the wearable computing device based on the user preferences. The wearable computing device displays the determined information.
Abstract:
An approach is provided for controlling a first application's access of a second application of a mobile device. Attributes are assigned to a graphical element displayed by the mobile device. Manipulations of first and second icons representing first and second applications, respectively, are detected as placing the first and second icons into the graphical element. One of the assigned attributes specifying an exchange of information permitted between the first and second applications is obtained. If access control settings of the first application are automatically configurable, the access control settings are automatically configured based on the obtained attribute; otherwise, the obtained attribute is applied to the first application by utilizing resource controls of the mobile device operating system. Based on the configured access control settings or the attribute applied to the first application, an access of the second application by the first application is controlled.
Abstract:
Locating misplaced mobile computing devices through transmission of location information. Mobile computing devices periodically request information from surrounding mobile computing devices to more accurately identify the location where a mobile computing device was misplaced.