Abstract:
Using a system distinct from a mobile device, the mobile device is switched from a first mode to a second mode to access a set of data storage locations in the mobile device. All malware-susceptible data stored in the set of data storage locations is received at the system from the mobile device to form received data, which is analyzed at the system to detect a malware from a set of malware in a first portion of the received data. Responsive to the analyzing, the first portion of the received data is modified at the system to form a modified first portion, wherein the modifying removes the malware from the first portion. The system stores the modified first portion in a first data storage location in the mobile device and a second portion of the received data in a second data storage location in the mobile device.
Abstract:
An electronic device is configured to operate according to a plurality of different locales. The electronic device includes a display unit configured to display a graphical user interface, and at least one sensor configured to detect an input to the electronic device. The electronic device further includes an electronic computer processor in signal communication with the display unit and the at least one sensor. The computer processor is configured to identify an input language of the input, and based on the identified input language, dynamically transition the electronic device from a first locale among the plurality of locales into a second locale among the plurality of locales different from the first locale.
Abstract:
In some aspects, a computer-implemented method for diagnosing an unfavorable mobile application user experience is described. The method may include retrieving user application interaction data from a mobile device, inter-correlating the user application interaction data, updating a user interaction database with the inter-correlated user application data, and diagnosing, via a processor operatively connected to the user interaction database, information indicative of a cause of the unfavorable user experience.
Abstract:
An approach to configuring camera settings to reduce the intrusiveness of image capture on image subjects. A preliminary image is analyzed to determine an image context. The image context is compared to intrusiveness context cues, either known or discovered from analyzing historical images associated with the subjects identified in the preview image. If any intrusiveness context cues are found in the image context then configuration parameters associated with the intrusive context cues are changed to minimize the intrusive nature before the image is captured.
Abstract:
A mobile device that includes a cellular network connection device capable of connecting to a cellular network. The device also includes an application that communicates through the cellular network connection device to a remote device, a context memory that records information about a user's use of the mobile device and a battery management module that limits a frequency that the application communicates to the remote device based on a current location of the mobile device and information in the context memory.
Abstract:
An adaptive multimedia system includes a display and an adaptive display controller configured to communicate with a media stream source. The adaptive display controller selectively signals the media stream source to provide a media stream at a desired resolution based on one or more of a user preference, a size of the display, and a distance between a user and the display.
Abstract:
A system for managing and routing calls involves a switch, multiple endpoints, an IVR system; and storage including a data structure associating individual unique keys with ANI information and one of the endpoints. In response to receipt of a call, identified by a specific ANI, the IVR will allow the user to input a routing key. If the user does not provide the routing key, it will follow the user's interaction to one of the endpoints, and I) generate a unique key, II) store the unique key, the specific ANI and an identifier of the one of the endpoints, and III) make the unique key available so that, the user can provide the unique key as the routing key on a subsequent call. If the user does provide the routing key, the specific ANI will be verified and the user's call routed to the endpoint associated with the routing key.
Abstract:
A system and method for iteratively deploying a workload pattern are provided. The system and method determines a current set of requirements for at least one piece of the workload pattern that is initiated in a designer and generates a stability metric for at least one of the current set of requirements. The system and method further compares the stability metric to an acceptance threshold and calculates an estimated time to deploy the at least one piece of the workload pattern based on the comparing of the stability metric to the acceptance threshold.
Abstract:
Embodiments describe techniques for reducing resource overhead in verbose trace operations by recursively pruning object data prior to string serialization. According to one embodiment, a trace operation is initiated. The trace operation generates a string and specifies one or more objects to serialize and append to the string. At least one object is a nested object. The trace operation recursively parses the nested object while generating the string. Data associated with one or more of the objects to prune from the serialization is determined based on a current prioritization level. The one or more objects is serialized into the string.
Abstract:
A method, system and computer program product for selecting a target hypervisor to run a migrated virtual machine. An “effective priority value,” representing the virtual machine's priority with respect to the other virtual machines running on the same hypervisor, is calculated for the virtual machine when it is running on the source hypervisor as well as if it were to run on a target hypervisor for each possible target hypervisor. The target hypervisor associated with the minimum difference in absolute value terms between the virtual machine's effective priority value calculated when it is running on the source hypervisor and its effective priority value calculated if it were to be migrated to run on a target hypervisor is selected to receive the migrating virtual machine. In this manner, the effective priority metric has enabled a target hypervisor to be chosen that most closely matches the priority environment of the source hypervisor.