Abstract:
A computer-implemented method can include establishing, at a mobile computing device having a processing device, a near-field communication (NFC) session with a second device when the second device is within a communication range of the mobile computing device. When the second device is determined to have exited the communication range of the mobile computing device, the method can a) interrupt the NFC session, b) determine a reentry direction to move the mobile computing device in relation to the second device in order to bring the second device back within the communication range, c) start a timer, d) determine whether the second device reenters the communication range before the timer exceeds a threshold, and e) provide an instruction to a user to move the mobile computing device in the reentry direction when the second device has not reentered the communication range and the timer exceeds the threshold.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
A computer-implemented technique includes establishing, at a first computing device including one or more processors, a near field communication (NFC) link with a second computing device. The technique includes identifying, at the first computing device, an application having a foreground designation in an operating system of the first computing device, the identifying being performed upon establishment of the NFC link with the second computing device. The technique includes determining, at the first computing device, an identifier for the application, wherein the identifier uniquely identifies the application at a source external to the first computing device. The technique also includes transmitting, from the first computing device, the identifier for the application via the NFC link to the second computing device.
Abstract:
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application.
Abstract:
Generally, aspects of the present disclosure are directed to techniques for determining a transport mechanism to transfer data peer-to-peer between computing devices. One or more alternative transport mechanisms supported by both a first computing device and a second computing device may be determined. The first computing device may determine whether to use one of near-field communication (NFC) and one of the one or more alternative transport mechanisms as a transport mechanism to transfer data between the first computing device and the second computing device based at least in part on at least one attribute of the data to be transferred. Data may be transferred between the first computing device and the second computing device using the transport mechanism.
Abstract:
A computing system includes at least one processor and at least one module operable by the at least one processor to receive location information associated with a computing device, including indications of locations at which the computing device was previously located and an indication of a current location of the computing device, determine, based at least in part on the location information, a predicted destination, determine, based at least in part on the current location of the computing device and the predicted destination, a predicted travel route, determine, based at least in part on an amount of traffic along the predicted travel route, a predicted arrival time, determine, based at least in part on the predicted destination, one or more other users, and send an indication of the predicted arrival time to one or more computing devices associated with the one or more other users.
Abstract:
A computer-implemented technique includes establishing, at a first computing device including one or more processors, a near field communication (NFC) link with a second computing device. The technique includes identifying, at the first computing device, an application having a foreground designation in an operating system of the first computing device, the identifying being performed upon establishment of the NFC link with the second computing device. The technique includes determining, at the first computing device, an identifier for the application, wherein the identifier uniquely identifies the application at a source external to the first computing device. The technique also includes transmitting, from the first computing device, the identifier for the application via the NFC link to the second computing device.