Abstract:
Certain implementations of the disclosed technology may include systems, methods, and apparatus for adaptive cloning of mobile computing devices. According to an example implementation, a method is provided that includes receiving an indication of source device content associated with a source computing device; receiving an indication of target device information associated with a destination computing device; determining that the source device content is outdated or incompatible with the target device; identifying available alternative content for replacing the source device content; responsive to the identifying available alternative content, outputting, for display, an indication of the available alternative content; receiving an indication of a selection to utilize the available alternative content; and responsive to receiving the indication of the selection, initiating a transmission of the available alternative content to the destination computing device.
Abstract:
Users can collaborate to annotate a map by sharing geographical information. Map data can be stored locally or remotely while annotations are stored in an annotation server. A presentation device such as a personal computer can use the map data to display a map and can access the annotations on the annotation server and display them. Different users can edit the annotations and save them on the annotation server. The annotations presented to users who are simultaneously viewing them can be synchronized. Presentation devices can download modules for sharing geographical information from servers such as web servers.
Abstract:
In an example implementation of the disclosed technology, a method includes predicting, by a computing device, a destination server that is predicted to be the destination of a message from a sending device connected to the computing device. The method also includes determining whether a connection exists between the computing device and the destination server. The method also includes, responsive to determining that no connection exists, determining a connection and caching the connection at the computing device. The method also includes, responsive to receiving a message for dispatch to the destination server, dispatching the message to the destination server via the connection.
Abstract:
Systems and techniques are provided for dynamic authentication using distributed mobile sensors. According to an embodiment of the disclosed subject matter, signals may be received from sensors. Some of the sensors may be located on a remote computing device. Heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems may be applied to the signals from sensors to determine a trust outcome. The trust outcome may be sent to be implemented by the enabling, disabling, or relaxing of a security measure based on the trust outcome.
Abstract:
A container application is a native application that provides a web based application with access a computer's system resources and windowing system. If a container application is associated with a window, then the web based application can alter or control many, or all, aspects of the container application's content area and meta user interfaces (Uis). Web based applications are downloaded from application servers and run inside container applications. A container application can run a web based application as a service. Services made from web based applications running in container applications are almost indistinguishable from operating system services when there is no associated window.
Abstract:
Certain implementations of the disclosed technology may include systems, methods, and computer-readable media for disseminating messages to multiple devices. According to an example implementation, a method is provided that includes receiving, at one or more computing systems, a rule comprising a message and routing instructions for dissemination of the message to at least two of a plurality of computing devices in communication with the one or more computing systems. The method includes extracting from the rule, by at least one of the one or more computing systems, the message and routing instructions; determining, from the routing instructions and from device information, the at least two of the plurality of computing devices for dissemination of the message; and sending, based on the routing instructions, the extracted message to the at least two of the plurality of computing devices.
Abstract:
A network traffic monitoring system monitors communications that a large number of personal electronic devices will direct to various services via various proxies. When a detection system determines that the volume of requests directed to at least one of the services exceeds a capacity limit threshold, a control system will command the proxies to instruct the devices to slow or stop the service requests until the system determines that it is clear to resume communication.
Abstract:
In an example implementation of the disclosed technology, a method includes assigning a computing device to a region associated with a region server that comprises a plurality of region server instances. The method also includes generating device-to-region mapping and transmitting a replica of the device-to-region mapping to a messaging server instance and connection server instance. Further, the method includes receiving local device connection information comprising connection information relating the computing device and the connection server instance. The method also includes outputting the local device connection information to the plurality of region server instances. Additionally, the method includes receiving a message for delivery to the computing device and, responsive to accessing the local device connection information, transmitting the message to the connection server instance identified by the local device connection information.
Abstract:
Systems and techniques are provided for aggregation of asynchronous trust outcomes in a mobile device. Trust levels may be determined from the signals. Each trust level may be determined independently of any other trust level. Each trust level may be determined based on applying to the signals heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems. An aggregated trust outcome may be determined by aggregating the trust levels. Aggregating the trust levels may include applying heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems to the trust levels, and wherein the aggregated trust outcome; and sending the aggregated trust outcome to be implemented by the enabling, disabling, or relaxing of at least one security measure based on the aggregated trust outcome.
Abstract:
Systems and techniques are provided for dynamic authorization. A signal may be received from a sensor. A concept may be determined from the signal. The concept may be a location of a computing device, an action being performed with the computing device, an identity of a user of the computing device, or a temporal context for the computing device. A current pattern may be determined from the concept. The current pattern may be matched to a stored pattern. The stored pattern may be associated with a security outcome. The security outcome may be sent to be implemented. A security message may displayed indicating the security outcome and part of the stored pattern that was matched to the current pattern. The security outcome may be causing presentation of an authentication prompt or not causing presentation of an authentication prompt.