Abstract:
A system dynamically assigns spaces to users. The system acquires scheduling information for users and identified times when one of the spaces should be assigned to a group of the users (e.g., when a meeting is scheduled). The system may select the space based on the size of the group. The users wear smart identifier (ID) badges that transmit short-range communications signals. A detector detects the signals and may forward a notification to the system identifying the users' locations. The system dynamically re-assigns the space to different users if more than a threshold portion of the group members are, based on the determined locations, not expected to reach the reserved space at the scheduled time. The system assigns a different space to the group that is closer to the determined locations and/or more appropriately sized for the number of available group members.
Abstract:
A method for processing media content is described. The method includes steps of receiving via a wireless network and at a content processing server media content of an activity captured by a mobile device; identifying a location of the mobile device and a location of the activity; and identifying a point of view characteristic of the received media content based on the location of the mobile device and the location of the activity. It is then determined whether the point of view characteristic of the received media content corresponds to a desired point of view of the activity. Upon determining the point of view characteristic of the received media content corresponds to the desired point of view, the content processing server selects to perform at least one of uploading and/or distributing of the media content via the content processing server to a user display device.
Abstract:
A method, apparatus, and user interface for providing a network based surround-light environment to dynamically drive lighting scenes are described. Location information of one or more illuminating elements relative to a display for presenting media information is determined. Lighting characteristic information for the one or more illuminating elements is determined. And a lighting profile for illuminating the one or more illuminating elements based on the location information and lighting characteristic information is determined.
Abstract:
A one time password (OTP) associated with a client device, and a padding rule, of a plurality of possible padding rules, associated with the client device may be determined. A padded OTP that includes the OTP and additional data may be formed based on the padding rule. The padding rule may be associated with at least one of a position of the OTP within the padded OTP, a characteristic of the additional data, or a characteristic of the padded OTP. The padded OTP may be provided to the client device. A selection of a portion of the padded OTP may be received from the client device, and the client device may be authenticated when the selected portion of the padded OTP corresponds to the OTP. If the selected portion of the padded OTP does not correspond to the OTP, other actions may be performed based on the selected portion.
Abstract:
A device is configured to receive a request to use a sensor of a user device. The device determines a sensitivity area associated with the sensor. The sensitivity area indicates an area the sensor is capable of sensing. The device identifies a restricted area in the sensitivity area. The restricted area corresponds to an area from which the user device is limited from use. The user device identifies a restriction associated with the restricted area, generates a response to the request based on the restriction, and provides the response. The response causes the user device to limit use of the sensor, recording of data captured by the sensor, or access to data recorded by the user device even when the user device is located outside of the restricted area.
Abstract:
A network device receives, from a first video camera system, position information for a first video camera at a first site and sends, to a second video camera system, position instructions for a second video camera at a second site. The position instructions are configured to locate the second video camera within the second site to correspond to a relative position of the first camera in the first site. The network device receives, from the first video camera system, a first video feed including images of the first site and receives, from the second video camera system, a second video feed including images of a subject of the second site. The network device combines the first video feed and the second video feed to generate a synchronized combined video feed that overlays the images of the subject of the second video feed in images of the first site.
Abstract:
The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score.
Abstract:
A one time password (OTP) associated with a client device, and a padding rule, of a plurality of possible padding rules, associated with the client device may be determined. A padded OTP that include the OTP and additional data may be formed based on the padding rule. The padding rule may be associated with at least one of a position of the OTP within the padded OTP, a characteristic of the additional data, or a characteristic of the padded OTP. The padded OTP may be provided to the client device. A selection of a portion of the padded OTP may be received from the client device, and the client device may be authenticated when the selected portion of the padded OTP corresponds to the OTP. If the selected portion of the padded OTP does not correspond to the OTP, other actions may be performed based on the selected portion.
Abstract:
Systems and methods monitor data communications transmitted in a provider network connecting a first user device to at least one of a second user device or a network-based application host; determine that the data communications are associated with an active data session based on the monitoring; obtain current attribute values for the data communications; apply a set of rules that define a plurality of compromised communications states as a function of reference attribute values that correspond to the current attribute values; evaluate the current attribute values against the set of rules to determine a compromised communications state with respect to the user-interactive data session; implement, based on the compromised communications state, at least one compensating efficiency with respect to the data communications transmitted via the provider network during the user-interactive data session.
Abstract:
Systems and methods monitor data communications transmitted in a provider network connecting a first user device to at least one of a second user device or a network-based application host; determine that the data communications are associated with an active data session based on the monitoring; obtain current attribute values for the data communications; apply a set of rules that define a plurality of compromised communications states as a function of reference attribute values that correspond to the current attribute values; evaluate the current attribute values against the set of rules to determine a compromised communications state with respect to the user-interactive data session; implement, based on the compromised communications state, at least one compensating efficiency with respect to the data communications transmitted via the provider network during the user-interactive data session.