Patent application number | Description | Published |
20140201512 | DATA STORAGE FOR REMOTE ENVIRONMENT - A method can include receiving operating system environment settings via a network; storing the received operating system environment settings to a storage device; establishing an operating system environment according to the stored operating system environment settings; receiving information via the network; instructing the established operating system environment according to the received information; and, in response to the instructing, transmitting via the network information generated at least in part by the established operating system environment. Various other apparatuses, systems, methods, etc., are also disclosed. | 07-17-2014 |
20140208132 | WAKE ON CLOUD - A method can include receiving a request to access a specified resource associated with a user account; and, in response to the request, transmitting, to a network address associated with the user account, instructions for waking a system or device from a sleep state and for accessing the specified resource. Various other apparatuses, systems, methods, etc., are also disclosed. | 07-24-2014 |
Patent application number | Description | Published |
20140156843 | PROVISIONING OF PLAYER FOR CONTENT - An aspect provides a method, including: responsive to receiving a content request of a user device, determining if the user device has access to one or more applications associated with the content requested; responsive to determining that the user device does not have one or more applications associated with the content requested, determining an associated application; and responsive to determining an associated application, provisioning access to the associated application for the user device. Other aspects are described and claimed. | 06-05-2014 |
20140194008 | COMBINATION POWER AND DATA CONNECTOR - An aspect provides a combination power and data connector, including: a dedicated power connector element; and a combination data connector element separate from the dedicated power connector element, the combination data connector element providing a combination of pins for two data transmission protocols. Other aspects are described and claimed. | 07-10-2014 |
20150046161 | DEVICE IMPLEMENTED LEARNING VALIDATION - An aspect provides a method, including: collecting, at one or more device sensors, one or more inputs selected from the group of inputs consisting of audio inputs from a learning environment and visual inputs from a learning environment; processing, using one or more processors, the one or more inputs to detect an unauthorized behavior pattern; mapping, using the one or more processors, the unauthorized behavior pattern to a predetermined action; and executing the predetermined action. Other aspects are described and claimed. | 02-12-2015 |
20150117419 | INTELLIGENT MESH OBJECT LIST BUILDUP - An embodiment provides a method, including: establishing a connection between a first device and a second device, the first device thereby joining a mesh network to which the second device is connected; obtaining, at the first device, identifying information for a plurality of devices of the mesh network; accessing information accessible to the first device to determine a device ranking among the plurality of devices of the mesh network; after determining a ranking, obtaining information from a ranked device regarding objects available from the ranked device; and creating, using a processor, a list of available objects on the mesh network; wherein the list of available objects is ordered taking into account the objects available from the ranked devices. Other aspects are described and claimed. | 04-30-2015 |
20150118966 | SECURE TAP TO TRANSFER OBJECTS - An embodiment provides a method, including: detecting two devices are proximate to one another utilizing a device component; comparing received device motion information to a predetermined motion; and after matching the received device motion information to a predetermined motion, transferring an object between the two devices. Other aspects are described and claimed. | 04-30-2015 |
20150281218 | RESETTING AUTHENTICATION TOKENS BASED ON IMPLICIT FACTORS - For resetting authentication tokens based on implicit credentials, a method is disclosed that includes receiving, by use of a processor, an authentication request, the request requiring an authentication token, the request not including the authentication token, verifying an implicit credential, and resetting the authentication token in response to the implicit credential matching a predefined credential. | 10-01-2015 |