Abstract:
In some implementations, a computing device can be configured to automatically tum off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.
Abstract:
In accordance with some embodiments, a method of operating a digital assistant on a computing device is described. The device displays, on the display, a user interface of a first application. While displaying the user interface of the first application, the device detects activation of the digital assistant. In response to detecting the activation of the digital assistant, the device displays, on the display, a user interface of the digital assistant wherein the user interface of the first application is at least partially visible on the display while the user interface of the digital assistant is displayed. While displaying the user interface of the digital assistant and while the user interface of the first application is at least partially visible on the display, the device displays, in the user interface of the digital assistant, an indication that a spoken user input is ready to be received by the digital assistant.
Abstract:
Among other things, techniques and systems are disclosed for implementing contextual voice commands. On a device, a data item in a first context is displayed. On the device, a physical input selecting the displayed data item in the first context is received. On the device, a voice input that relates the selected data item to an operation in a second context is received. The operation is performed on the selected data item in the second context
Abstract:
A method of establishing communications with a first device is disclosed. The method includes: the first device presenting connection information to a second device; receiving a response from a second device; establishing an association with the second device; transmitting, in response to a determination that the first device and the second device are connected for data, first data to the second device, the first data comprising addressing information for a server; receiving second data from the second device, the second data comprising second information for establishing communications with the first device; and configuring the first device to receive third data from a location remote to the first device using the second information from the second data.
Abstract:
In some implementations, a computing device can be configured to automatically tum off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.
Abstract:
In a computer-implemented method, at a portable multifunction device with a touch screen display, a series of ratings indicia are displayed on the touch screen display, wherein the ratings indicia comprise a lowest rating indicia and one or more progressively higher rating indicia. A finger gesture by a user on one or more of the ratings indicia is detected, wherein the finger gesture contacts a last rating indicia immediately prior to breaking contact with the touch screen display. A rating corresponding to the last rating indicia contacted by the finger gesture is used as input to a function or application in the device.
Abstract:
A method of activating a first device is disclosed. The method includes: the first device pairing with a second device; receiving a connection request from a second device; connecting to the second device; opening a communication channel to the second device; transmitting an activation package to the second device; receiving an activation payload from the second device; and performing an activation using information from the activation payload.
Abstract:
Touch inputs such as single-finger contacts and multiple-finger contacts are detected at an electronic device and translated into electronic touch communications for playback at an external electronic device.
Abstract:
Touch inputs such as single-finger contacts and multiple-finger contacts are detected at an electronic device and translated into electronic touch communications for playback at an external electronic device.
Abstract:
A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.