Abstract:
One or more techniques and/or systems are provided for cloud service hosting on a client device. For example, a cloud service may comprise data and/or functionality that may be consumed by apps on client devices. The cloud service may be hosted within a cloud computing environment because a client device may not comprise processing resources capable of hosting the entire cloud service. Accordingly, a local service may be deployed on a client device as a local instantiation of the cloud service. For example, the local service may be a local instantiation of at least a portion of the data and/or functionality of the cloud service. In this way, the local service may utilize fewer resources than the cloud service, and may locally process requests from apps on the client device. For example, a map local service may process requests using map data locally cached from a map cloud service.
Abstract:
In the field of computing, many scenarios involve the execution of an application within a virtual environment of a device (e.g., web applications executing within a web browser). Interactions between applications and device components are often enabled through hardware abstractions or component application programming interfaces (API), but such interactions may provide more limited and/or inconsistent access to component capabilities for virtually executing applications than for native applications. Instead, the device may provide hardware interaction as a service to the virtual environment utilizing a callback model, wherein applications within the virtual environment initiate component request specifying a callback, and the device initiates the component requests with the components and invokes associated callbacks upon completion of a component request. This model may enable the applications to interact with the full capability set of the components, and may reduce blocked execution of the application within the virtual application in furtherance of application performance.
Abstract:
A computer system may communicate metadata that identifies a current speaker. The computer system may receive audio data that represents speech of the current speaker, generate an audio fingerprint of the current speaker based on the audio data, and perform automated speaker recognition by comparing the audio fingerprint of the current speaker against stored audio fingerprints contained in a speaker fingerprint repository. The computer system may communicate data indicating that the current speaker is unrecognized to a client device of an observer and receive tagging information that identifies the current speaker from the client device of the observer. The computer system may store the audio fingerprint of the current speaker and metadata that identifies the current speaker in the speaker fingerprint repository and communicate the metadata that identifies the current speaker to at least one of the client device of the observer or a client device of a different observer.
Abstract:
Communication between a user and various services (e.g., websites) often involves creating a user profile comprising contact information (e.g., a personal email address) that the service uses to contact the user. However, managing communication may be burdensome and ineffective; the user's privacy may be diminished; and revocation of previously issued permission may be unachievable. Presented herein are techniques for providing a communication manager that establishes relationships with services on behalf of users, and that issues tokens to the services representing such relationships. In order to communicate with the user, the service presents the token to the communication manager, which conditions the authorization of the communication on verification of the current permission of user in the relationship represented by the token, optionally including the communication channel of the user requested by the service. This architecture enables more consistent, convenient, privacy-preserving, and revocable user control of communication permissions with the services.
Abstract:
In the field of computing, many scenarios involve the execution of an application within a virtual environment of a device (e.g., web applications executing within a web browser). Interactions between applications and device components are often enabled through hardware abstractions or component application programming interfaces (API), but such interactions may provide more limited and/or inconsistent access to component capabilities for virtually executing applications than for native applications. Instead, the device may provide hardware interaction as a service to the virtual environment utilizing a callback model, wherein applications within the virtual environment initiate component request specifying a callback, and the device initiates the component requests with the components and invokes associated callbacks upon completion of a component request. This model may enable the applications to interact with the full capability set of the components, and may reduce blocked execution of the application within the virtual application in furtherance of application performance.
Abstract:
A computerized method includes identifying a first routine of a first user and determining an alteration for the first routine. The alteration can be determined based at least in part on a second routine, where the second routine corresponds to a second user. In addition, or instead, the determining may be based at least in part on generating and selecting one or more alterations and/or selecting one or more enumerated alterations for the first routine. The first routine can be simulated with the alteration to predict a first performance score with respect to multiple future iterations of at least the altered first routine. The alteration may be selected for the first routine based on the prediction of the first performance score and a second performance score with respect to at least the unaltered first routine. The selected alteration for the first routine may be presented to the first user.
Abstract:
A mobile device, such as a mobile phone, smart phone, personal music player, handheld game device, and the like, when operatively combined with a PC, creates a secure and personalized computing platform through configuration of the mobile device's CPU (central processing unit) and OS (operating system) to function as an immutable trusted core. The trusted core in the mobile device verifies the integrity of the PC including, for example, that its drivers, applications, and other software are trusted and unmodified, and thus safe to use without presenting a threat to the integrity of the combined computing platform. The mobile device can further optionally store and transport the user's personalization data-including, for example, the user's desktop, applications, data, certificates, settings, and preferences-which can be accessed by the PC when the devices are combined to thus create a personalized computing environment.