Abstract:
Embodiments of mechanisms for dynamic media content type streaming management for mobile devices are generally described herein. In some embodiments, the mobile device may receive selection input pertaining to generating output from a media file containing at least two of audio data, video data, and closed-captioning data, the selection input selecting at least one of audio, video, and closed-captioning to be output during play of the media content. In some embodiments, the mobile device may generate an audio output as a signal in response to the selection input including audio. In some embodiments, the mobile device may generate a video output as a signal in response to the selection input including video. In some embodiments, the mobile device may generate a closed-captioning output as a signal in response to selection input including closed-captioning.
Abstract:
Methods and apparatus relating to Priority Based Application Event Control (PAEC) to reduce application events are described. In one embodiment, PAEC may determine which applications (and their corresponding sub-system(s)) may cause a processor or platform to exit a low power consumption state. In an embodiment, PAEC may determine which applications (and their corresponding sub-system(s)) may resume operations after a processor or platform exit a low power consumption state. Other embodiments are also claimed and disclosed.
Abstract:
A method of operating an electronic device comprises detecting access to private information stored in memory of the electronic device. The detecting is performed by a privacy management module downloadable to the electronic device as object code for execution on the electronic device and the access is performed by a client application program. The method further comprises tracking, using the privacy management module, the private information being accessed by the client application program, and reconfiguring the electronic device, using the privacy management module, to change the access to the private information by the client application program according to at least one privacy access policy stored in the electronic device.
Abstract:
Various systems and techniques for remote machine management are described. Simulated device input (SDI) may be received from a source machine at a device driver module of a target machine, the source machine is remote from the target machine. The SDI may correspond to a local target input device serviced by the device driver module. The SDI may be provided to a consumer of the device driver module. A representation of a local target machine graphical display may be transmitted to the source machine including a response to the provided SDI.
Abstract:
Technologies for verifying authorized operation includes an administration server to query a dual-headed identification device of a server for identification data indicative of an identity of the server. The dual-headed identification device includes a wired communication circuit, a wireless communication circuit, and a memory having the identification data stored therein. The administration server further obtains the identification data from the dual-headed identification device of the server, determines a context of the server, and determines whether boot of the server is authorized based on the context of the server, the identification data of the server, and a security policy of the server.
Abstract:
Systems and methods for performing web authentication using a client platform root of trust are disclosed herein. Website and user validity and integrity may be authenticated based on the user device's attempt to access the website. A user device may securely access the website once the user device is successfully authenticated with a server. In an embodiment, the user device may perform an authentication of the website to ensure the website is a valid entity.
Abstract:
Embodiments described herein relate generally to the transmission of a request for a file from a first computing device to a second computing device. The first computing device may present an image having a representation of a file to a user and detect a selection of a location on the image at which the representation of the file is disposed. The first computing device, in turn, may transmit the image and a description of the selection to the second computing device. Based on the received image and description of the selection, the second computing device may identify the file corresponding to the selected location on the image. The second computing device may adapt, or cause to be adapted, the identified file. The second computing device may then transmit the identified file (or the adapted version) to the first computing device. Other embodiments may be described and/or claimed.