Abstract:
Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code associated with a browser-based application from a web server. The computing device collects real-time data generated by at least one sensor of the computing device and performs a multi-factor security assessment of the browser-based application as a function of the collected real-time data and the application code. Further, the computing device establishes a client-level web application runtime security policy associated with the browser-based application in response to performing the multi-factor security assessment and enforces the client-level web application runtime security policy.
Abstract:
Various systems and methods for tracking and analyzing emotional engagement of people while shopping are described herein. A system for tracking and analyzing emotional engagement of people while shopping includes an image processing module to: access image data from an electronic data storage, the image data including a person in a retail environment; and detect the person in the image data; an emotion detection module to determine an emotion expressed by the person; an object detection module to determine an object with which the person is interacting; and a marketing module to: select a sales action based on the emotion and the object; and execute the sales action.
Abstract:
Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client. A capability proxy of the client intercepts an authentication challenge response and retrieves one or more security assertions from a secure environment of the client computing device. The capability proxy may be an embedded web server providing an HTTP interface to platform features of the client. The client sends a resource access token based on the security assertions to the identity provider. The identity provider verifies the resource access token and authenticates the client computing device based on the resource access token in addition to user authentication factors such as username and password. The identity provider sends an authentication response to the client, which forwards the authentication response to the application server. Other embodiments are described and claimed.
Abstract:
A method may include receiving, using at least one processor, location information that includes a location of an unmanned aerial vehicle (UAV); querying, using the at least one processor, a policy database to retrieve a notification condition for a first property with respect to UAVs; calculating, using the at least one processor, a distance between the UAV and the first property using the received location information determining, using the at least one processor, if the distance of the UAV with respect to the first property is within a range defined in the notification condition for the first property; and transmitting, using the at least one processor, a notification to a party associated with the first property when the distance of the UAV with respect to the first property is within the range defined in the notification condition for the first property.
Abstract:
Embodiments of techniques, apparatuses, systems and computer-readable media for managing landscape of a property are disclosed. In some embodiments, a configuration module may be configured to receive data that specifies landscape or preferences for the landscape, and a sensor control module may configured to control operation of one or more sensors to record and report landscape associated operational data. In embodiments, a data aggregation and analysis module may be configured to receive environmental data for surroundings of the landscape and aggregate and analyze the environmental data, management preference data, and landscape data, and may cause appropriate irrigation to be provided to the landscape. Other embodiments may be disclosed and/or claimed.
Abstract:
Various systems and methods for tracking and analyzing emotional engagement of people while shopping are described herein. A system for tracking and analyzing emotional engagement of people while shopping includes an image processing module to: access image data from an electronic data storage, the image data including a person in a retail environment; and detect the person in the image data; an emotion detection module to determine an emotion expressed by the person; an object detection module to determine an object with which the person is interacting; and a marketing module to: select a sales action based on the emotion and the object; and execute the sales action.
Abstract:
System and techniques for context derived behavior modeling and feedback are described herein. A set of data about an environment and a person may be obtained from a plurality of devices present in the environment. The plurality of devices may include sensors. A behavior may be identified based on a comparison of the set of data to a behavior model. A recommended action to address the behavior may be generated. The recommended action may be communicated to at least one party influenced by the behavior.
Abstract:
A system for transmitting notifications based on image data analysis may comprise: an image registration module to receive, from an unmanned aerial vehicle, current image data of a geographic location; a change detection module to: compare the current image data with previous image data of the geographic location to identify a change in the geographic location; and analyze the change to determine a category of the change in the geographic location; and an action module to: determine at least one party to notify about the change based on the category; and transmit a notification to the at least one party via an unmanned aerial vehicle.
Abstract:
Techniques for providing security for a computing device are described herein. In one example, a maintenance issue for the computing device is detected. Additionally, a maintenance credential proximate the computing device can be detected. Furthermore, an alarm system within the computing device can be disabled in response to detecting an authorized maintenance credential.
Abstract:
Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform.