Abstract:
The battery life of a mobile device operating in a wireless network environment is extended by terminating network communication activities after a specified period of time. Network communication activities may be restored when any one of a specified number of user actions are detected.
Abstract:
In accordance with some embodiments, a computer-implemented method for fetching email from an email server to a portable electronic device is disclosed. The method includes, at a portable electronic device configured with an email client: (1) when creating an email account on the portable electronic device: (a) attempting to connect to an outbound email server using a first port/security combination according to a first preferred sequence of port/security combinations; (b) if connection is made using the first port/security combination, storing the first port/security combination as a stored configuration for the email account; (c) if connection is not made using the first port/security combination, repeating (l)(a) for different port/security combinations according to the preferred sequence until connection is made with a second port/security combination; and (d) storing the second port/security combination as the stored configuration; and (2) subsequently employing the stored configuration to connect to and send email via the outbound email server.
Abstract:
In accordance with some embodiments, a computer-implemented method for fetching email from an email server to a portable electronic device is disclosed. The method includes fetching email from the email server upon occurrence of at least one of: expiration of a first period of time after activation of an email application running on the device; expiration of a second period of time after a prior email fetch while the email application is running in the foreground; expiration of a third period of time after the prior email fetch while the email application is running in background; or expiration of a fourth period of time after the portable device is unlocked.
Abstract:
Peripherals and data processing systems are disclosed which can be configured to interact based upon sensor data. In at least certain embodiments, a method for sensing motion and orientation information for a device includes receiving a motion event from at least one sensor located in a device. The method further includes determining an orientation for a display of the device. The method further includes determining whether the device is currently moving. The method further includes determining whether the device moves within an angle with respect to a ground reference for a first time period. The method further includes switching the orientation of the display of the device if the device moves in excess of the angle.
Abstract:
Audible alerts issued by a portable electronic device (100) can be silenced in response to user smacks on the body of the device. These audible alerts are initiated by applications (137) running on the device, such as email (140), phone (138), alarm (133), and/or timer (149-4) applications. In some embodiments, the device (100) includes one or more accelerometers (168) that detect and signal the user smacks. In some embodiments, the alert response mode of the device (100) such as whether it rings or vibrates to signal an alert can be changed in response to predefined patterns of user smacks.
Abstract:
In accordance with some embodiments, a computer-implemented method for fetching email from an email server to a portable electronic device is disclosed. The method includes, at a portable electronic device configured with an email client: (1) when creating an email account on the portable electronic device: (a) attempting to connect to an outbound email server using a first port/security combination according to a first preferred sequence of port/security combinations; (b) if connection is made using the first port/security combination, storing the first port/security combination as a stored configuration for the email account; (c) if connection is not made using the first port/security combination, repeating (l)(a) for different port/security combinations according to the preferred sequence until connection is made with a second port/security combination; and (d) storing the second port/security combination as the stored configuration; and (2) subsequently employing the stored configuration to connect to and send email via the outbound email server.
Abstract:
A virtual assistant uses context information to supplement natural language or gestural input from a user. Context helps to clarify the user's intent and to reduce the number of candidate interpretations of the user's input, and reduces the need for the user to provide excessive clarification input. Context can include any available information that is usable by the assistant to supplement explicit user input to constrain an information-processing problem and/or to personalize results. Context can be used to constrain solutions during various phases of processing, including, for example, speech recognition, natural language processing, task flow processing, and dialog generation.
Abstract:
A virtual assistant uses context information to supplement natural language or gestural input from a user. Context helps to clarify the user's intent and to reduce the number of candidate interpretations of the user's input, and reduces the need for the user to provide excessive clarification input. Context can include any available information that is usable by the assistant to supplement explicit user input to constrain an information-processing problem and/or to personalize results. Context can be used to constrain solutions during various phases of processing, including, for example, speech recognition, natural language processing, task flow processing, and dialog generation.
Abstract:
The battery life of a mobile device operating in a wireless network environment is extended by terminating network communication activities after a specified period of time. Network communication activities may be restored when any one of a specified number of user actions are detected.
Abstract:
The battery life of a mobile device operating in a wireless network environment is extended by terminating network communication activities after a specified period of time. Network communication activities may be restored when any one of a specified number of user actions are detected.