Abstract:
A method and apparatus for attempting to contact at least one person in response to an event if the level of importance of the event to a first person meets or exceeds one threshold.
Abstract:
Methods and apparatus are provided for processing information items. Processing comprises one of context filtering, context prioritizing, or both context filtering and context prioritizing. In some embodiments the set of context items from which processing criteria are derived includes a user's calendar of appointments, schedule changes, exceptions, and the like.
Abstract:
A method and apparatus for evaluating the importance of an event to a person and taking action if the level of importance meets or exceeds one threshold, but is below or only meeting another; attempting to contact at least one person if the level of importance meets or exceeds a threshold; or attempting to contact at least one person using a first way to do so if the level of importance meets or exceeds a threshold, and selecting and using a second way to contact the at least one person if the at least one person has not responded within a period of time after using the first way.
Abstract:
Methods and apparatus are provided for processing information items. Processing comprises one of context filtering, context prioritizing, or both context filtering and context prioritizing. In some embodiments the set of context items form which processing criteria are derived includes a user's calendar or appointments, schedule changes, exceptions, and the like.
Abstract:
Providing information to a communications device includes determining the relevance of an event to a user based on service choices of the user and, if the event is relevant to the user, determining the relevance of information sources to the event, the information sources including at least data indicating a real-time status of the user, and determining whether to send information about the event to the user based on the information sources.
Abstract:
Embodiments of methods and apparatus to operate a wireless electronic device based on usage pattern are generally described herein. Other embodiments may be described and claimed.
Abstract:
Embodiments of methods and apparatus to provide a communication proxy system are generally described herein. According to an embodiment, a communication proxy system may be configured to manage power consumption for an ensemble of wireless electronic devices including a proxy device and one or more client devices. To reduce power consumption, the client devices may operate in a sleep mode/proxy mode. The proxy device may receive (320) control information (e.g. paging channel information) from the client devices. Based on the control information, the proxy device may monitor the wireless communication link for a notification (330) to the corresponding client device while that device operates in the sleep mode. In response to the notification, the proxy device may transmit an alert (340) to the client device.
Abstract:
A method and apparatus for evaluating the importance of an event to a person and taking action if the level of importance meets or exceeds one threshold (310), but is below or only meeting another; attempting to contact at least one person if the level of importance meets or exceeds a threshold (330); or attempting to contact at least one person using a first way to do so if the level of importance meets or exceeds a threshold (350), and selecting and using a second way to contact the at least one person if the at least one person has not responded within a period of time after using the first way (360).
Abstract:
Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system may include a virtual machine manager (VMM) module to create a secure virtualization environment or sandbox. The system may also include a processor block to load data into a first region of the sandbox and to generate a workload package based on the data. The workload package is stored in a second region of the sandbox. The system may further include an operational block to fetch and execute instructions from the workload package.