Abstract:
In some embodiments, a filter may filter web graphics library code executing on the graphics processing unit. As a result the web graphics library code may be prevented from accessing memory or other resources that are not allocated specifically for the web graphics library module. Likewise web graphics library code may not access any shared resources that have been explicitly assigned to the process specific web graphics library module.
Abstract:
Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented. Other embodiments are described and claimed.
Abstract:
Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented.
Abstract:
An embodiment of an apparatus may include a substrate and a semiconductor structure disposed on the substrate, where the semiconductor structure comprises a plurality of layers of material and where at least one layer of the plurality of layers of material comprises carbon-nitride-carbon (CNC). Other embodiments are disclosed and claimed.
Abstract:
Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client. A capability proxy of the client intercepts an authentication challenge response and retrieves one or more security assertions from a secure environment of the client computing device. The capability proxy may be an embedded web server providing an HTTP interface to platform features of the client. The client sends a resource access token based on the security assertions to the identity provider. The identity provider verifies the resource access token and authenticates the client computing device based on the resource access token in addition to user authentication factors such as username and password. The identity provider sends an authentication response to the client, which forwards the authentication response to the application server. Other embodiments are described and claimed.
Abstract:
A method may include receiving, using at least one processor, location information that includes a location of an unmanned aerial vehicle (UAV); querying, using the at least one processor, a policy database to retrieve a notification condition for a first property with respect to UAVs; calculating, using the at least one processor, a distance between the UAV and the first property using the received location information determining, using the at least one processor, if the distance of the UAV with respect to the first property is within a range defined in the notification condition for the first property; and transmitting, using the at least one processor, a notification to a party associated with the first property when the distance of the UAV with respect to the first property is within the range defined in the notification condition for the first property.
Abstract:
Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.
Abstract:
Methods, systems, and storage media are described for adjusting a bitrate for a data stream according to user consumption of the data stream. In embodiments, a computing device may determine a virtual resolution based on an absolute resolution of a display device associated with the computing device and a relative display size of the display device. The relative display size may be based on a user position and an absolute display size of the display device. The computing device may request data stream segments of a data stream encoded at a bitrate based on the virtual resolution, and provide the data stream segment for display on the display device. The virtual resolution may also be based on user attributes and/or device attributes. Other embodiments may be described and/or claimed.
Abstract:
Computer-readable storage media, apparatuses, and methods associated with context dependent reactions derived from human responses are disclosed herein. An apparatus may, in some embodiments, include a communication module and a reaction agent. The reaction agent may be configured to transmit, via the communication module, a request to a remote data source. The request may include context data indicative of an operational context of the apparatus. The reaction agent may receive, in response to the request, via the communication module, reaction data for the apparatus to react to the operational context. In embodiments, the reaction data may be derived from previous observations of human response to a context similar to the operational context indicated by the context data of the request. Other embodiments may be described and/or claimed herein.
Abstract:
Technologies for adaptive audio communications include a telecommunications device configured to collect session data of a communication session that includes an audio stream between a user of the telecommunications device and at least one other user of a remote telecommunications device. The telecommunications device is further configured to determine a session context of the communication session based on the collected session data, determine whether the session data includes an anomaly, and adjust, in response to a determination that the anomaly was detected, at least one of a portion of the audio stream of the communication session and a setting of the telecommunications device based on the anomaly. Other embodiments are described and claimed.