-
We got a brief eyes-on with Fujitsu's demo, which shows off the eye-controlled tech working with a map application.
ENGADGET: Fujitsu eye-tracking tech uses built-in motion sensor, infrared LED for hands-free computing (video)
-
And then you subtract from that the burning that has been done with the platform and the oil on the surface with the controlled burn, for example -- the application of dispersants, skimming operations and in situ.
WHITEHOUSE: Press Briefing on Oil Spill in Gulf of Mexico
-
The patent application also covers what could be controlled using the touchscreen, including settings like the focus detection area, flash adjustment, ISO, white balance, and exposure correction, to name a few -- all of which will surely be welcome to some, but we just hope the touchscreens will be accompanied by at least a few buttons and knobs for us old curmudgeons.
ENGADGET: Canon patent application points to touchscreen DSLRs
-
Judging by the promotional video above, the application incorporates a kind of hand-controlled flight simulation experience.
FORBES: A Hand-Controlled Flight Simulator, Brought To You By Leap Motion And Google Earth
-
Put another way, modern web-based applications that violate the application guidelines established in the 1970s cannot be controlled by stateful inspection firewalls.
FORBES: Tearing away the veil of hype from Palo Alto Networks' IPO
-
But the actual hosting of the application, the actual requirements for that application to exist in a cloud environment, to connect to the virtualized resources and whatever administration tools the cloud providers may give you to configure and maintain the application, will be, for the most part, controlled by the cloud provider.
FORBES: Cloud Computing's Vendor Lock-In Problem: Why the Industry is Taking a Step Backward
-
Another search warrant application is filed in Washington, this time for a personal Gmail account controlled by Google, Inc.
CNN: SHARE THIS
-
Approaches that rely on operations performed by the user have a fatal flaw beyond the need to recognize what actions are required: they depend on computer input devices controlled by software which can be exploited in the same way that a remote desktop application does.
FORBES: Artificial Intelligence Will Defeat CAPTCHA -- How Will We Prove We're Human Then?