It also learns your habits over time, moving things in or out of the priority area, and will take user commands about whether or not an email is actually important.
The patent covers touch screen devices, methods, and graphical user interface for determining commands by applying heuristics.
In fact, Grossman agrees that the sites' vulnerabilities weren't Microsoft's fault as much as the result of sloppy Web coding on the part of the Web sites' own developers, who failed to filter user input for manipulative commands.
Using voice commands, the user can order the device to open files, check emails or zoom in with the camera to look in closer detail at what's in front of them.
Moreover, the 2010 study "Staying Connected on the Go: A Look at In-Vehicle Smartphone Integration Systems" conducted by the Consumer Electronics Association reports that 55 percent of smartphone owners prefer voice commands as their user interface for in-car smartphone integration, making the business case for SYNC and AppLink even more compelling.
This is a large smartphone or small tablet with a bendable screen the user flexes instead of touches to signal commands.
FORBES: Nokia and Microsoft Aim For Google In Smartphone Wars; Nokia's New Phones
Microsoft suggests a wrist-worn computer could be used to operate the device, or alternatively the user might control it through voice-commands and flicking their eyes to a certain spot.
The Captiv8 system consists of a hi-definition screen, fitted at eye level above the urinal, where it commands the full attention of the user.
FORBES: Wee Games Rather than Wii Games: The Best of British Ingenuity
The hack is a simple cross-site scripting vulnerability, a flaw in how Skype handles user input and prevents it from being interpreted as commands on the target machine.
FORBES: Researcher Claims Simple Skype Bug Lets Hackers Hijack Contacts' Accounts
Whitehat Security's Grossman speculates that machines running that software were targeted because they allow several commands to be injected in a single user input field on the sites they host, making those sites easier to hijack.
By entering certain strings of text into user input boxes on Web sites, cybercriminals are able to confuse their commands with data in a site's Structured Query Language (SQL) database and gain control of it, says Grossman.
That allows the software to not just recognize a spoken command, but react differently based on where a user is and who the user knows, ask for clarification, and follow a long string of related commands.
FORBES: Apple's Next Big Thing Already Here: Siri More Than Speech Recognition, Analyst Asserts
There's now a user-programmable button, which you can do to turn off features like voice commands.
应用推荐