Natural language connectivity

ABSTRACT

A device can include a processor; memory accessible to the processor; a microphone operatively coupled to the processor; a network interface operatively coupled to the processor; circuitry that parses audio signals received via the microphone for a name and a type of device; circuitry that analyzes network information associated with remote devices accessible via the network interface based at least in part on at least one of the name and the type of device to associate the name and the type of device with one of the remote devices; and circuitry that stores the name and the type of device to the memory in association with the one of the remote devices.

TECHNICAL FIELD

Subject matter disclosed herein generally relates to technology forcomputing or other devices.

BACKGROUND

Various computing devices include circuitry that can operatively coupleto one or more networks.

SUMMARY

A device can include a processor; memory accessible to the processor; amicrophone operatively coupled to the processor; a network interfaceoperatively coupled to the processor; circuitry that parses audiosignals received via the microphone for a name and a type of device;circuitry that analyzes network information associated with remotedevices accessible via the network interface based at least in part onat least one of the name and the type of device to associate the nameand the type of device with one of the remote devices; and circuitrythat stores the name and the type of device to the memory in associationwith the one of the remote devices. Various other apparatuses, systems,methods, etc., are also disclosed.

BRIEF DESCRIPTION OF THE DRAWINGS

Features and advantages of the described implementations can be morereadily understood by reference to the following description taken inconjunction with examples of the accompanying drawings.

FIG. 1 is a diagram of an example of a device in various example modesand examples of features of such a device;

FIG. 2 is a diagram of an example of a device;

FIG. 3 is a diagram of an example of a method;

FIG. 4 is a diagram of an example of a method along with an example ofan individual, an example of a device and an example of an utterance;

FIG. 5 is a diagram of an example of an architecture;

FIG. 6 is a diagram of example information in tabular form;

FIG. 7 is a diagram of example information in tabular form;

FIG. 8 is a diagram of example information in tabular form;

FIG. 9 is a diagram of example information in tabular form;

FIG. 10 is a diagram of example information in tabular form;

FIG. 11 is a diagram of an example of a device and an example of aspeech recognition engine; and

FIG. 12 is a diagram of an example of a system that includes one or moreprocessors.

DETAILED DESCRIPTION

The following description includes the best mode presently contemplatedfor practicing the described implementations. This description is not tobe taken in a limiting sense, but rather is made merely for the purposeof describing general principles of various implementations. The scopeof invention should be ascertained with reference to issued claims.

As an example, a method can include identifying and “naming” new orunknown devices on a network to allow for device-to-device connectionsthrough natural language commands. In such an example, the method caninclude storing a named device to memory of the device where suchinformation may be stored in association with other information. Forexample, consider storing a named device, as may be uttered by a user,in association with a contact entry in a contact database of a device,which can include information such as an individual's name, an emailaddress, a phone number, etc.

As an example, a device can include circuitry that provides for voicecontrol of the device, which may optionally be utilized for making oneor more device-to-device connections through natural language and, forexample, through no or minimal graphical user interface (GUI)interaction. In such an example, the device may include a speechrecognition (SR) engine and/or a natural language processing (NLP)engine.

As an example, a method can include performing voice controlledconnectivity optionally without knowing a device's formal name (e.g., aname seen by a network). For example, such a method can includereceiving and parsing various sources of information in an effort toassociate what may be a likely “friendly” name to a device (e.g., “Joe'sMoto”, etc.) such that one or more connections can be made using naturallanguage (e.g., “Send file X to Joe's Moto”). In such an example, afriendly name (e.g., “Joe's Moto”, etc.) may be stored to memory of auser's device (e.g., in association with a contacts database, etc.) tofacilitate subsequent interaction with the device assigned the friendlyname. Such a friendly name can include a possessive form of a name,nickname, familial relationship name, a title, etc. along with a type ofdevice (e.g., “Joe's Moto”, “Goofy's iPhone”, “Mom's ThinkPad”,“Doctor's Blackberry”, etc.).

As an example, consider a scenario where Carla and Sam are having a workmeeting. Carla is viewing a web article on her phone that she wants toquickly cast to Sam's tablet so they can view it at a larger size. Carlasays, “Show this on Sam's tablet”. In such an example, circuitry ofCarla's phone (e.g., voice assistant circuitry) may respond by renderinga message (e.g., graphically and/or audibly) with “Sam's tablet notfound.” In such a scenario, Sam's tablet has the name “SThomas057983”,such that it is not found via the information “Sam's tablet” (e.g.,audio information as processed at least in part by circuitry of Carla'sphone). As another example, consider a scenario where Sam's tablet hasthe formal name “Sam's iPad”, in such an example, Carla may not be ableto connect to it by referring to it as “Sam's tablet”, which may beconsidered to be a friendly name that Carla would like to use toidentify a tablet utilized by Sam.

As an example, various types of devices that include one or more networkinterfaces (e.g., for operatively coupling to one or more wirelessnetworks, etc.) can provide for automatic, semi-automatic or manualgeneration of a so-called “friendly” name, which may optionally bechanged by a user. As an example, various types of device can issue aprompt for a user to enter a name. Such friendly names may make deviceseasier to identify on a network for their users as they may know adevice's friendly name.

As an example, a method can include assigning a friendly name to aremote device where the friendly name is stored locally on a device thatis not the remote device and where, for example, the friendly name thatis stored locally is different than the friendly name of the remotedevice (e.g., as stored on the remote device). For example, considerassigning “Joe's Moto” to a remote device. In such an approach, anindividual may refer to the remote device as “Joe's Moto” for purposesof executing one or more actions (e.g., cast, send, etc.). Such anapproach can allow a user to automatically have an uttered friendly namebe properly associated with a device that is identifiable via a networkbased at least in part on network information and optionally one or moreother types of information. A user's device may include friendly nameassignment circuitry that processes audio uttered by the user for afriendly name that can be assigned to a device identifiable via anetwork. In such an example, the friendly name can include anindividual's name and a noun that can be a type of device utilized bythat individual (e.g., “Joe's Moto”). In such an example, theindividual's name may be identified as being in a possessive form andthe friendly name may be stored in such a manner (e.g., where the nameis “Joe”, the possessive form can be “Joe's”, which may be stored as“Joe's” as in the example of “Joe's Moto”).

As an example, a method can include pinpointing an unknown device bygiving it a friendly name that is capable of being understood vianatural language processing (NLP). Such an approach may be moreexpeditious and user friendly compared to scrolling through a GUI thatshows a listing of devices on a network where, for example, the name ofan intended device (e.g., target device) may not be identifiable and anindividual may erroneously connect to several devices before finding tothe proper target device.

As to a natural language approach, referring again to the Carla and Samexample above, if they have the only two devices on the network, Carlamay see “SThomas057983” in a GUI and assume that it must be Sam'stablet. While such a simplified scenario may provide for accuracy as toconnecting, in a natural language approach, it would have been easierfor her to skip the GUI altogether and make the connection by saying“Cast to Sam's tablet” (e.g., being able to utter a command and a targetas a short audio statement). A natural language approach can be moreexpeditious than Carla relying on voice input to cast her device toSam's tablet, where she would likely need to refer to it as“SThomas057983” where a misreading of a number, etc., may lead to one ormore errors. Uttering the moniker “SThomas057983” can involve uttering“S” then “Thomas” then “0”, then “5”, then “7”, then “9”, then “8”, andthen “3”, which may take approximately 5 seconds or longer to assurethat speech processing circuitry can accurately convert from speech totext. In contrast, uttering “Sam's tablet” may take approximate 1second. As an example, speech processing circuitry (e.g., a SR engine, aNLP engine, etc.) may be trained specifically for possessive forms toenhance recognition of such forms where a logical relationship ispredetermined to exist between a name in possessive form and a noun thatfollows, as in the English language. In the foregoing example, Carla isable to use a friendly name that can be at her discretion where thefriendly name includes some amount of information that can be utilizedfor purposes of making a proper association (e.g., where the friendlyname includes some information that can be linked to a contact, a deviceidentifiable via a network, etc.); whereas, for “SThomas057983”, it is amoniker (e.g., identifier) that is likely to be not under Carla'scontrol.

As an example, a natural language approach to associating friendly namesto remote devices can help to address one or more problems that mightsurface or have potential to surface using natural language to connectdevices (e.g., wasted time, frustration, loss of focus, etc.).

As an example, a scenario can involve assumptions of a new and unnameddevice. For example, assuming a friendly device name is established forall but a new device, assume that a voice utterance referring to a newdevice (e.g., “Sam's tablet”) is referring to the device with anunestablished friendly name. In such an example, any formal device nameof this unestablished device (e.g., “SThomas057983”) may then beautomatically matched to the friendly name derived from the voiceutterance. Optionally, a method may involve sending a prompt to the newdevice allowing the user to confirm they are or are not “Sam's tablet.”

As to a scenario that can involve stronger, smarter name association,consider a method that, to identify “SThomas057983” as “Sam's tablet,”information such as network information is accessed (e.g., one or morestreams of information, etc.). For example, through access to Carla'scalendar, it may provide information as to a meeting that she isattending with Sam Thomas making “SThomas057983” appear to be a likelymatch. For additional confirmation, as an example, a method may look atthe signal strength and/or one or more other types of informationbroadcasted by the device “SThomas057983” to determine that it is nearbyand/or a tablet computer. As an example, a method might include lookingfor one or more other “Sam” devices to see if they are near the unknowndevice.

As an example, a method may include looking for one or more referencesto one or more specific device types in either an established name(e.g., “Jon_iPhone2000”) and/or one or more voice utterances provided incontext (e.g., “Send to Jon's phone”). In such an example, “iPhone” maybe generally matched to “phone” as a device type match. As an example,accuracy may be improved further by employing one or more language modeltools to match words by meaning (e.g., in addition to charactermakeup/order, etc.). For example, if someone said “send to John'shandheld”, a method can include parsing the information as to “handheld”to know that “handheld” likely refers to a phone and might look for thattype of device.

As an example, a method can include leverages existing data where suchdata may include, for example, device information (e.g., one or more ofname, WiFi strength, proximity to other devices, and any otherinformation about the device, etc.), contextual data (e.g., one or moreof time, location, calendar entries, contacts, etc.) to pinpoint andassociate an unknown device to its owner or current user, streamlining aconnection process.

As an example, a method can include utilizing a data set that issharable across devices that provides a table of known formal devicenames and established friendly names associated to each respectiveformal device name. As context and voice utterances expand this dataset, the new data may be recorded and updated to be stored on onecentral device, a cloud service or a plurality of involved devices(e.g., that subscribe to a particular service, run a particular app,etc.).

As an example, one or more devices may be set (e.g., by a user, anapplication, etc.) to be “open to be connected” or “closed” which may bediscoverability settings. As an example, an application executable on atarget device may provide for security as to a connection, command,etc., from one or more other devices. For example, such an applicationmay issue a notion that requires an action on behalf of the targetdevice to confirm such an action and/or possibly to confirm a friendlyname assignment (e.g., an association of a “friendly” name to the targetdevice as uttered by another individual that is not the user and/orowner of the target device).

FIG. 1 shows an example of a device 110 that includes a housing 130,controls 131 and 132 (e.g., buttons, switches, etc.), one or moresockets 133 (e.g., power, audio, bus, etc.), a camera 134, a microphone135, a speaker, and a touchscreen display 140 where the device 110 canrender one or more graphical user interfaces (GUIs) such as examplesGUIs 150 and 160 to the touchscreen display 140.

FIG. 1 also shows various blocks as to features of the device 110 suchas, for example, one or more processors 111, memory 112 (e.g., memorycircuitry, etc.), one or more microphones 113 (e.g., microphonecircuitry, etc.), one or more network interfaces 114, circuitry thatparses 115, circuitry that analyzes 116, circuitry that stores 117 andone or more other types of circuitry 118.

As an example, the device 110 can include a processor (see, e.g., theone or more processors 111); memory accessible to the processor (see,e.g., the memory 112); a microphone operatively coupled to the processor(see, e.g., the one or more microphones 113); a network interfaceoperatively coupled to the processor (see, e.g., the one or more networkinterfaces 114); circuitry that parses audio signals received via themicrophone for a name and a type of device (see, e.g., the circuitrythat parses 115); circuitry that analyzes network information associatedwith remote devices accessible via the network interface based at leastin part on at least one of the name and the type of device to associatethe name and the type of device with one of the remote devices (see,e.g., the circuitry that analyzes 116); and circuitry that stores thename and the type of device to the memory in association with the one ofthe remote devices (see, e.g., the circuitry that stores 117).

As an example, circuitry that parses can include speech recognitioncircuitry. As an example, circuitry that analyzes can include logiccircuitry that can compare various types of information. As an example,circuitry that stores can include circuitry that is operatively coupledto one or more memory components. As an example, other types ofcircuitry can include identifier circuitry that can access informationsuch as network information as may be available through wirelesssignals. As an example, identifier circuitry can include a program thatis executable via one or more processors that can access wirelesssignals and determine one or more types of information associated witheach of the wireless signals (e.g., device information, rateinformation, security information, history, etc.).

In the example of FIG. 1, the GUI 150 is a phone GUI (e.g., of a phonemode) that includes a numeric keypad with graphical controls and the GUI160 is an applications GUI (e.g., of an application mode) with graphicalcontrols such as icons that can be utilized to instantiate (e.g.,launch, transition to, etc.) one or more applications (e.g., apps,etc.).

As an example, an application may be local, remote or a combination oflocal and remote. For example, a settings application may provide forviewing, changing, etc., one or more settings of the device 110. Asetting may be a circuitry setting such as a wireless network settingthat instructs the device 110 to operatively coupled to (e.g., join) awireless network, which may be a Wi-Fi network, a BLUETOOTH network, acellular network, etc. As an example, the device 110 may automaticallyjoin a wireless network, for example, when powered on, transitioned fromone power state to another, upon detection of a network, etc. As anexample, the device 110 may pair with one or more other devices via anetwork such as a piconet (e.g., consider a BLUETOOTH network, etc.). Asan example, a network may be local or local and remote (e.g., consider anetwork that is operatively coupled to the Internet, etc.).

Various types of networks may be specified by an entity or entities suchas the IEEE (e.g., IEEE 802.11.X, 802.15.X, etc.).

IEEE.802.11.X includes specifications for Wi-Fi technology for wirelesslocal area networking of devices. Some examples of devices that mayutilize Wi-Fi technology include personal computers, video-gameconsoles, phones and tablets, digital cameras, smart TVs, digital audioplayers and modern printers. As an example, Wi-Fi technology may beutilized in an Internet of Things (IoT) where various devices caninclude wireless circuitry (e.g., one or more Wi-Fi adapters, etc.).

As an example, a Wi-Fi compatible device may connect to the Internet viaa WLAN and a wireless access point. Such an access point (or hotspot)may have a range of about 20 meters (66 feet) indoors and a greaterrange outdoors (e.g., depending on environment, signals, obstructions,etc.). As an example, a hotspot coverage may be as small as a singleroom with walls that block radio waves, or as large as many squarekilometers achieved by using multiple overlapping access points. As anexample, a Wi-Fi network may include wireless router that can takes awired or wireless Internet connection (e.g., via a modem) and transformit into a wireless signal. As an example, a wired Internet connectionmay be via a cable company and a wireless Internet connection may be viaa cellular carrier (e.g., consider one or more of 4G, LTE, etc.).

Wi-Fi technology may utilize one or more electromagnetic frequencybands. For example, consider one or more of the 2.4 gigahertz (12 cm)UHF and 5.8 gigahertz (5 cm) SHF industrial, scientific and medical(ISM) bands. A Wi-Fi network may be accessible by a device that iswithin range of a wireless modem (e.g., wireless router, etc.).

IEEE 802.15.1 pertains to a working or task group or specificationassociated with WPAN and BLUETOOTH technology. The IEEE 802.15.1 definesphysical layer (PHY) and Media Access Control (MAC) specifications forwireless connectivity with fixed, portable and moving devices within orentering personal operating space. Such connectivity may be part of apiconet, which may be defined as an ad hoc network that links a wirelessuser group of devices using BLUETOOTH technology protocols. A piconetcan include of two or more devices occupying a common physical channel(e.g., synchronized to a common clock and hopping sequence). A piconetmay allow one master device to interconnect with a number of activeslave devices (e.g., from 1 to 7 active slave devices or possibly more).As an example, one or more slave devices may be inactive, or parked,where a master device may bring one or more of the slave devices intoactive status.

As an example, BLUETOOTH technology may operates at frequencies betweenapproximately 2402 MHz and approximately 2480 MHz, or approximately 2400MHz and approximately 2483.5 MHz including guard bands approximately 2MHz wide at the bottom end and approximately 3.5 MHz wide at the top.Such frequencies are in the industrial, scientific and medical (ISM) 2.4GHz short-range radio frequency band.

A wireless network may be protected by one or more security mechanisms.For example, one or more of a password, a code, etc., may be required toaccess, join, pair, etc., a wireless network. As an example, a wirelessnetwork may be detectable but require execution of a security mechanismprior to joining, pairing, etc.

As an example, the device 110 of FIG. 1 can include an operating system(OS) such as, for example, an iOS OS (Apple, Cupertino, Calif.), ANDROIDOS (Google, Mountain View, Calif.), WINDOWS OS (Microsoft Corporation,Redmond, Wash.), FIRE OS (Amazon, Seattle, Wash.), etc. A documententitled “User Guide”, Verizon, MOTO Z|DROID, October 2016 (66 pages),is incorporated by reference herein and describes a smart phone marketedas the MOTO Z DROID smart phone (Model XT1650-01, Motorola Mobility LLC,Chicago, Ill.).

FIG. 2 shows a block diagram of an example of a device 210. As anexample, the device 110 of FIG. 1 may include one or more features ofthe device 210 of FIG. 2.

In FIG. 2, the device 210 includes an application processor 272, abaseband processor 273, an audio codec 274, a display 275 (e.g.,including display driver circuitry), a camera/flash sub-system 276, aUSB port 276, touch sensing circuitry 278, orientation/motion sensingcircuitry 279, one or more antennas 280, BLUETOOTH circuitry 281, mobilecircuitry 282, the power management circuitry 220, audio amplificationcircuitry 284, GPS circuitry 285, WLAN circuitry 286, memory 287, amicrophone jack in 291, a captive microphone 292, a captive speaker 293,one or more additional speakers 294, and headset out/circuitry 295.Various types of interfaces may exist between circuitry of a device suchas the device 210. As an example, consider an I²S interface, which may,for example, operatively couple the application processor 272 and theaudio codec 274; the baseband processor 273 and the audio codec 274; andthe BLUETOOTH circuitry 281 and the audio codec 274.

As to the one or more antennas 280, consider, as an example, one or moretypes of antennas that can received and/or transmit electromagneticenergy (e.g., EM waves). As to BLUETOOTH antenna design, some aspectsare described in an Application Report of Texas Instruments entitledAN-1811 Bluetooth Antenna Design (SNOA519B—March 2008—Revised May 2013).As to Wi-Fi antenna design, some aspects are described in an

As an example, a Wi-Fi interface may operate a high frequency comparedto other interfaces of a device. As an example, consider ahalf-wavelength at 2.4 GHz to be 6.25 cm (2.5 inch), and ahalf-wavelength at 5 GHz to be 3 cm or just over an inch. Hence, usingquarter-wavelength antennas leveraging a device's groundplane can resultin a relatively small antenna. As to quarter-wavelength antennas forWi-Fi some examples include the inverted F antenna (IFA) and the planarinverted F antenna (PIFA). As an example, a Wi-Fi antenna may beutilized to simultaneously transmit and receive. Antenna gain may bespecified in dB, such as peak antenna gain equals +2 dB (e.g.,efficiency times the directivity is +2 dB).

As an example, a device such as the device 110 and/or the device 210 mayinclude one or more of IEEE 802.11a/b/g/n/ac Wi-Fi, multiple-input andmultiple-output (MIMO), BLUETOOTH 5.0, and NFC. MIMO can be utilized asa method for multiplying the capacity of an electromagnetic energy(e.g., EM wave) link using multiple transmit and receive antennas toexploit multipath propagation. As an example, MIMO can include one ormore of precoding, spatial multiplexing (SM), and diversity coding.

As an example, a device can include one or more antennas, which mayinclude one or more directional antennas where a signal received may bestronger when the device is oriented in a certain manner. As an example,a device can include circuitry that approximate a direction of a signalthat is received where, for example, a compass, GPS, or other circuitrymay be able to assign a coordinate-based direction to the signal (e.g.,East, West, North, South, up, down, etc.). As an example, a device mayinclude circuitry that can determine if a signal transmitter is moving,has moved, etc. As an example, such information may be utilized in oneor more methods. As an example, a device may issue a notification for auser to move his or her device (e.g., spin 360, etc.) to be able todetermine a direction or directions of one or more signals, which may beconsidered to be network information.

As an example, the device 110 and/or the device 210 may receive audioinput via a microphone where such audio input may be digitized, forexample, via one or more analog-to-digital converters (ADCs). As anexample, the device 110 and/or the device 210 may include circuitry thatcan process digitized audio input.

As an example, circuitry that can process digitized audio input mayinclude speech recognition (e.g., voice recognition) circuitry such as aspeech recognition engine (SR engine). As an example, an SR engine mayprovide for recognition and translation of spoken language into text(e.g., speech to text (STT)). A SR engine may require training where,for example, an individual speaker reads text or isolated vocabulary. Insuch an example, the SR engine may analyze the speaker's specific voiceand use it to fine-tune the recognition of that individual's speech,resulting in increased accuracy. Some types of SR engines may not usetraining and may be speaker independent (e.g., as opposed to speakerdependent).

Speech recognition applications may include, for example, voice userinterfaces such as voice dialing (e.g., “Call home”), call routing(e.g., “I would like to make a collect call”), appliance control, search(e.g., find a podcast where particular words were spoken), simple dataentry (e.g., entering a credit card number), preparation of structureddocuments (e.g. a radiology report), speech-to-text processing (e.g.,word processors or emails), and aircraft (e.g., direct voice input).

As an example, speech recognition may be performed using one or moreapplication programming interfaces (APIs). As an example, consider theAPPLE speech recognizer(https://developer.apple.com/documentation/speech). A portion of samplecode appears below for the APPLE speech recognizer:

func recognizeFile(url:NSURL) { guard let myRecognizer =SFSpeechRecognizer( ) else { // A recognizer is not supported for thecurrent locale return } if !recognizer.isAvailable( ) { // Therecognizer is not available right now return } let request =SFSpeechURLRecognitionRequest(url: url) recognizer.recognitionTask(with:request) {(result, error) in guard let result = result else { //Recognition failed, so check error for details and handle it return } ifresult.isFinal { // Print the speech that has been recognized so farprint(“Speech in the file is\(result.bestTranscription.formattedString)”) } }}

In the foregoing example, a request is made and speech that has beenrecognized is returned from the speech recognizer (e.g., SR engine,etc.). Such text may be in the form of a text string, which may be atext file, etc.

As an example, a speech API may perform speech recognition bycommunicating with one or more remote resources (e.g., a remote serverthat includes SR functionality) and/or by utilizing on-device SRfunctionality (e.g., a local SR engine, etc.).

As an example, results of speech recognition may be utilized by anapplication to perform one or more operations.

FIG. 3 shows an example of a method 300 that includes a parse block 310for parsing audio signals received via a microphone of a device for aname and a type of device; an analysis block 320 for analyzing networkinformation associated with remote devices accessible via a networkinterface of the device based at least in part on at least one of thename and the type of device to associate the name and the type of devicewith one of the remote devices; and a storage block 330 for storing thename and the type of device to the memory in association with the one ofthe remote devices.

As shown in the example of FIG. 3, the analysis block 320 may include ananalysis that is match via name 322, an analysis that is match via typeof device 324, and an analysis that is match via name and type of device326.

FIG. 4 shows an example of a method 400 along with an example of anindividual 401 that has a hand 403 that is holding a device 404 wherethe individual 401 utters sound as audio 406 such as, for example, “Sendfile X to Joe's Moto”, which includes information as to a verb andobjects (e.g., file X, Joe, Moto, “Joe's Moto”). In such an example, thedevice 404 can be a smart phone, for example, consider the device 110 ofFIG. 1, the device 210 of FIG. 2, etc. In the example of FIG. 4, such adevice may be referred to as a hand-held device or hand-holdable device,which may correspond to an industry standard type of form factor. As anexample, the device 404 may be referred to as a mobile device.

As an example, a mobile device can be a computing device that hasdimensions that make it small enough to hold and operate in the hand(see, e.g., the hand 403 of the individual 401). A person's hand sizemay be measured by its length (e.g., hand sizes for males may range fromapproximately 15 cm to approximately 22 cm while hand sizes for femalesmay overlap and may be of a lesser size).

FIG. 4 also shows individuals 405 and 408 along with devices 407 and409. In such examples, the individual 401 may be Sam, the individual 405may be Joe and the device 407 can be Joe's Moto device, and theindividual 408 may be neither Sam nor Joe and the device 409 may beneither Sam's device 401 nor Joe's device 407. As an example, thedevices 407 and 409 can be handheld (e.g., handholdable) or mobiledevices such as, for example, smart phone devices. Such devices caninclude memory that can store information such as, for example, contactinformation. As an example, upon receipt of a query, a device mayinclude circuitry that searches information such as contact informationthat may be stored in memory of the device that may be utilized todetermine whether the query is to be confirmed, who initiated the query,what type of device initiated the query (e.g., Sam's IPHONE device),etc. As an example, a device can store information that can indicatethat transmissions from a particular individual, device, etc. are to beaccepted (e.g., a whitelist, etc.) or denied (e.g., a blacklist) or, forexample, automatically responded to for purposes of further information,etc. As an example, where a query is received, a device may initiate atimer where if a user of the device does not respond within a period oftime, the query is dismissed or, for example, responded to with anotification (e.g., no answer, timed out, etc.).

As an example, a mobile device can include a display (e.g., providing atouchscreen interface with digital buttons and keyboard), a microphone,a speaker, and circuitry that can connect to the Internet andinterconnect with one or more other devices (e.g., a car entertainmentsystem, a headset, etc.) where such a connection or connections may bevia one or more types of technologies (e.g., consider wirelesstechnologies such as Wi-Fi, BLUETOOTH, cellular network, near fieldcommunication (NFC), etc.). As an example, a mobile device can includeone or more integrated cameras, a digital media player, circuitry toplace and receive telephone calls (e.g., via one or more types ofnetworks, etc.), and Global Positioning System (GPS) circuitry. As anexample, a mobile device may be powered by a battery or batteries (e.g.,one or more lithium-based batteries, etc.). As an example, a mobiledevice can include one or more processors and memory accessible to atleast one of the one or more processors. As an example, a mobile devicemay include one or more sets of operating system instructions for one ormore operating systems that can establish one or more correspondingoperating system environments. As an example, an operating system mayprovide one or more application programming interfaces (APIs) that mayallow an application, a service, etc., to make one or more types ofcalls to an operating system where, in turn, the operating system mayrespond to a call or calls with information.

As an example, GPS circuitry may be available through an API call thatreturns information such as latitude and longitude of the GPS circuitry(e.g., of a mobile device that includes or is operatively coupled to theGPS circuitry). In such an example, a device may utilize one or moretypes of location information as generated at least in part by GPScircuitry in combination with one or more other types of information(e.g., access point information, hotspot information, signal strengthinformation, data rate information, contact information, etc.). In suchan example, multiple types of information may be utilized to associate aname, a type of device, a name and a type of device, etc., with aparticular remote device (see, e.g., the method 300 of FIG. 3, etc.).

In the example of FIG. 4, the method 400 includes an access block 410for accessing a speech recognition engine to process audio received viaa microphone of a device, a parse block 414 for parsing the receivedaudio at least in part via the speech recognition engine (e.g., wherethe SR engine generates text, etc.) to generate parsed results thatinclude a command and other information, a formulation and submissionblock 418 for formulating and submitting a query based at least in parton the parsed results (e.g., at least a portion of the otherinformation, etc.), a reception block 422 for receiving a query resultas a response to the formulated and submitted query, an associationblock 426 for associating a name and a type of device with respect to aremote device (e.g., identifiable via one or more networks, etc.) basedat least in part on the received query result where the associationblock 426 may generate confidence information (e.g., probability of acorrect association, etc.), a decision block 430 for deciding whetherthe association of the association block 426 is at a particularconfidence level (e.g., via comparison to a confidence level threshold,etc.) based at least in part on the confidence information, and anexecution block 450 that executes the command of the parse block 414where the command is directed to the remote device with the associatedname and type of device.

As shown in the example of FIG. 4, the method 400 may include areception block 460 for receiving a confirmation that the command thatwas directed to the remote device was received and/or that action wastaken per the command. For example, consider the audio 406 to be “Sendfile X to Joe's Moto” where the command is “Send file X to”, where thename is “Joe” and where the type of device is a MOTOROLOA MOBILITYdevice such as a smart phone marketed under the trademark “MOTO”. Insuch an example, the formulation and submission block 418 may formulateand submit a query that searches for “Joe” and “Moto” where, forexample, “Joe” may be searched with respect to contact information(e.g., a contacts database) and/or network information and where “Moto”may be searched with respect to network information and/or contactinformation. As an example, where a device is operating as a hotspotwith a name “JoeMoto”, an association may be made as to the name “Joe”,a type of device “Moto” and the identified hotspot device with the name“JoeMoto”. In such an example, the method 400 can include storinginformation in memory as to the association of the name (e.g., “Joe”,etc.), type of device (e.g., “Moto”, etc.) and the identified remotedevice (e.g., “JoeMoto”, etc.).

As an example, where a successful association is made, as may bedetermined by receipt of a confirmation per the reception block 460, amethod may be performed that can bypass various blocks of the method400. For example, such a method may include blocks 410 and 414 where adirect match may be made to the previously identified remote device(e.g., directly and/or indirectly) per information stored in memory. Insuch an example, where a MAC address of “JoeMoto” has been stored (e.g.,as a type of device and/or network information), such information may beutilized to identify the targeted remote device optionally with orwithout “JoeMoto” (e.g., consider a scenario where a user may havechanged a name of the device); or, for example, where a user may havechanged that device (e.g., old device) for another device (e.g., newdevice), the MAC address may have changed though the user may haveretained the name (e.g., “JoeMoto”), for example, via a restore, filetransfer, settings transfer, etc. As explained, a method may be robustto changes that may occur as to one or more types of information suchthat confidence and rapidity of command execution as to a remote devicemay occur responsive to a user speaking into her device's microphone. Inthe example of FIG. 4, information such a “Joe's Moto” may be stored inassociation with one or more other pieces of information, which caninclude network information that can provide for identification of aremote device as being associated with “Joe's Moto” or not. In such anexample, stored information may be utilized to narrow down possibleremote devices as an intended target device through positively and/ornegatively making decisions as to one or more identifiable devices asbeing operatively coupled to one or more networks.

Referring again to FIG. 4, where the decision block 430 decides that theassociation is not confident (e.g., with respect to a confidence levelthreshold, etc.), the method 400 may continue to a transmission block434 that may transmit a query to a target device (e.g., the most likelyremote device, etc.), which may cause rendering of a GUI, a textmessage, etc., to which the target device may respond. As shown, themethod 400 can include a reception block 438 for receiving a response toa query transmitted to the target device of the transmission block 434and can include a decision block 442 for deciding whether the targetdevice is confirmed to be “Joe's Moto” in the example of FIG. 4. Wherethe decision block 442 decides that the target device is the intendedremote device, the method 400 may process to the execution block 450 andwhere the decision block 442 decides that the target device is not theintended remote device, the method 400 may proceed to a request block446 that can issue a clarification request, for example, as a GUI, aprompt, etc., of the device 404 of the individual 401. In such anexample, the individual 401 may utter further audio that can beprocessed via one or more blocks of the method 400. For example, theindividual 401 may utter “Joe Smith's Moto” such that the information“Smith” may be utilized.

As an example, a method can include analyzing available networkinformation as to remote devices, for example, to match based on a name(e.g., “Joe”, which may be unique for given network information), adevice (e.g., “Moto”, which may be unique for given networkinformation), and/or name and device (e.g., “Joe” and “Moto”, which maybe of a higher probability of being unique for given network informationcompared to name alone or device alone).

As an example, where audio information includes “Joe's Moto”, if thereis a hit on “Joe” alone, then a method may assume that hit is sufficientto associate “name and type of device” with one of the remote devices(e.g., at least for purposes of a query to the remote device); if thereis a hit on “Moto” alone, then a method may assume that hit issufficient to associate “name and type of device” with one of the remotedevices (e.g., at least for purposes of a query to the remote device);and if there are hits on both “Joe” and “Moto” (e.g., or “Joe's Moto”),a method may assume that the hits are sufficient to associate “name andtype of device” with one of the remote devices; noting that a query maybe sent for purposes of confirmation, etc.

As an example, where a method includes storing an association orassociations to memory, in the context of the example of FIG. 4, such amethod may store “Joe's Moto” for the remote device (e.g., stored inmemory as a temporary association, as a final, definitive result, etc.).In such an example, when it comes to the command “send to Joe's Moto”, amethod may include probing with a query to the remote device such as,for example, “hey Joe, is this your Moto?” or “is this Joe's Moto?”. Asan example, a method can include formulating a message for a probingquery that is transmitted to a remote device. In such an example, theformulated message can include information from audio as digitizedand/or parsed from an utterance of an individual (e.g., the audio 406 ofthe individual 401).

As an example, the individual 401 may utter a direction such as “Sendfile X to Joe's Moto, east of me”. In such an example, information fromGPS, a compass, one or more networks, etc., may be utilized to includeand/or exclude one or more networks and/or one or more devices. Forexample, consider the device 404 as including GPS circuitry such that alocation (e.g., latitude and longitude) can be determined for the device404 and where network signals may be analyzed to determinedirectionality with respect to the location. As an example, theindividual 401 may move the device 404 such as rotationally to direct itin various directions (e.g., E, W, N, S, etc.) where signal strengthand/or one or more other metrics may be associated with direction. Inturn, the device 404 may determine that one or more network signals are“east of me” such that those signals may be considered as being a subsetof signals possibly associated with Joe's Moto. As an example, theindividual 401 may be in an office in a building where “Joe” is likelyin another office or location in the building, on campus, etc., that iswithin a common network (e.g., a corporate network for the location). Insuch an example, the individual 401 may know that “Joe” is likely to bein that office or location and to know a direction of the office orlocation given his current location (e.g., location of the device 404).

As to analysis of audio information that may be received by a microphoneand digitized, a device may utilize one or more types of circuitry,which can include, for example, local circuitry and/or remote circuitry.Circuitry can include functionality as to speech recognition (SR) and/orfunctionality as to natural language processing (NLP). As an example, aSR engine can process digital audio information to generate output thatmay be in the form of individual words. As an example, a NLP engine mayreceive individual words as may be output from a SR engine. In such anexample, the NLP engine may process the individual words in relationshipto one or more factors. For example, an NLP engine may processindividual words in an order or orders with respect to one or moregrammars. As an example, a grammar may define nouns, verbs, etc., and,for example, associations therebetween.

As an example, a method can include analyzing audio information as to aparticular sentence type or types. For example, consider an imperativesentence type or an interrogative sentence type. Such a method mayanalyze audio information as to an uttered imperative sentence “Send toJoe's Moto” where the verb “send” (e.g., “send to”) may be analyzed tobe a command and where “Joe's Moto” may be analyzed to be a possessiveas to two nouns where a relationship of belonging exists between the twonouns (e.g., one thing and another thing). In such an example, one ofthe nouns may be analyzed to be a person and the other one of the nounsmay be analyzed to be a thing (e.g., an object such as a smart phone).As an example, a possessive form of nouns as present in audioinformation may be analyzed with respect to one or more other types ofinformation to make an association between one or more of the nouns inthe possessive form and a device that is identifiable via one or morenetworks (e.g., a WiFi network, a BLUETOOTH network, etc.). In such anexample, the one or more other types of information may be, for example,contact information as stored in a contacts database (e.g., memory) of adevice (e.g., locally) and/or as stored in a contacts database (e.g.,memory) of a remote piece of equipment (e.g., cloud storage, etc.).

As an example, a SR engine and/or a NLP engine may be specificallyconstructed to analyze audio information for a possessive form. Forexample, a SR engine and/or a NLP engine may be trained based on a soundor sounds associated with an apostrophe “s” as utilized in a possessiveform of speech. As an example, a user may be prompted to say each of aseries of names (e.g., a set of common names) as the name itself andthen the possessive form of the name (e.g., John and then John's). Insuch an example, the SR engine and/or NLP engine may be specificallytailored to recognition and/or identification of a possessive form of aname where the name may be determined from the possessive form. In suchan example, a name determined from a possessive form may be utilized ina query that aims to match the name with name information as may be in acontacts list, network information (e.g., devices that may include aname or a portion of a name of a person, etc.), etc.

As an example, a method, a SR engine, a NLP engine, etc., may allow foridentification of a genitive morpheme (e.g., as in possessive forms).For example, consider one or more of the following examples of thegenitive morpheme:

-   -   Ex. A. Written as “'s” and pronounced as /s/: cat's,        Elizabeth's, Joseph's, Mike's    -   Ex. B. Written as “'s” and pronounced as /z/: Barbara's, dog's,        John's, Mary's    -   Ex. C. Written as “'s” and pronounced as /Iz/: Boris's, Marge's,        Rose's, virus's    -   Ex. D. Written as “'” and not pronounced (plurals): cats', dogs'    -   Ex. E. Written as “'” and not pronounced (classical and biblical        names): Augustus', Jesus', Moses'

As mentioned, a method may include analyzing an imperative sentence oran interrogative sentence. As to an interrogative sentence, consider asan example: “Where's Joe's Moto?”. In such an example, a SR engineand/or a NLP engine may process audio information to return a resultsuch as “Joe's Moto is online” or, for example, “Joe's Moto is offline”or, for example, “Joe's Moto not found”. As to an interrogativesentence, a command may be inherent such as, for example, “where's”meaning “return a status” and/or “return a location”.

As explained above, a method may be operable as to various types ofsentences, which may include imperative sentences and interrogativesentences. In either instance, a sentence can include information in apossessive form that links two nouns. As an example, a method caninclude utilizing one or both nouns in a possessive form of a sentenceas in audio information to make an association between at least one ofthe nouns and a device that is network enabled and identifiable on atleast one network.

As an example, a device may include circuitry that can implement arelatively light-weight speech recognition engine and/or NLP engine.Such circuitry may be trained by a user via utterance of names in acontacts database (e.g., contact information) stored locally in memoryof the device and, for example, via utterance of types of devices, whichmay be provided in a types of devices database (e.g., deviceinformation) stored locally in memory of the device. As the number ofnames may be of the order of one thousand (e.g., consider average numberof connections for a LINKEDIN system user) and as the number of types ofdevices may be of the order of one hundred, memory utilization may bemanageable for a mobile device (e.g., a smart phone) in terms ofrecognition of short words such as names and types of devices as well aspossessive forms that can be combinations thereof. As an example, acommand database for types of commands and an objects database for typesof objects that can be acted upon via a command or commands may be afinite predetermined set, as may be available, for example, by anapplication (e.g., an app) that executes at least in part locally on adevice (e.g., a smart phone app, etc.).

As an example, an application that can execute at least in part locallyon a device (e.g., a smart phone device, etc.) may include features thatallow a user to build a database or databases of names and types ofdevices. In such an example, the database may associate a name and/orone or more types of devices with other information, which can includeinformation that may be identifiable via a network connection, etc. Asan example, a device may include circuitry that can generate and/orstore information as to “things”, for example, in an Internet of Things(IoT) context. In such an example, a user may have entries for her“things”, which may be proceeded in speech by the work “my” or by theuser's name (e.g., “Ellen's XBOX”, etc.). In such an example, such adevice may include local circuitry for instantiating a speechrecognition engine and/or a NLP engine that can receive audioinformation and perform one or more actions responsive to receipt ofsuch audio information. As an example, a device can include circuitrythat can understand possessives as in the possessive form where, forexample, there is an owner of a thing.

As an example, a device can include circuitry that can recognizepossessive sounds where, in the English language, such sounds caninclude, for example, /s/ (e.g., as in cat's, Elizabeth's, Joseph's,Mike's, etc.), /z/ (e.g., as in Barbara's, dog's, John's, Mary's, etc.),and /Iz/ (e.g., Boris's, Marge's, Rose's, virus's, etc.). Such a devicecan include circuitry that links a word that is directly after in time(e.g., as in audio information) from a word that has a possessive sound.Such a linkage can form a query or at least a portion of a query thatcan be utilized in an effort to identify a device that is operativelycoupled to a network (e.g., Joe's Moto, etc.).

As an example, a device can include an individualized user mode for aplurality of device (e.g., things, etc.) of the user and an “other” modefor a plurality of devices of one or more others. In such an example,the individualized user mode can include circuitry that can recognizethe English word “my” as occurring before a noun such that “my”expresses possession of the noun. While some English language examplesare given, circuitry may operate in one or more other languages as topossessives, etc.

FIG. 5 shows an example of an architecture 500 that includes theInternet 510, a plurality of routers 520-1 to 520-N, a plurality ofaccess points 530-1 to 530-N and a plurality of devices 540-1 to 540-N.In the example of FIG. 5, a device may be configured to operativelycouple to one or more access points, one or more routers, etc. As anexample, the architecture 500 may be for a facility such as a building,a campus, etc. As an example, the architecture 500 may be for aplurality of sites (e.g., buildings, etc.). With respect to the exampleof FIG. 4, the device 404 may be operatively coupled to one or morepieces of equipment in the architecture 500 (e.g., shown or not shown)and “Joe's Moto”, as a device, may be operatively coupled to one or morepieces of equipment in the architecture 500 (e.g., shown or not shown).In such an example, one or more access points (e.g., one or morehotspots or other types of APs) may be identified where the device 404and/or the device “Joe's Moto” may join such that they are on a commonnetwork (e.g., or coupled networks, etc.) where devices can beidentified for purposes of transmission of information (e.g.,command(s), data, etc.).

As an example, in an architecture, each piece of equipment, each device,etc., can have an associated identifier or identifiers. For example, anidentifier may be assigned by a manufacturer, assigned by a user, etc.

FIG. 6 shows an example of information 600 in tabular form, which may,for example, be stored in memory of a piece of equipment, a device, etc.As an example, information may be discoverable. In the example of FIG.6, such information can be or include WiFi technology information. As anexample, circuitry such as circuitry of a packet analyzer may discoverinformation.

A packet analyzer (also known as a network analyzer, protocol analyzeror packet sniffer or, for particular types of networks, an Ethernetsniffer or wireless sniffer) is a piece of equipment (e.g., dedicated,computer, device, etc.) that can intercept and log traffic that passesover a digital network or part of a network. As data streams flow acrossthe network, a sniffer can capture a packet and, if desired, decode thepacket's raw data, showing the values of various fields in the packet,and can analyze its content according to an appropriate RFC or otherspecifications. A process of packet capture can involve intercepting andlogging network traffic.

As an example, a program such as the inSSIDer program can be executableto log RSSI, Security, Channel, Hardware Vendor, Max Rate, Network Typeand MAC address in columns of a table. As an example, such an identifierprogram may be executable on a device such as the device 110 of FIG. 1,the device 210 of FIG. 2, the device 404 of FIG. 4, etc.

As an example, information acquired via an identifier program mayinclude MAC Address (a unique identifier for a wireless network where,in an infrastructure network, it can be a radio's MAC Address and where,in an ad-hoc environment, it can be a pseudo-randomly generated MACAddress), SSID (Service Set Identifier, which is the name an 802.11wireless network uses to identify itself), RSSI (Received SignalStrength Indication, which is the amplitude level of the wirelessnetwork as seen by a wireless card/adapter/interface), Channel (e.g.,channels 1-14 in the 2.4 GHz frequency range, channels 30-160 in the 5GHz range, etc.), Channel Bonding (two numbers in the channel column,which indicates that a network is using “channel bonding”), Vendor(hardware vendor of an Access Point, if available), Max Rate (maximumrate, or data throughput that each Access Point is capable ofoperating), Security (e.g., security settings: Open, WEP, WPA Personal,WPA-Enterprise, WPA2-Personal, WPA2-Enterprise, Wi-Fi Protected Setup,or Open (No Security)), Network Type (e.g., infrastructure networks areaccess points which facilitate communication between clients, ad-hoc orindependent networks are clients operating in a wireless network withoutan access point), etc.

As an example, a device may be configured to operate using a GPS unitthat can track location, for example, as a device moves, optionallywhile tracking information (e.g., access points, etc.). As an example,GPS information may be stored in the form of latitude and longitude.Such information may be utilized along with other information todetermine proximity of one or more access points (e.g., stronger signalamplitude, etc.).

Referring again to the information 600, the table includes a device listcolumn that includes interface information (e.g., vlan, br, eth, etc.),a MAC address column, an IP address column, a name column, an RSSIcolumn, a quality column, a TX/RX rate column, and a lease column.

As shown in the name column, names may be “Moto”, “iPhoneSMP”, “SMP-PC”,“Susan-TP”, “Dad”, “HP4EXXYY”, etc. As indicated, a name can includeinformation as to a person's name (e.g., Susan, SMP, etc.), amanufacturer identifier (e.g., Moto, iPhone, HP, etc.), a person'sfamilial role (e.g., Dad), a trademark of a device (e.g., Moto, iPhone,etc.), a type of device (e.g., PC, Phone, etc.).

As an example, a method can include accessing information in real-timeand comparing parsed information from audio input (e.g., digitized audiodata) to at least a portion of the real-time information to seek a match(e.g., a best match, closest match, ranking of match probabilities,etc.). For example, where the audio input includes “Dad”, a match may bemade with the name “Dad” in the device list. As mentioned, a network maybe ad-hoc or of another type. As an example, a smart phone may beoperable as a “hotspot” that is an access point, which may be referredto as a mobile hotspot. Being mobile, the hotspot may show informationthat may vary with respect to time where the hotspot moves (e.g., aperson is carrying a mobile hotspot and moving, etc.).

As an example, a mobile hotspot can be an ad hoc wireless access pointthat is created by a dedicated hardware device or a smart phone featurethat shares the phone's cellular data. Mobile hotspots may also be knownas portable hotspots. The hardware devices used to create them (e.g.,pocket or travel routers), may be referred to as mobile hotspots. Pocketrouters may access cellular signals and convert 3G, 4G, etc., signals toWi-Fi and vice versa, creating mobile Wi-Fi networks that can be sharedby multiple devices (e.g., within about 10 meters of a pocket routerdevice). Various smart phones can enable creation of a mobile hotspotthrough tethering, accessing the phone's existing cellular dataconnection.

As an example, information for a mobile hotspot created by a device mayinclude a name that is, for example, an assigned name to the device by auser of the device. As an example, in a work environment, work phones(e.g., smart phones) may be assigned names that conform to a particularformat such as, for example, an employee ID, etc. For example, considera numeric, an alphabetic or an alpha numeric employee ID. In such anexample, where a person knows of such a naming convention and knowsanother's employee ID or approximately what that employee ID may be, theperson may utter that information audibly in an effort to match acommand with a device assigned that employee ID.

FIG. 7 shows an example of information 700 as illustrated in tabularform. Such information can be BLUETOOTH technology information. In theexample of FIG. 7, the information 700 includes MAC address, Vendor,Signal Strength, Signal Strength History (e.g., signal strength withrespect to time), Class (e.g., Cell Phone, Laptop, Portable Audio), andServices (e.g., Networking Object Transfer, Telephony; NetworkingCapturing Object Transfer, Telephone; Networking Capturing Audio,Telephony; Networking Capturing Object Transfer, Audio; etc.).

In the example of FIG. 7, the information includes Vendor informationsuch as “Nokia”, “Apple”, etc. As an example, a device may includestored information that can associate a vendor with one or moreproducts. For example, consider an association between “Apple” and“iPhone” as a type of smart phone. Such information may be utilized inperforming a search (e.g., formulating a query, etc., as in the method400 of FIG. 4, etc.).

FIG. 8 shows an example of information 800 as illustrated in tabularform. Such information includes information that may be accessed by anidentifier program (see, e.g., the inSSIDer program). As shown, theinformation 800 includes Radio, SSIDS, Channel, Signal (strength), SSIDCount, PHY Type (e.g., b, g, n, etc.), Security (e.g., Locked, Unlocked,etc.), Minimum Rate and Maximum Rate.

In the example of FIG. 8, the SSIDS information includes vendorinformation such as “NETGEAR”, carrier information such as “CenturyLink”and “Charter”, address information such as “1105Adams”, etc. Where adevice such as a cellular network device is operating as a hotspot(e.g., a mobile hotspot), it may appear as information such as“iPhoneSMP”, which may possibly be associated with the SSIDS “SMP-WiFi”.As an example, a mobile hotspot may be identified via one or more typesof information, which may include information with respect to time. Forexample, if a person is using a smart phone as a mobile hotspot, if theperson moves with the smart phone to another location (e.g., via car,etc.), that information disappear from a listing of devices asdiscoverable via an identifier program. In such an example, the devicemay be associated with an indicator that indicates that the device is orlikely is a mobile device that can operate as a mobile hotspot. As anexample, a hotspot such as a mobile hotspot may be identified viainformation such as rate information. For example, a cellular network(e.g., 3G, 4G, etc.) as a hotspot may operate at a lesser rate than awired accessed point such as a DSL or cable access point. As an example,consider a mobile hotspot with a maximum data rate less thanapproximately 100; whereas, comparatively, a wired access point may havea maximum data rate greater than approximately 100 (e.g., greater thanapproximately 200, etc.).

FIG. 9 shows an example of types of information 900 that may beavailable in a contacts application of a device such as, for example, asmart phone. As shown in FIG. 9, the information 900 can includeaddress, display name, type (e.g., home, mobile, other, work, etc.).

FIG. 10 shows an example of types of information 1000 that may beavailable in a contacts application of a device such as, for example, asmart phone. As shown, the information 1000 can include a raw contactID, a display name, a phone number, a number of times contacted, a lasttime contacted, etc. As an example, a method may include accessing oneor more types of information that may include one or more of the typesof information 1000 in an effort to associate parsed audio with a remotedevice, for example, for purposes of storage, execution of a command,etc.

FIG. 11 shows an example of a device 1110 that includes audio circuitry1120, an SR engine 1130, memory 1140, a natural language processing(NLP) engine 1150 and one or more types of other circuitry 1160. In suchan example, the SR engine 1130 and/or the NLP engine 1150 may beconfigured for multi-lingual input, one or more Asian languages,English, one or more Romance languages, etc. As an example, an externalSR engine 1193 and/or an external NLP engine 1195 may provide for one ormore features and may be accessible by the device 1110, for example, viaone or more network interfaces of the device 1110. As shown, the device1110 includes memory, which may be utilized for storage of associationswhere such associations may be based on the device 1110 performing amethod such as the method 300 of FIG. 3, the method 400 of FIG. 4, etc.

As an example, a device can include a processor; memory accessible tothe processor; a microphone operatively coupled to the processor; anetwork interface operatively coupled to the processor; circuitry thatparses audio signals received via the microphone for a name and a typeof device; circuitry that analyzes network information associated withremote devices accessible via the network interface based at least inpart on at least one of the name and the type of device to associate thename and the type of device with one of the remote devices; andcircuitry that stores the name and the type of device to the memory inassociation with the one of the remote devices. In such an example, thenetwork information can include wireless network information.

As an example, a device can include circuitry that parses audio signalsfor a possessive form that includes a name and a type of device. Forexample, consider a form such as “XXXX's YYYY” where XXXX is a name andwhere YYYY is a type of device and where “'s” is at least in part anindicator of a possessive form.

As an example, circuitry that parses can include circuitry that parsesaudio signals for a command. In such an example, a device can includecircuitry that issues the command via a network interface to one of aplurality of remote devices.

As an example, a device can include circuitry that issues a notificationvia a network interface to one of a plurality of remote devices. In suchan example, the notification may include a query to confirm or denywhether a name is properly associated with the one of the remotedevices. As an example, a notification can include a query to confirm ordeny whether a type of device is properly associated with one of aplurality of remote devices. As an example, a notification can include aquery to confirm or deny whether a name and a type of device areproperly associated with one of a plurality of remote devices.

As an example, network information can include identifiers broadcast byone or more remote devices. As an example, network information caninclude historical information for communication of information via thenetwork interface. As an example, network information can include emailinformation. As an example, network information can include text messageinformation. As an example, network information can include cellularinformation. As an example, network information can include signalstrength information.

As an example, circuitry that analyzes network information can includecircuitry that analyzes contact information that includes names. As anexample, a method may include associating a name with a possessive formof a name.

As an example, a network interface can be or can include a BLUETOOTHinterface. As an example, a network interface can be or can include aWiFi interface. As an example, a device can include a network interfacethat is an interface specified by IEEE (e.g., 802.11, etc.).

As an example, a type of device can be a member selected from a groupthat includes a handheld device, a wearable device and a desktop device.

As an example, a type of device, in terms of information, can be atrademark. For example, consider a device that is marketed utilizingsuch a trademark (e.g., IPHONE device, MOTO device, SAMSUNG device,ANDROID device, IOS device, WINDOWS device, INTEL device, AMD device,etc.).

As an example, a device can include information as to types of devicesstored in memory of the device. In such an example, the device caninclude circuitry that matches a type of device with one of the types ofdevices stored in the memory. In such an example, one or more of thetypes of devices stored in the memory may include multiple identifiers(e.g., IOS device, IPHONE device and handheld device, etc.). As anexample, one of a plurality of types of devices stored in memory mayinclude a form factor identifier and a trademark identifier. As to aform factor identifier, consider “pad”, “notebook”, “netbook”, “PC”,“phone”, etc.

As an example, a device can include names stored in memory. In such anexample, names may be names as in a contacts database or a portionthereof such as a first name, a last name, a middle name, a nickname, afamilial name, etc. In such an example, the device can include circuitrythat matches a name with one of a plurality of the names stored in thememory. As an example, names can include at least one of a first nameand a last name. As an example, names can include relationship terms(e.g., spouse, husband, wife, partner, dad, mom, child, etc.). As anexample, names can include titles (e.g., Dr., Prof., Director, etc.).

As an example, a method can include parsing audio signals received via amicrophone of a device for a name and a type of device; analyzingnetwork information associated with remote devices accessible via anetwork interface of the device based at least in part on at least oneof the name and the type of device to associate the name and the type ofdevice with one of the remote devices; and storing the name and the typeof device to the memory in association with the one of the remotedevices. In such an example, parsing can include parsing audio signalsfor a command. In such an example, the method can include issuing thecommand via the network interface to the one of the remote devices. Asan example, a method can include issuing a notification via a networkinterface to one of a plurality of remote devices. As an example, amethod can include analyzing network information in a manner thatanalyzes contact information that includes names. As an example, amethod implemented by a device (e.g., a local device) can includematching a type of device as to a remote device with a type of devicestored in memory of the device (e.g., the local device). As an example,a method implemented by a device (e.g., a local device) can includematching a name with a name stored in memory of the device (e.g., thelocal device) where the name can be associated with a deviceidentifiable via a network (e.g., a remote device operatively coupled toa network).

As an example, one or more computer-readable storage media can includeprocessor-executable instructions to instruct a device to: parse audiosignals received via a microphone of a device for a name and a type ofdevice; analyze network information associated with remote devicesaccessible via a network interface of the device based at least in parton at least one of the name and the type of device to associate the nameand the type of device with one of the remote devices; and store thename and the type of device to the memory in association with the one ofthe remote devices.

The term “circuit” or “circuitry” is used in the summary, description,and/or claims. As is well known in the art, the term “circuitry”includes all levels of available integration (e.g., from discrete logiccircuits to the highest level of circuit integration such as VLSI, andincludes programmable logic components programmed to perform thefunctions of an embodiment as well as general-purpose or special-purposeprocessors programmed with instructions to perform those functions) thatinclude at least one physical component such as at least one piece ofhardware. A processor can be circuitry. Memory can be circuitry.Circuitry may be processor-based, processor accessible, operativelycoupled to a processor, etc. Circuitry may optionally rely on one ormore computer-readable media that includes computer-executableinstructions. As described herein, a computer-readable medium may be astorage device (e.g., a memory chip, a memory card, a storage disk,etc.) and referred to as a computer-readable storage medium, which isnon-transitory and not a signal or a carrier wave.

While various examples of circuits or circuitry have been discussed,FIG. 12 depicts a block diagram of an illustrative computer system 1200.The system 1200 may be a desktop computer system, such as one of theThinkCentre® or ThinkPad® series of personal computers sold by Lenovo(US) Inc. of Morrisville, N.C., or a workstation computer, such as theThinkStation®, which are sold by Lenovo (US) Inc. of Morrisville, N.C.;however, as apparent from the description herein, a satellite, a base, aserver or other machine may include other features or only some of thefeatures of the system 1200. As an example, the device 110 of FIG. 1,the device 210 of FIG. 2, the device 404 of FIG. 4, the device 1110 ofFIG. 11, etc. can include one or more features of the system 1200 ofFIG. 12.

As shown in FIG. 12, the system 1200 includes a so-called chipset 1210.A chipset refers to a group of integrated circuits, or chips, that aredesigned (e.g., configured) to work together. Chipsets are usuallymarketed as a single product (e.g., consider chipsets marketed under thebrands INTEL®, AMD®, etc.).

In the example of FIG. 12, the chipset 1210 has a particulararchitecture, which may vary to some extent depending on brand ormanufacturer. The architecture of the chipset 1210 includes a core andmemory control group 1220 and an I/O controller hub 1250 that exchangeinformation (e.g., data, signals, commands, etc.) via, for example, adirect management interface or direct media interface (DMI) 1242 or alink controller 1244. In the example of FIG. 12, the DMI 1242 is achip-to-chip interface (sometimes referred to as being a link between a“northbridge” and a “southbridge”).

The core and memory control group 1220 include one or more processors1222 (e.g., single core or multi-core) and a memory controller hub 1226that exchange information via a front side bus (FSB) 1224. As describedherein, various components of the core and memory control group 1220 maybe integrated onto a single processor die, for example, to make a chipthat supplants the conventional “northbridge” style architecture.

The memory controller hub 1226 interfaces with memory 1240. For example,the memory controller hub 1226 may provide support for DDR SDRAM memory(e.g., DDR, DDR2, DDR3, etc.). In general, the memory 1240 is a type ofrandom-access memory (RAM). It is often referred to as “system memory”.

The memory controller hub 1226 further includes a low-voltagedifferential signaling interface (LVDS) 1232. The LVDS 1232 may be aso-called LVDS Display Interface (LDI) for support of a display device1292 (e.g., a CRT, a flat panel, a projector, etc.). A block 1238includes some examples of technologies that may be supported via theLVDS interface 1232 (e.g., serial digital video, HDMI/DVI, displayport). The memory controller hub 1226 also includes one or morePCI-express interfaces (PCI-E) 1234, for example, for support ofdiscrete graphics 1236. Discrete graphics using a PCI-E interface hasbecome an alternative approach to an accelerated graphics port (AGP).For example, the memory controller hub 1226 may include a 16-lane (x16)PCI-E port for an external PCI-E-based graphics card. A system mayinclude AGP or PCI-E for support of graphics. As described herein, adisplay may be a sensor display (e.g., configured for receipt of inputusing a stylus, a finger, etc.). As described herein, a sensor displaymay rely on resistive sensing, optical sensing, or other type ofsensing.

The I/O hub controller 1250 includes a variety of interfaces. Theexample of FIG. 12 includes a SATA interface 1251, one or more PCI-Einterfaces 1252 (optionally one or more legacy PCI interfaces), one ormore USB interfaces 1253, a LAN interface 1254 (more generally a networkinterface), a general purpose I/O interface (GPIO) 1255, a low-pin count(LPC) interface 1270, a power management interface 1261, a clockgenerator interface 1262, an audio interface 1263 (e.g., for speakers1294), a total cost of operation (TCO) interface 1264, a systemmanagement bus interface (e.g., a multi-master serial computer businterface) 1265, and a serial peripheral flash memory/controllerinterface (SPI Flash) 1266, which, in the example of FIG. 12, includesBIOS 1268 and boot code 1290. With respect to network connections, theI/O hub controller 1250 may include integrated gigabit Ethernetcontroller lines multiplexed with a PCI-E interface port. Other networkfeatures may operate independent of a PCI-E interface.

The interfaces of the I/O hub controller 1250 provide for communicationwith various devices, networks, etc. For example, the SATA interface1251 provides for reading, writing or reading and writing information onone or more drives 1280 such as HDDs, SDDs or a combination thereof. TheI/O hub controller 1250 may also include an advanced host controllerinterface (AHCI) to support one or more drives 1280. The PCI-E interface1252 allows for wireless connections 1282 to devices, networks, etc. TheUSB interface 1253 provides for input devices 1284 such as keyboards(KB), one or more optical sensors, mice and various other devices (e.g.,microphones, cameras, phones, storage, media players, etc.). On or moreother types of sensors may optionally rely on the USB interface 1253 oranother interface (e.g., I²C, etc.). As to microphones, the system 1200of FIG. 12 may include hardware (e.g., audio card) appropriatelyconfigured for receipt of sound (e.g., user voice, ambient sound, etc.).

In the example of FIG. 12, the LPC interface 1270 provides for use ofone or more ASICs 1271, a trusted platform module (TPM) 1272, a superI/O 1273, a firmware hub 1274, BIOS support 1275 as well as varioustypes of memory 1276 such as ROM 1277, Flash 1278, and non-volatile RAM(NVRAM) 1279. With respect to the TPM 1272, this module may be in theform of a chip that can be used to authenticate software and hardwaredevices. For example, a TPM may be capable of performing platformauthentication and may be used to verify that a system seeking access isthe expected system.

The system 1200, upon power on, may be configured to execute boot code1290 for the BIOS 1268, as stored within the SPI Flash 1266, andthereafter processes data under the control of one or more operatingsystems and application software (e.g., stored in system memory 1240).An operating system may be stored in any of a variety of locations andaccessed, for example, according to instructions of the BIOS 1268.Again, as described herein, a satellite, a base, a server or othermachine may include fewer or more features than shown in the system 1200of FIG. 12. Further, the system 1200 of FIG. 12 is shown as optionallyinclude cell phone circuitry 1295, which may include GSM, CDMA, etc.,types of circuitry configured for coordinated operation with one or moreof the other features of the system 1200. Also shown in FIG. 12 isbattery circuitry 1297, which may provide one or more battery, power,etc., associated features (e.g., optionally to instruct one or moreother components of the system 1200). As an example, a SMBus may beoperable via a LPC (see, e.g., the LPC interface 1270), via an I²Cinterface (see, e.g., the SM/I²C interface 1265), etc.

Although examples of methods, devices, systems, etc., have beendescribed in language specific to structural features and/ormethodological acts, it is to be understood that the subject matterdefined in the appended claims is not necessarily limited to thespecific features or acts described. Rather, the specific features andacts are disclosed as examples of forms of implementing the claimedmethods, devices, systems, etc.

What is claimed is:
 1. A device comprising: a processor; memoryaccessible to the processor; a microphone operatively coupled to theprocessor; a network interface operatively coupled to the processor;circuitry that parses audio signals received via the microphone for aname and a type of device; circuitry that analyzes network informationassociated with remote devices accessible via the network interfacebased at least in part on at least one of the name and the type ofdevice to associate the name and the type of device with one of theremote devices; and circuitry that stores the name and the type ofdevice to the memory in association with the one of the remote devices.2. The device of claim 1 wherein the network information compriseswireless network information.
 3. The device of claim 1 wherein thecircuitry that parses comprises circuitry that parses audio signals fora possessive form that comprises the name and the type of device.
 4. Thedevice of claim 1 wherein the circuitry that parses, parses the audiosignals for a command.
 5. The device of claim 4 comprising circuitrythat issues the command via the network interface to the one of theremote devices.
 6. The device of claim 1 comprising circuitry thatissues a notification via the network interface to the one of the remotedevices.
 7. The device of claim 6 wherein the notification comprises aquery to confirm or deny whether the name is properly associated withthe one of the remote devices.
 8. The device of claim 6 wherein thenotification comprises a query to confirm or deny whether the type ofdevice is properly associated with the one of the remote devices.
 9. Thedevice of claim 6 wherein the notification comprises a query to confirmor deny whether the name and the type of device are properly associatedwith the one of the remote devices.
 10. The device of claim 1 whereinthe network information comprises at least one identifier broadcast bythe one or more remote devices.
 11. The device of claim 1 wherein thenetwork information comprises historical information for communicationof information via the network interface.
 12. The device of claim 1wherein the circuitry that analyzes network information comprisescircuitry that accesses contact information stored in memory of thedevice wherein the contact information comprises names of a plurality ofdifferent individuals.
 13. The device of claim 1 wherein the networkinterface comprises an interface specified by IEEE.
 14. The device ofclaim 1 wherein the type of device comprises a member selected from agroup consisting of a handheld device, a wearable device and a desktopdevice.
 15. The device of claim 1 wherein the type of device comprises atrademark.
 16. The device of claim 1 comprising types of devices storedin the memory.
 17. The device of claim 16 comprising circuitry thatmatches the type of device with one of the types of devices stored inthe memory.
 18. The device of claim 1 comprising names stored in thememory and circuitry that matches the name with one of the names storedin the memory.
 19. A method comprising: parsing audio signals receivedvia a microphone of a device for a name and a type of device; analyzingnetwork information associated with remote devices accessible via anetwork interface of the device based at least in part on at least oneof the name and the type of device to associate the name and the type ofdevice with one of the remote devices; and storing the name and the typeof device to the memory in association with the one of the remotedevices.
 20. One or more computer-readable storage media that comprisesprocessor-executable instructions to instruct a device to: parse audiosignals received via a microphone of a device for a name and a type ofdevice; analyze network information associated with remote devicesaccessible via a network interface of the device based at least in parton at least one of the name and the type of device to associate the nameand the type of device with one of the remote devices; and store thename and the type of device to the memory in association with the one ofthe remote devices.