Also in this example, the data file, application, user interface, or other information from the second computing device 303 may be modified, logged, or otherwise manipulated on at the first computing device 302 via any action or event taken at the first computing device 302.