Abstract:
Example systems relate to power monitoring and reduction processes. An example system may include a modular computing device including a plurality of universal serial bus (USB) ports and a power supply unit coupled to the modular computing device. The example system may further include an embedded controller coupled to the power supply unit and to the plurality of USB port. The embedded controller may monitor a level of power consumed by the system and determine whether a surge event has occurred in the system. In response to the determination that the surge event has occurred, the embedded controller may determine whether an agency event has occurred in the system and initiate a power reduction process in response to the determination.
Abstract:
Example implementations relate to dual rail circuitry using FET pairs. For example, a circuit according to the present disclosure may include a first field-effect transistor (FET) pair coupled to a dual rail circuitry, a second FET pair coupled to the dual rail circuitry, and a controller coupled to the first FET pair and the second FET pair. The controller may switch a power supply to the dual rail circuitry using the first FET pair and the second FET pair. The dual rail circuitry may provide a power supply to a computing device from a first power supply coupled to the first FET pair or a second power supply coupled to the second FET pair.
Abstract:
A technique includes sensing a wireless charging station that includes a wireless charging transmitter and determining a status for the machine based at least in part on the sensing of the wireless charging station. The technique also includes assisting with a process to wirelessly transfer power to the machine, where assisting includes causing the machine to provide guidance to the user based at least in part on the determined status.
Abstract:
A technique includes sensing a wireless charging station that includes a wireless charging transmitter and determining a status for the machine based at least in part on the sensing of the wireless charging station. The technique also includes assisting with a process to wirelessly transfer power to the machine, where assisting includes causing the machine to provide guidance to the user based at least in part on the determined status.
Abstract:
In an example implementation according to aspects of the present disclosure, a method may include detecting, by a first-computing device, a second computing device when the second computing device is in physical proximity to the first computing device, and establishing a secure wireless connection between the first and second computing devices while the first and second computing devices remain in physical proximity to each other. The method further includes determining, for each file stored on the second computing device, whether the file or a corresponding file stored on the first computing device is the later version, and updating, by the first computing device, the file and the corresponding file stored on the first computing device to the later version.
Abstract:
Examples disclosed herein relate to a conference call host. Examples include to establishing, by a first computing system, a first secure connection to a second computing system via a wireless network in response to receiving a secure connection request from the second computing system; the first computing system and the second computing system are in physical proximity to each other. Examples include to provide an operating system session to the second computing system through the secure connection while the first computing system and the second computing system remain in physical proximity to each other; the operating system is stored on and executable by the first computing system. Examples include to provide a connection to a conferencing platform to the second computing system via the first secure connection, the conference call at least among the first computing system, the second computing system, and a remote user.
Abstract:
An example system includes a location signature engine to determine a location signature based on a location of a user. The system also includes a signature comparison engine to determine whether the location signature matches a known signature. The system also includes a location determination engine to prompt the user for the location of the user based on the location signature not matching the known signature. The location determination engine also is to determine whether a user indication of the location is accurate.
Abstract:
In one example in accordance with the present disclosure, a connector component is provided. The connector component includes a first connector portion comprising a plurality of contacts to couple with a printed circuit board, and a second connector portion comprising a plurality of contacts to couple with an M.2 form factor module. The second connector portion is to receive the M.2 form factor module in an upright orientation such that neither a front surface nor a rear surface of the M.2 form factor module substantially faces the printed circuit board. In addition, the second connector portion is to retain the M.2 form factor module in the upright orientation without a retention mechanism external to the connector component.
Abstract:
An example system includes a location signature engine to determine a location signature based on a location of a user. The system also includes a signature comparison engine to determine whether the location signature matches a known signature. The system also includes a location determination engine to prompt the user for the location of the user based on the location signature not matching the known signature. The location determination engine also is to determine whether a user indication of the location is accurate.
Abstract:
In one example in accordance with the present disclosure, a computing device is provided. The computing device includes an interface module and a power management module. The interface module is to provide a user interface that facilitates enabling and disabling of an always on feature, and further facilitates configuration of a permissible advanced configuration and power interface (ACPI) S3 state period. The power management module to receive a request to enter an ACPI S3 state, determine whether the always on feature is enabled, and in response to determining that the always on feature is enabled, determine whether the computing device is within a user-defined permissible ACPI S3 state period. In response to determining that the computing device is within the user-defined permissible ACPI S3 state period, the power management module is to set a wake event and cause the computing device to enter the ACPI S3 state.