Abstract:
Beverage compositions having portions of coffee cherries are described, as well as methods of forming the beverage compositions. The beverage compositions may include at least one fluid and a solid composition admixed with the fluid. The solid composition may include a particulate composition having one or more portions of a dried deseeded coffee cherry. The particulate composition may have an average particle size of about 80 μm to about 3000 μm.
Abstract:
Food products having portions of a dried deseeded coffee cherry are described, as well as components thereof and methods of forming. The food product may include one or more portions of a dried deseeded coffee cherry and a chocolate composition.
Abstract:
A feedstock for additive manufacturing includes a matrix material, and one or more barbed fibers disposed within the matrix material. Each barbed fiber includes a central filament and one or more barbed structures configured to extend outwardly from the central filament after extrusion. Methods of making the feedstock and methods of using the feedstock to form three-dimensional objects are also disclosed.
Abstract:
Technologies are generally provided for employing a smart meter to monitor an energy-efficient appliance or upgrade associated with an incentive program and to apply the incentive program to a location associated with the appliance or upgrade. A power utility provider may provide an incentive such as on-bill financing or bill reduction for energy-efficient upgrades, purchases, or otherwise encouraged programs. The utility provider may detect operation of an energy-efficient device such as an appliance at a location through a smart meter and provide the incentive associated with the device to the address where the device is currently operated based on smart meter data. The utility provider may subsequently detect use of the device at a new location based on another smart meter detecting operation of the device at the new location and automatically provide the incentive to the new address upon detection of operation of the device at the new location.
Abstract:
Technologies are generally described for methods and systems effective to reduce glare in augmented reality. In some examples, a method for producing a modified image of an object may include receiving first image data. The first image data may correspond to a first light reflected from the object through a clear filter. The method may further include receiving second image data. The second image data may correspond to a second light reflected from the object through a polarized filter. The method may further include combining the first image data and the second image data to generate modified image data. The method may further include producing the modified image of the object based on the modified image data. The method may further include rendering the modified image on an augmented reality display. The modified image may be different from the first image and different from the second image.
Abstract:
Technology is described for two parties, by leveraging previously established secure connections with third parties, to obtain a shared secret for generating a secure connection with each other in a way that reduces vulnerability to man-in-the-middle attacks. In some examples, the technology can include generating a session identifier; coordinating use of the session identifier by the two parties; finding an available secure communication channel to a third party; transmitting the session identifier to the third party via the available secure communication channel; receiving, via the available secure communication channel, a third party identifier and a session identifier-specific secret; sharing information about the received third party identifier; determining that the received third party identifier matches a third party identifier received by the second party; and using the session identifier-specific secret received with the matching third party identifier to generate a cryptographic key to secure communication between the two parties.
Abstract:
Systems and articles of manufacture for minimizing corrosion in supercritical water gasification components are disclosed, as well as methods for their preparation and operation. The systems may include a nonconducting conduit that is configured to receive a fluid at a first end and transmit the fluid toward a second end thereof. The fluid may include a plurality of ions. The nonconducting conduit may include an inside surface and an outside surface. The systems may further include a plurality of electrodes distributed about at least a portion of the outside surface of the nonconducting conduit and a power source electrically connected to the plurality of electrodes. The power source may be configured to apply an alternating current across the plurality of electrodes, and the alternating current may be effective to exert an electrophoretic force on the plurality of ions in the fluid.
Abstract:
Technologies described herein are generally related to systems and processes for repairing a graphene membrane on a support. A chamber may receive a layer of graphene on a support. The layer of graphene may include a hole. A first container including an initiator may be effective to apply an initiator through the hole to the support to functionalize the support and produce an initiator layer on the support. A second container including an activator may be effective to apply an activator through the hole to the initiator layer to activate the initiator layer. The application of the activator may further be effective to grow a polymer from the initiator layer. The growth of the polymer may be effective to produce a polymer plug in the hole and effective to repair at least a portion of the layer of graphene.
Abstract:
Technologies related to task management across low-power wireless communications are generally described. In some examples, proximal devices in range of low-power wireless communications may cooperate to allow one or more of the proximal devices to suspend task operations, while one or more of the proximal devices manage the task operations. The task operations may be associated with an energy consumption that exceeds an energy consumption associated with the low-power wireless communications, allowing the proximal devices that suspend task operations to reduce their overall energy consumption.
Abstract:
Technologies are generally provided to establish a secure connection between a wireless network access point and a wireless enabled device by sharing a secret key synthesized from one or more messages exchanged over power lines. Messages exchanged between devices within a location such as a household over power lines and/or with a power utility control center may be collected, for example, communication messages between a wireless enabled device and a smart meter or any other device. The wireless enabled device and a wireless network access point may synthesize a secret key from the collected messages and share the secret key to establish a secure wireless connection over a channel that is not secure.