摘要:
This relates to systems and methods for providing one or more vias through a module of an electrical system. For example, in some embodiments, the module can include one or more passive elements and/or active of the electrical system around which a packaging has been plastic molded. The module can be stacked under another component of the electrical system. Vias can then be provided that extend through the module. The vias can include, for example, electrically conductive pathways. In this manner, the vias can provide electrical pathways for coupling the component stacked on top of the module to other entities of an electronic device including the electrical system. For example, the component can be coupled to other entities such as other components, other modules, printed circuit boards, other electrical systems, or to any other suitable entity.
摘要:
Systems, methods, and machine-readable media are disclosed for providing graphical representations of music of varying levels of detail. An electronic device can determine the attributes of a first type (e.g., genre) associated with the music. The electronic device can display a graphical representation of the music using the attributes. The graphical representation can be based on a spiral, helix, map, or any other geometric shape or curve. A user can zoom into a portion of the graphical representation to select the music of a particular genre in which to view more detailed information. In response, the electronic device can determine the attributes of a second, more detailed type (e.g., artist) associated with the selected music and can revise the graphical representation to use the attributes of the second type. The revised graphical representation can include album cover art associated with the selected music.
摘要:
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.