摘要:
Techniques for wirelessly charging small power receiving units are disclosed. An example power receiving unit includes a transportation mechanism to enable the power receiving unit to move and a wireless communication system that enables the power receiving unit to communicate with a plurality of other power receiving units. The power receiving unit is a master unit and the other power receiving units are nodes that take commands from the master unit. The power receiving unit also includes a controller to command the nodes to form a composite receive coil over a power transmitting unit and communicate with the power transmitting unit to start a charging session.
摘要:
Methods, systems, apparatus and articles of manufacture are disclosed to secure devices. An example disclosed apparatus includes a platform detector to determine when the device is within a threshold proximity to a platform, a device locking manager to initiate a locking service for the device when within the threshold proximity, and a device tampering manager to initiate a tampering remedy in response to detecting an indication of tampering.
摘要:
Disclosed herein are systems and techniques to self-sustain a wireless network. A wireless base station and a mobile wireless extender are provided. The wireless base station can provide a wireless network. Furthermore, the mobile wireless extended can navigate within an environment to extend the wireless network provided by the wireless base station.
摘要:
In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.