摘要:
Disclosed herein are conformable protection pads, which can be integrated into articles such as clothing and protective cases. In one embodiment, an exemplary cushioning pad includes a first channel comprising a thickness and a width. The first channel includes a continuous upper layer and a continuous lower layer, which is at least partially bonded to the continuous upper layer. The cushioning region is disposed adjacent to the first channel, and has a thickness greater than the thickness of the first channel. The cushioning region further includes a cushioning material disposed between and bonded to the continuous upper layer and the continuous lower layer. A groove may be defined in the upper surface of the cushioning region, with a thickness less than the thickness of the cushioning region and greater than the thickness of the first channel.
摘要:
Disclosed herein are protective cases for sensitive devices, including devices with screen interfaces, which cases provide protection from front, back and edge impacts, including torsional impacts.
摘要:
Disclosed herein are protective cases for sensitive devices, including devices with screen interfaces, which cases provide protection from front, back and edge impacts.
摘要:
Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels.
摘要:
A method for analyzing a mechanical system is disclosed. The method includes, using a computer program product, importing from an engineering design software program data related to a mechanical assembly. The method further includes, using the computer program product, selecting two or more points and one or more connections associated with the mechanical assembly. The method additionally includes based on the selected two or more points, the selected one or more connections, and the imported data, determining one or more three-dimensional model solutions. The method also includes presenting the one or more three-dimensional model solutions to a user, and selecting one of the presented three-dimensional model solutions.
摘要:
An article configured to distribute foam insulation between a water tank and an outer shell of a water heater is provided. The article comprises a body portion configured to extend between the water tank and the outer shell of the water heater. The body portion at least partially defines a flow passage for foam insulation. Opposed flap portions extend from an end of the body portion. Means are provided on the flap portions for attaching each of the flap portions to the water tank.