Abstract:
FIG. 1 is a front, right and bottom perspective view of a pizza maker, showing my new design; FIG. 2 is a rear, left and top perspective view thereof; FIG. 3 is a front view thereof; FIG. 4 is a rear view thereof; FIG. 5 is a left side view thereof; FIG. 6 is a right side view thereof; FIG. 7 is a top plan view thereof; and, FIG. 8 is a bottom plan view thereof. The broken lines shown in the drawings illustrate portions of the pizza maker that form no part of the claimed design.
Abstract:
The present invention relates to a mobile terminal technology. The present invention discloses a data back method and device for a mobile terminal. Since the data backup method and device of the mobile terminal provided in the present invention encodes a data in the mobile terminal into UTF-8 and stores it in the xml file, it is quite convenient to back up the data in the mobile terminal to the xml file. It is also beneficial for a user to manage the data in the mobile terminal. The present invention provides convenience for the user, the operation is simple, and the backup is easy to be done.
Abstract:
Disclosed herein are one or more embodiments that arrange a plurality of location entities into a hierarchy of location descriptors. One or more of the disclosed embodiments may determine whether one of the location entities is a spatial outlier based at least in part on presence of one or more other location entities within a predetermined distance of the one location entity. Also, the other location entities and the one location entity may share a location descriptor.
Abstract:
A digital wallet serves as a virtual wallet for all of the credit cards of a user. The digital wallet can be extended to other types of spending cards. Spending limits can be set for individual cards, as well as global limits. The user may setup an eCard on behalf of a recipient, where the eCard has a spending limit and the master account can view eCard transactions. Digital receipt management is provided to aid a user to organize receipts. Techniques to use a temporary code to improve the security of verifying a user is also disclosed.
Abstract:
An integrated circuit, in accordance with embodiments of the present technology, includes a plurality of engines, a plurality of engine level power gating (ELPG) controllers, and a power gating arbiter for implementing engine level power gating arbitration techniques. The power gating arbiter may receive requests from one or more ELPG controllers to turn on their respective engines or portions therein. The power gating arbiter prioritizes the request and sends an acknowledgment to a given ELPG controller to turn on or off its corresponding engine according to the prioritized predetermined order. After receiving the acknowledgement, the given ELPG controller turns on or off its corresponding engine and returns an indication to the power gating arbiter that the corresponding engine is turned on or off. The process may be iteratively repeated for each received request after receiving the indication from the previously serviced ELPG controller that its corresponding engine is turned on or off.
Abstract:
Techniques describe constructing a location and activity recommendation model to identify relationships between locations and activities. To construct the model, the process obtains global positioning system (GPS) logs of geographical locations collected over time and identifies stay points representing locations visited by an individual user. The process also identifies points of interest in a region using a database and correlates a relationship between activity to activity by submitting queries to a search engine. The information gathered is used to fill locations and activities in a location-activity matrix. Recommendations may be made for a location and/or activity when given a user query, based on a user's present geographical location, or a prediction of a user's interest.
Abstract:
The present disclosure is suitable for use in a mobile communication terminal, and provides a data account management method for a mobile communication terminal. The method comprises the following steps of: a. choosing one of SIM (subscriber identity module) cards of the mobile communication terminal when an application of the mobile communication terminal needs to use a data account; b. searching for a corresponding data account group of the SIM card, and choosing data accounts, which are stored in the data account group, in sequence according to priority orders of the data accounts; and c. activating the data accounts that are chosen.
Abstract:
A baby play station has a planar mat portion having a plurality of side edges, and a plurality of walls, each wall having incorporated therewith a panel, and each wall having a lower side that is hingedly coupled to one of the plurality of side edges of the mat portion. Each panel includes a foldable frame member having a folded and an unfolded orientation, the frame member defining a periphery for the panel with an interior space inside of the peiphery, and a fabric material covering the interior space defined by the frame member to form the panel when the frame member is in the unfolded orientation.
Abstract:
A launcher has a base having a pair of opposite supports that define a channel therebetween, a hub having a body that defines a hollow interior, an inlet tube extending through the body into the hollow interior, and an outlet tube extending through the body into the hollow interior. A first tube connects the bellows to the inlet tube, and a second tube connects the outlet tube to the object. The base and the hub are constructed so that the position of the hub inside the channel can be adjusted to allow the outlet tube to be oriented at different angles.
Abstract:
A mobile phone and a data processing method thereof are disclosed. The method comprises: reading an ID of a secondary SIM card and determining whether the secondary SIM card is locked out if the secondary SIM card is locked out, then determining whether to copy data of the secondary SIM card according to a user's choice; and if the user chooses to copy the data of the secondary SIM card, then copying the data of the secondary SIM card to the mobile phone or to the primary SIM card of the mobile phone, or to both the mobile phone and the primary SIM card of the mobile phone.