摘要:
Key-input mechanisms are disclosed. An example mechanism includes an arced, resilient keycap, the arc of the keycap having a first central arc angle when un-pressed. The keycap is configured to, when pressed, deform so as to have a second central arc angle, the first central arc angle being greater than the second central arc angle. The keycap is further configured to, when released after being pressed, return to its un-pressed shape having the first central arc angle. The key input mechanism further includes a switch disposed under the keycap. The switch is configured to, when the keycap is pressed, electrically couple two or more circuit traces to indicate a keystroke for the key input mechanism. The switch is further configured to, when the keycap is released, electrically decouple the two or more circuit traces to indicate that the keystroke for the key input mechanism is complete.
摘要:
Key-input mechanisms are disclosed. An example mechanism includes an arced, resilient keycap, the arc of the keycap having a first central arc angle when un-pressed. The keycap is configured to, when pressed, deform so as to have a second central arc angle, the first central arc angle being greater than the second central arc angle. The keycap is further configured to, when released after being pressed, return to its un-pressed shape having the first central arc angle. The key input mechanism further includes a switch disposed under the keycap. The switch is configured to, when the keycap is pressed, electrically couple two or more circuit traces to indicate a keystroke for the key input mechanism. The switch is further configured to, when the keycap is released, electrically decouple the two or more circuit traces to indicate that the keystroke for the key input mechanism is complete.
摘要:
Illustrated is a system and method to activate an alarm where a mobile computing device is no longer proximate to a docking station that provides inductive charging and data transfer capabilities for the mobile computing device. The computer system includes at least one coil to provide inductive charging for a mobile computing device. Further, the computer system includes a processor to control the inductive charging of the mobile computing device. Additionally, the computer system includes a proximity sensor operatively connected to the processor, the proximity sensor to determine that the mobile computing device is proximate to the computer system. Moreover, the computer system includes an alarm logic module to activate an alarm when the mobile computing device is no longer proximate to the computer system.
摘要:
A computer-implemented method for providing secure access to a computer is disclosed according to one aspect of the subject technology. The method comprises detecting a presence of a mobile device at the computer, and logging a user into the computer upon detecting the presence of the mobile device. The method also comprises detecting when the mobile device has moved away from the computer, and logging the user off of the computer upon detecting that the mobile device has moved away from the computer.
摘要:
A mobile computing device is disclosed. The mobile computing device comprises a housing that includes a section to retain a keypad assembly. The keypad assembly includes at least a keypad façade that carries a plurality of keys. The keypad façade of the keypad assembly is contoured to adjoin and be substantially flush with the section of the housing.
摘要:
A display assembly is provided for a computing device. The display assembly includes an exterior shell that includes an outward radius of curvature about two axes (X and Y axis), and is formed from hardened material such as glass.
摘要:
A method (and corresponding system and computer program product) for localizing applications on a computing device to the current device geographic location is described. In one embodiment, a method detects the location of the computing device, identifies an applicable location profile based on the device location, the applicable location profile containing a rule for localizing an application on the mobile computing device, and localizes the application based on the rule. In another embodiment, a method correlates multiple local times by determining a local time of the device location, adjusting an existing schedule based on the local time and user preference information, and generating a notification based on the adjusted schedule and the user preference information.