Abstract in simplified Chinese:本发明提供一种用于运送并施配来自一卷绕盘之条带之系统。该系统包括一提升器件及一条带施配设备。该条带施配设备包括一具有第一及第二侧之基座构件。该基座构件之第一侧界定至少一个经结构化以由该提升器件以可运送方式啮合之沟槽。该条带施配设备亦包括一安装至该基座构件之第二侧之机架。该机架经结构化以可旋转地支撑该卷绕盘以便可施配该条带。
Abstract in simplified Chinese:本发明提供一种使一束缚设备自一轨道车辆脱离之系统。根据一实施例,该系统包括一升降设备及一脱离器设备。该升降设备经构造以将该束缚设备定位成邻近该脱离器设备。该脱离器设备包含一狭长部件及一连接至该狭长部件之脱离部件。该脱离部件经构造以使该束缚设备自该轨道车辆脱离。
Abstract:
Methods, systems, and apparatuses for configuring a device for a specific task or set of tasks thereby allowing the device to be used for more than one task or set of tasks while also enabling fine-grain control over how the device may be used. A device's file system can operate with a particular file system based on the task(s) that the device will perform. Further, the device can physically configure itself based on the task(s) that the device will perform.
Abstract:
Techniques described herein include receiving a first signal indicating that a location of a first electronic device has changed. The first electronic device can have a functionality and be in an unlocked state that permits use of at least one aspect of the functionality. The techniques further include storing, based on the first signal, an indication that the first electronic device is to be put into a locked state that prevents use of the at least one aspect of the functionality. The techniques further include causing, based on a second signal indicating the first electronic device is in a proximity to a boundary, at least one of: sending a command to put the first electronic device into the locked state, or foregoing the sending of the command based on a transaction that relates to the first electronic device.
Abstract:
Techniques are described herein for a secure access to an online service based on a token exchange. In an example, a first user interface associated with a first user account is presented on a first user device and is used to indicate a set of restrictions associated with use of a function of the online service by the first user account. A security credential can be generated and associated with the set of restrictions. Upon receiving the security credential from a second user device from which a login to the first user account has not occurred, a determination can be made that the function is accessible to the second user device. This access can use the first user account subject to the restrictions. A token associated with the set of restrictions and the function can be sent to the second user device to enable the use of the function.