• Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
Log In
February 22, 2019

User Panel Banner
Log In

  • Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
HomeWeb SecurityApple Patent Hints At Magnetic Ear Hooks To Keep F...

Apple Patent Hints At Magnetic Ear Hooks To Keep Future AirPods In Your Ears

  • December 31, 2016
  • 0 comments
  • Simon Steed
  • Posted in Web Security
  • 0
0
SHARES
ShareTweet

Patently Apple has recently uncovered a new Apple patent that may help AirPods stay in your ears. The patent details a magnetic mechanism that wraps around the user’s ear. Digital Trends reports: The magnets attract each other through the ear tissue, keeping the AirPods in place and ensuring that they don’t get lost. Of course, it’s not certain if Apple filed this patent with AirPods in mind — one of the images clearly shows a wired pair of headphones, and the patent was filed in June. The concept, however, would help keep both wired and wireless earbuds in place. The issue of keeping AirPods in the ear has been arguably the biggest issue related to the AirPods, and for good reason — they’re pretty expensive little devices, so losing them is definitely not something you want to do. It’s possible that Apple decided against using the ear hooks for aesthetic reasons — Apple is known for its excellent design and the ear hooks in the patent don’t exactly look great. Not only that but the design of the charging case would have to change with the ear hooks. Some reports indicate that the patent could be implemented with future versions and given the hullaballoo surrounding keeping AirPods in, we wouldn’t be totally surprised. It’s also possible, however, that Apple patented the design but ultimately ended up nixing it.


Share on Google+

Read more of this story at Slashdot.

Share this

ShareTweet

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

China Says It Will Shut Down Ivory Trade By End of...

  • December 31, 2016
  • 0 comments

Self-Driving Cars Will Make Organ Shortages Even W...

  • December 31, 2016
  • 0 comments

Share this

0
SHARES
ShareTweet

About author

Simon Steed

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

0 comments
Web Security

Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools

Tags

  • IT
  • security
  • threats

Leave a Reply Cancel reply

Do not miss

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino [email protected] Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino [email protected] Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)

Top Posts

Health trust rapped on illegal use of patient data...

  • July 5, 2017
  • 0

GDPR: who needs to hire a data protection officer?

  • July 5, 2017
  • 0

News in brief: China tightens Great Firewall; stud...

  • July 5, 2017
  • 0

Now Any Florida Resident Can Challenge What Is Tau...

  • July 4, 2017
  • 0

Court Blocks EPA Effort To Suspend Obama-Era Metha...

  • July 4, 2017
  • 0

Tags

IT security threats

Archive

Site Categories

Copyright © 2006-2016 xploiter.com
Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Video URL

Attach Video

Category
SportNewsTechMusic

Your Message

Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Subject

Your Message