


Google Pixel 8 registration information exposed, still uses traditional wireless charging protocol
News on June 1st, according to the editor’s understanding, Google registered Pixel on the official website of the WPC Wireless Charging Alliance today. 8. The phone has been given the codename GKWS6, indicating that Google is working on wireless charging certification for its next-generation phone. However, compared to its predecessor, the Pixel 8 doesn’t bring anything new in terms of wireless charging. According to the data, the wireless charging power of Pixel 8 is still 12W, which is consistent with Pixel 7 and Pixel 7 Pro.
It is worth noting that Pixel The wireless charging protocol version supported by 8 is 1.2.4 and has not been upgraded to the latest Qi2 specification. Qi2 is a new unified wireless charging standard jointly developed by Apple and WPC. It is built on MagSafe technology, and the core technology is derived from the magnetic power distribution map provided by Apple. Through the magnetic attraction function, Qi2 can help mobile phones better align with wireless charging coils, improve wireless charging efficiency and reduce additional losses. In addition, Qi2 is also expected to allow devices in the Android camp to support MagSafe peripheral products. According to relevant news, Apple’s upcoming iPhone The 15/Pro series will support the Qi2 wireless charging specification, which will further promote the popularity of the Qi2 standard.
Although Pixel The 8 doesn't feature the latest Qi2 specs, but that doesn't mean Google has completely given up on wireless charging improvements. This phone may continue the previous standard and provide users with a relatively stable wireless charging experience. However, we still need to wait for an official announcement or more reliable news to fully understand Pixel 8 details. In any case, as Google's flagship phone, Pixel 8's wireless charging function is highly anticipated.
The above is the detailed content of Google Pixel 8 registration information exposed, still uses traditional wireless charging protocol. For more information, please follow other related articles on the PHP Chinese website!

This tutorial guides you through building a serverless image processing pipeline using AWS services. We'll create a Next.js frontend deployed on an ECS Fargate cluster, interacting with an API Gateway, Lambda functions, S3 buckets, and DynamoDB. Th

This pilot program, a collaboration between the CNCF (Cloud Native Computing Foundation), Ampere Computing, Equinix Metal, and Actuated, streamlines arm64 CI/CD for CNCF GitHub projects. The initiative addresses security concerns and performance lim

This Go-based network vulnerability scanner efficiently identifies potential security weaknesses. It leverages Go's concurrency features for speed and includes service detection and vulnerability matching. Let's explore its capabilities and ethical


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

SublimeText3 Linux new version
SublimeText3 Linux latest version

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Zend Studio 13.0.1
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.