It can take advantage of locations, Bluetooth devices that are in range, and even voice. In the Keynote, the example of a Bluetooth watch was used and when the watch was removed, the device ...