A streaming media player includes a printed circuit board, a video processor, a wireless communications processor, and a patch antenna. The patch antenna includes dielectric material, a conductive patch, and a first antenna feed in a first position with respect to the conductive patch. The patch antenna includes a second antenna feed in a second position with respect to the conductive patch. The first position is orthogonal to the second position. In an embodiment, the second position is rotationally offset from the first position by 90 degrees around an axis through a center of the conductive patch. The streaming media player includes a connector coupled to the video processor and configured to removably couple to a connection port on a display device.
H01Q 21/24 - Combinaisons d'unités d'antennes polarisées dans des directions différentes pour émettre ou recevoir des ondes polarisées circulairement ou elliptiquement ou des ondes polarisées linéairement dans n'importe quelle direction
A network-based service for the management of cryptographic key, such as a key management service ("KMS"), provides a web service application programming interface ("API"). Cryptographic keys managed by the service may be stored in a one or more network connected cryptographic devices such as network-connected hardware security modules ("HSM"). The key management service maintains metadata associated with the cryptographic keys. When a request is received by the key management service, the key management service uses an identifier provided with the request to identify metadata associated with a cryptographic key used to fulfill the request. The key management service uses the metadata to identify a cryptographic device containing the cryptographic key. The key management service generates a set of commands for fulfilling the request such that the commands are compatible with a protocol implemented by the identified cryptographic device, and the set of commands are sent to the identified cryptographic device.
Systems, methods, and computer-readable media are disclosed for self-healing flexible electrophoretic displays and related devices. In one embodiment, an example flexible electrophoretic display may include a flexible plastic thin film transistor (TFT) backplane having a first width, an electrophoretic layer coupled to the flexible plastic TFT backplane, an electrode layer coupled to the electrophoretic layer, an integrated circuit disposed on the flexible plastic TFT backplane, and a protective sheet having a second width that is greater than or equal to the first width.
G02F 1/167 - Dispositifs ou dispositions pour la commande de l'intensité, de la couleur, de la phase, de la polarisation ou de la direction de la lumière arrivant d'une source lumineuse indépendante, p.ex. commutation, ouverture de porte ou modulation; Optique non linéaire pour la commande de l'intensité, de la phase, de la polarisation ou de la couleur basés sur le mouvement de translation des particules dans un fluide sous l’influence de l’application d’un champ caractérisés par l’effet électro-optique ou magnéto-optique par électrophorèse
An electronic device includes a display screen, one or more internal components, and a foam outer housing coupled to the display screen and enclosing the one or more internal components. The electronic device may also include a foam midframe enclosed by the foam outer housing. The foam outer housing may be resilient so as to provide impact absorption and water resistance, while the foam midframe may be rigid to provide stiffness to the electronic device. The electronic device may have a density less than 1 gram/centimeter3 such that the electronic device is buoyant in liquid water.
An audio/video (A/V) recording and communication doorbell, including a camera, a speaker, a microphone, a power manager, a battery, an AC/DC rectifier, and a DC/DC converter. The doorbell is configured for connection to an external AC power source through the AC/DC rectifier and the DC/DC converter. The power manager is configured to draw power, up to a threshold power, from the AC power source and to draw supplemental power from the battery such that the power drawn from the AC power source never exceeds the threshold power. The present A/V recording and communication doorbell can thus be connected to an existing household AC power supply and an existing doorbell signaling device without causing inadvertent sounding of the signaling device.
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courte; Déclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
G08B 3/10 - Systèmes de signalisation audible; Systèmes d'appel sonore de personnes utilisant une transmission électromagnétique
H04N 7/18 - Systèmes de télévision en circuit fermé [CCTV], c. à d. systèmes dans lesquels le signal vidéo n'est pas diffusé
6.
SHARING VIDEO FOOTAGE FROM AUDIO/VIDEO RECORDING AND COMMUNICATION DEVICES
Sharing video footage recorded by audio/video (A/V) recording and communication devices, such as video doorbells and security cameras. When an A/V recording and communication device records video footage of suspicious activity, or even criminal activity, a user viewing the footage may alert his or her neighbors by sharing the video. In various embodiments, the user may share the video with anyone of the user's choosing, including neighbors, friends, and family.
H04N 7/18 - Systèmes de télévision en circuit fermé [CCTV], c. à d. systèmes dans lesquels le signal vidéo n'est pas diffusé
H04N 21/2743 - Hébergement vidéo de données téléchargées à partir du dispositif client
H04N 21/436 - Interfaçage d'un réseau de distribution local, p.ex. communication avec un autre STB ou à l'intérieur de la maison
H04N 21/4367 - Interfaçage d'un réseau de distribution local, p.ex. communication avec un autre STB ou à l'intérieur de la maison Établissement d'une communication protégée entre le client et un dispositif périphérique ou une carte à puces
Aerial vehicles may be equipped with propellers having clutch mechanisms that contract around a shaft when the propellers are not rotating, or are rotating at low angular velocities, and expand around the shaft when the propellers are rotating at sufficiently high angular velocities. The clutch mechanisms may receive one or more fixed posts within an opening or window defined therein. When the clutch mechanisms contract into a closed position, components of the clutch mechanisms come into contact with the posts, and the propellers are forced to remain in an alignment defined by the posts. When the clutch mechanisms expand into an open position, such components may rotate freely without contacting the posts. Thus, a clutch mechanism may cause a propeller to remain aligned in a desired orientation when the propeller is not required for operation, thereby reducing drag or adverse acoustic effects.
Disclosed herein is a method including receiving, from a user application, data to be transmitted from a source address to a destination address using a single connection through a network; and splitting the data into a plurality of packets according to a communication protocol. For each packet of the plurality of packets, a respective flowlet for the packet to be transmitted in is determined from a plurality of flowlets; a field in the packet used by a network switch of the network to route the packet is set based on the determined flowlet for the packet; and the packet is sent via the determined flowlet for transmitting through the network.
H04L 47/125 - Prévention de la congestion; Récupération de la congestion en équilibrant la charge, p.ex. par ingénierie de trafic
H04L 49/25 - Routage ou recherche de route dans une matrice de commutation
H04L 61/5007 - Adresses de protocole Internet [IP]
H04L 69/10 - Protocoles rationalisés, légers ou à haute vitesse, p.ex. protocole de transfert express [XTP] ou flux d'octets
H04L 69/16 - Implémentation ou adaptation du protocole Internet [IP], du protocole de contrôle de transmission [TCP] ou du protocole datagramme utilisateur [UDP]
H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes
Provided are systems and methods for connection establishment over a network that does not require a user application to establish an explicit connection with a target application. In some implementations, provided is an apparatus configured to communicate with a network and a host device. The apparatus may receive a message and destination information associated with the message from the host device. The apparatus may further determine, using the destination information, a transport context from a plurality of transport contexts. The transport context may include a state of a connection with a destination on the network. The destination on the network may be associated with the destination information.
An electronic device includes a stack assembly and a cover glass. The stack assembly includes an electrophoretic display sub-assembly for rendering content, a front light sub-assembly comprising a light guide, a light FPC, and a plurality of light sources, and a capacitive touch sensing sub-assembly for detecting touch inputs. A yellow-pigmented tape is applied over the light sources and an edge of the light guide. A stiffener member is coupled to the light FPC opposite the yellow-pigmented tape.
G09F 9/30 - Dispositifs d'affichage d'information variable, dans lesquels l'information est formée sur un support, par sélection ou combinaison d'éléments individuels dans lesquels le ou les caractères désirés sont formés par une combinaison d'éléments individuels
G02F 1/167 - Dispositifs ou dispositions pour la commande de l'intensité, de la couleur, de la phase, de la polarisation ou de la direction de la lumière arrivant d'une source lumineuse indépendante, p.ex. commutation, ouverture de porte ou modulation; Optique non linéaire pour la commande de l'intensité, de la phase, de la polarisation ou de la couleur basés sur le mouvement de translation des particules dans un fluide sous l’influence de l’application d’un champ caractérisés par l’effet électro-optique ou magnéto-optique par électrophorèse
Video footage captured by A/V recording and communication devices may be readily uploaded to the cloud and shared with a requesting party, such as a law enforcement agency. When a request is received from a requesting party for video footage, a set of videos meeting the criteria specified by the requesting party may be determined. Consent requests may then be sent to users associated with each of the A/V recording and communication devices that recorded the videos meeting the criteria specified by the requesting party. When user consents to share the videos are received, the video footage may be provided to the requesting party.
Multiple propeller blades (504, 506) may be joined by tip connectors (508) to form a closed propeller apparatus. The tip connectors may create continuous structure between adjacent tips of a first propeller and a second propeller. Use of the tip connectors may reduce vortices created near the tips of the propeller blades, which cause drag and slow the rotation of the propeller blades. The tip connectors may also reduce noise caused by rotation of propeller blades. Further, the tip connectors reduce or eliminate deflection of the propeller blades by creating a support structure to counteract forces that would otherwise cause deflection of the propeller blades, thereby improving propeller blade loading. In some embodiments, the tip connectors may be formed of a malleable material and/or include one or more joints that enable at least one of the propellers to modify a pitch of blades of the propeller.
Multiple motors may drive (rotate) a single shaft coupled to a propeller. The motors may be selected such that a first motor is capable of rotating the drive shaft in an event of a failure of a second motor coupled to the drive shaft. A one-way clutch bearing, or similar device, may interface between a motor and the drive shaft to enable free rotation of the drive shaft in an event of the motor becoming inoperable, such as the motor freezing or locking in a position due to failure caused by overheating or caused by other conditions or events. Use of the second motor may secure a position of the drive shaft which may support the propeller in radial eccentric loading.
A battery module includes one or more battery cells and one or more laminated elements configured to provide passive management of heat generated by the one or more battery cells. Each laminated element includes one or more heat conducting layers and one or more intumescent layers. The one or more intumescent layers are configured to expand in response to an intumescent layer temperature exceedance to reconfigure the laminated element from a first configuration in which the laminated element transfers heat emitted by the one or more battery cells to a second configuration in which the laminated element does not substantially transfer heat emit- ted by the one or more battery cells.
H01M 10/653 - Moyens de commande de la température associés de façon structurelle avec les éléments caractérisés par des matériaux électriquement isolants ou thermiquement conducteurs
H01M 10/654 - Moyens de commande de la température associés de façon structurelle avec les éléments situés à l'intérieur du boîtier des éléments, p.ex. mandrins, électrodes ou électrolytes
H01M 10/6555 - Barres ou plaques disposées entre les éléments
15.
SELECTING PROPELLERS FOR PERFORMANCE AND NOISE SHAPING
A method to operate an unmanned aerial vehicle having first and second sets of propellers is provided, having operational flexibility in terms of how and when the sets of propellers are used. A computer on the unmanned aerial vehicle initiates a first and second operation of each of first and second sets of motors coupled to the first and second sets of propellers respectively at first and second times respectively. The first and second sets of propellers have different types. The first operation of the first set of motors at the first time is initiated at a first power level. The second operation of the second set of motors at the second time is initiated at a second power level. The computer initiates a third operation of the first set of motors at a third power level, different from the first power level, at the second time.
B64U 40/10 - Dispositions mécaniques embarquées pour régler les surfaces de commande ou les rotors; Dispositions mécaniques embarquées pour régler en vol la configuration de base pour régler les surfaces de commande ou les rotors
B64U 10/14 - Plates-formes volantes comportant quatre axes distincts de rotors, p. ex. quadcoptères
B64U 20/20 - Caractéristiques de construction de véhicules aériens sans pilote pour la réduction du bruit
Sounds are generated by an aerial vehicle (101) during operation. For example, the motors and propellers (102) of an aerial vehicle (101) generate sounds during operation. Disclosed are systems, methods, and apparatus for actively adjusting the position of one or more propeller blade treatments (202) of a propeller blade (200) of an aerial vehicle (101) during operation of the aerial vehicle (101). For example, the propeller blade (200) may have one or more propeller blade treatments (202) that may be adjusted between two or more positions. Based on the position of the propeller blade treatments (202), the airflow over the propeller (102) is altered, thereby altering the sound generated by the propeller (102) when rotating. By altering the propeller blade treatments (202) on multiple propeller blades (200) of the aerial vehicle (101), the different sounds generated by the different propeller blades (200) may effectively cancel, reduce, and/or otherwise alter the total sound generated by the aerial vehicle (101).
In a battery-powered audio/video recording and communication device having a camera, the length of a preset interval (the interval between instances of the device sending a request to a network to check whether any user requests to access the camera have been received) may be adjusted upward or downward in order to balance the competing interests of reducing latency (e.g. reducing the delay that the user may experience when trying to access the camera) and conserving batter life. The present embodiments advantageously balance these competing interests by initially setting the length of the preset interval to be relatively short to reduce latency, but automatically increasing the length of the preset interval as the battery charge is depleted, thereby extending battery life. The present embodiments also advantageously enable the length of the preset interval to be increased after the battery is recharged, thereby reducing latency.
H04N 23/65 - Commande du fonctionnement de la caméra en fonction de l'alimentation électrique
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courte; Déclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
H04L 67/025 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP] pour la commande à distance ou la surveillance à distance des applications
18.
KEY EXCHANGE THROUGH PARTIALLY TRUSTED THIRD PARTY
Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust a cryptography service to perform some cryptographic operations and access some cryptographic resources while simultaneously not trusting the cryptography service to perform other operations and access other resources. Two or more clients may utilize a cryptography service to perform certain authentication and verification operations to establish a secure communication session, while simultaneously denying the cryptography service access to the secure communication session.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A tiered credentialing approach provides assurance to customers having virtual machines running in a remote environment that the virtual images for these machines are in a pristine state and running in a trusted execution environment. The environment can be divided into multiple subsystems, each having its own cryptographic boundary, secure storage, and trusted computing capabilities. A trusted, limited subsystem can handle the administrative tasks for virtual machines running on the main system of a host computing device. The limited system can receive a certificate from a certificate authority, and can act as a certificate authority to provide credentials to the main system. Upon an attestation request, the subsystems can provide attestation information using the respective credentials as well as the certificate chain. An entity having the appropriate credentials can determine the state of the system from the response and verify the state is as expected.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
20.
KEY EXCHANGE THROUGH PARTIALLY TRUSTED THIRD PARTY
Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust a cryptography service to perform some cryptographic operations and access some cryptographic resources while simultaneously not trusting the cryptography service to perform other operations and access other resources. Two or more clients may utilize a cryptography service to perform certain authentication and verification operations to establish a secure communication session, while simultaneously denying the cryptography service access to the secure communication session.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A propeller alignment device (102) is described. The propeller alignment device (102) can include a second retainer attached to a propeller (112) and a motor (104). The propeller alignment device (102) can also include a first retainer (114) that does not rotate, but that is aligned with the second retainer (116). The first retainer (114) can include two or more magnets (120A,120B) oppositely orientated relative to each other. The second retainer (116) can also include two or more magnets (118A,118B) oppositely orientated relative to each other. As the second retainer (116) rotates relative to the first retainer (114), the magnets may altematingly align with each other. In the absence of a current applied to the motor (104), the magnets may magnetically bias the second retainer (116) into a predetermined orientation relative to the first retainer (114). The predetermined orientation can be predetermined to correspond to an alignment of the propeller (112) that is desirable (e.g., that minimizes aerodynamic drag on the propeller).
Methods, systems, and computer-readable media for scaling for virtualized graphics processing are disclosed. A first virtual GPU is attached to a virtual compute instance of a provider network. The provider network comprises a plurality of computing devices configured to implement a plurality of virtual compute instances with multi-tenancy. The first virtual GPU is replaced by a second virtual GPU based at least in part on a change in GPU requirements for the virtual compute instance. The first and second virtual GPUs are implemented using physical GPU resources that are accessible to the virtual compute instance over a network. Processing for the virtual compute instance is migrated from the first virtual GPU to the second virtual GPU. An application is executed using the second virtual GPU on the virtual compute instance.
Information for a data object can be prevented from loss for import and export operations across a trust boundary, such as may exist between environments under control of different legal entities. A set of dependencies, including information such as data tags and identifiers for applicable policies, can be embedded in a data object, such as directly in a header or in a digest or token of the data object. When the data object is transmitted across a trust boundary, such as to a destination bucket, the destination bucket can ensure that all dependencies are available and able to be enforced in the destination environment. If not, the request can be denied or the destination environment can contact the source environment to attempt to obtain and enforce the missing dependencies. At least some of the dependencies may also need to be transformed in the second environment.
A system for monitoring incoming code execution requests and scheduling the corresponding code executions is provided. The system may be configured to maintain a plurality of virtual machine instances. The system may be further configured to determine whether at least some of the incoming code execution requests exhibit periodicity, and cause a reduced amount of idle compute capacity to be maintained on the virtual compute system. The system may be further configured to cause additional compute capacity to be added shortly before code execution requests are expected to be received.
Information describing changes to a collection of items maintained by a database may be stored in a log file. The information in the log file may be converted into a stream of records describing the changes. The records may be directed to a computing node selected for performing a trigger function in response to the change, based on applying a hash function to a portion of the record, identifying a hash space associated with a value output by the hash function, and mapping from the hash space to the selected computing node.
A provider network for providing continuous workflow service for an open-ended number of workflows using non-persistent threads. In some cases, the provider network includes a workflow handling service and a workflow evaluation service. The workflow handling service may receive indications of task completion events related to respective workflows, and in turn may send non-blocking requests for workflow decisions from the workflow evaluation service. In generating a workflow decision, the workflow evaluation service may determine resources for executing a workflow evaluation thread for generating the workflow decision. Further, a given workflow evaluation thread may determine a workflow decision without relying on a previously stored state for a state machine corresponding to the workflow. In this way, a given workflow decision may be determined on different allocated resources at different points in time in maintaining the workflow.
27.
NETWORK-BASED RESOURCE CONFIGURATION DISCOVERY SERVICE
A network-based discovery system and service are disclosed that provide client discovery services to a number of clients over a network. The network-based discovery system includes a database that stores discovery information of client network-based resource configurations. The discovery information may be obtained from client resources by client-side discovery components that are placed on client resources, obtain the discovery information and that send the information to the discovery system. The discovery system analyzes the discovery information to determine the client network-based resource configurations and generates client network-based resource configuration representations for the respective clients. The client network-based resource configuration representation may include a description of, and dependencies among, a plurality of computer-based resources. The discovery service may operate across a client network that spans both of a client's enterprise data networks as well as resources that are operated on behalf of the same client by a service provider network.
H04L 67/51 - Découverte ou gestion de ceux-ci, p.ex. protocole de localisation de service [SLP] ou services du Web
H04L 41/082 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant des mises à jour ou des mises à niveau des fonctionnalités réseau
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p.ex. l’optimisation de la configuration pour améliorer la fiabilité
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
Robotic manipulators may be used to manipulate objects. Manipulation data about manipulations performed on objects may be generated and accessed. This data may be analyzed to generate a profile indicating how an object may be manipulated. A portion of the profile may be transmitted to a particular robotic manipulator. For example, the portion may be based on a manipulation capability of the robotic manipulator. In turn, the robotic manipulator may use the portion of the profile to manipulate the object.
A motor mount assembly (320) is provided for coupling a propeller motor (310) to a body of an unmanned aerial vehicle (UAV). The motor mount assembly includes a floating portion (330) and acts to attenuate frequencies of vibration from the propeller motor during operation, which modifies the corresponding noise that is produced and reduces stresses on the various components. The floating portion is surrounded on all sides by isolation portions (340, 350, 360) (e.g., made of elastomers or other materials) that are held within a casing that attaches to the body of the UAV. In one implementation, the motor mount assembly is modular such that one or more of the isolation portions may be replaced with different isolation portions (e.g., having different attenuation properties), depending on the direction and nature of the vibrations from the propeller motor that are to be attenuated for a particular application.
Described are systems and methods for surveying a destination as an unmanned aerial vehicle ("UAV") descends toward the destination. To confirm that the destination is clear of objects and includes a safe landing or delivery location, such as a substantially planar surface, the UAV may capture and process images at different altitudes during the descent. Feature points of a first image captured at a first altitude may be paired with feature points of a second image captured at a second, different altitude. A homography may be computed to confirm that the paired feature points lie in the same plane and then the two images may be registered based on the paired feature points. The registered images may then be processed to determine depth information and determine if descent of the UAV is to continue or be aborted.
Noises that are to be emitted by an aerial vehicle (1210) during operations may be predicted using one or more machine learning systems, algorithms or techniques. Anti-noises having equal or similar intensities and equal but out-of-phase frequencies may be identified and generated based on the predicted noises, thereby reducing or eliminating the net effect of the noises. The machine learning systems, algorithms or techniques used to predict such noises may be trained using emitted sound pressure levels observed during prior operations of aerial vehicles, as well as environmental conditions, operational characteristics of the aerial vehicles or locations of the aerial vehicles during such prior operations. Anti-noises may be identified and generated based on an overall sound profile of the aerial vehicle, or on individual sounds emitted by the aerial vehicle by discrete sources.
G10K 11/178 - Procédés ou dispositifs de protection contre le bruit ou les autres ondes acoustiques ou pour amortir ceux-ci, en général utilisant des effets d'interférence; Masquage du son par régénération électro-acoustique en opposition de phase des ondes acoustiques originales
G05D 1/10 - Commande de la position ou du cap dans les trois dimensions simultanément
G05D 19/02 - Commande des oscillations mécaniques, p.ex. de l'amplitude, de la fréquence, de la phase caractérisée par l'utilisation de moyens électriques
G05D 27/02 - Commande simultanée des variables entrant dans plusieurs des groupes principaux caractérisée par l'utilisation de moyens électriques
32.
EVENT-STREAM SEARCHING USING COMPILED RULE PATTERNS
Methods, systems, and computer-readable media for implementing event-stream searching using compiled rule patterns are disclosed. A rule base is compiled based at least in part on one or more rule patterns. The field names are sorted within the rule patterns. The rule patterns comprise one or more field names and one or more field values. The rule base represents a finite-state machine comprising a plurality of states. A plurality of events are received. The events comprise field names and field values describing events associated with resources in a provider network. The field names are sorted within the events. The rule patterns are evaluated against the events using the rule base. In determining a matched rule pattern for one of the events, the finite-state machine transitions between at least two of the states for the matched rule pattern.
H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
33.
EVENT-STREAM SEARCHING USING COMPILED RULE PATTERNS
Methods, systems, and computer-readable media for implementing event-stream searching using compiled rule patterns are disclosed. A rule base is compiled based at least in part on one or more rule patterns. The field names are sorted within the rule patterns. The rule patterns comprise one or more field names and one or more field values. The rule base represents a finite-state machine comprising a plurality of states. A plurality of events are received. The events comprise field names and field values describing events associated with resources in a provider network. The field names are sorted within the events. The rule patterns are evaluated against the events using the rule base. In determining a matched rule pattern for one of the events, the finite-state machine transitions between at least two of the states for the matched rule pattern.
Methods, systems, and computer-readable media for customizable event-triggered computation at edge locations are disclosed. A request for content is received at an edge server from a client device. The content is sought from a content cache at the edge server or from an origin server coupled to the edge server. Processing of the request is initiated, comprising encountering an event. The event is associated with a function specified by a customer. The function associated with the event is executed at the edge server using process isolation. The content is generated based at least in part on execution of the function. The content is sent from the edge server to the client device.
H04L 67/564 - Amélioration de la commande des applications basée sur des données interceptées des applications
H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p.ex. par mise en antémémoire
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A computer system receives a request to remove an entry from a probabilistic data structure. In response to the request, the computer system queries the probabilistic data structure to determine a current iteration value for the entry within the probabilistic data structure. The current iteration value indicates a state of the entry such that a first state corresponds to the entry being a member of a set and a second state corresponds to the absence of the entry from the set. As a result of the current iteration value denoting that the entry is a member of the set, the computer system increments the current iteration value to generate a new iteration value that corresponds to the absence of the entry from the set. The computer system uses the new iteration value and the entry to generate a new output value that is then added to the probabilistic data structure.
Architectures and techniques for selecting a voice-enabled device to handle audio input that is detected by multiple voice-enabled devices are described herein. In some instances, multiple voice-enabled devices may detect audio input from a user at substantially the same time, due to the voice-enabled devices being located within proximity to the user. The architectures and techniques may analyze a variety of audio signal metric values for the voice-enabled devices to designate a voice-enabled device to handle the audio input.
Methods, systems, and computer-readable media for virtualizing graphics processing in a provider network are disclosed. A virtual compute instance is provisioned from a provider network. The provider network comprises a plurality of computing devices configured to implement a plurality of virtual compute instances with multi-tenancy. A virtual GPU is attached to the virtual compute instance. The virtual GPU is implemented using a physical GPU, and the physical GPU is accessible to the virtual compute instance over a network. An application is executed using the virtual GPU on the virtual compute instance. Executing the application generates virtual GPU output that is provided to a client device.
Disclosed are various embodiments for providing multi-factor authentication credentials. In one embodiment, in response to a request from an application, a notification is generated in a notification area of a display. Entry of a user approval is facilitated via the notification. In response to receiving the approval, a security credential is transferred to the application. In another embodiment, the security credential may be shown in the notification area so that a user may enter it in a form field of the application.
Techniques for preserving the state of virtual machine instances during a migration from a source location to a target location are described herein. A set of credentials configured to provide access to a storage device by a virtual machine instance at the source location is provided to the virtual machine instance. When the migration from the source location to the target location starts, a second set of credentials configured to provide access to a storage device by a virtual machine instance at the source location is provided to the virtual machine instance. During the migration, a response to an input-output request is provided to one or more of the locations using the set of credentials and based at least in part on the state of the migration.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 9/48 - Lancement de programmes; Commutation de programmes, p.ex. par interruption
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
40.
SHIPPABLE NETWORK-ATTACHED DATA STORAGE DEVICE WITH UPDATEABLE ELECTRONIC DISPLAY
A network-attachable data transfer device housed within a shippable enclosure that incorporates an updateable electronic display for displaying shipping destination information is disclosed. The device may be initialized (e.g., prepared to receive data, and the updateable electronic shipping display set to the shipping destination) by a service provider and shipped, in accordance with the displayed destination address, as a self-contained shipping unit. The device may be installed onto a network at the destination and loaded with data. The display may also be updated with the next destination address such that the device is shipped to the updated destination address (e.g., back to the service provider, or onto other destinations before being send back to the service provider). When the device is received back at the service provider, the data is transferred from the device to a service provider storage facility, wiped of data, and prepared to be sent out again.
Techniques are described for providing users with access to perform commands on network-accessible computing resources. In some situations, permissions are established for user(s) to execute command(s) on computing node(s) provided by an online service, such as by maintaining various permission information externally to those provided computing nodes for use in controlling users' ability to access, use, and/or modify the provided computing nodes. An interface component may use such external permissions information to determine if a particular user is authorized to execute one or more particular commands on one or more particular computing nodes, and to initiate simultaneous and independent execution of the command(s) on the computing node(s) when authorized. The interface component may further aggregate results from each computing node that executed the command(s), prior to providing the results to the user.
G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
Concepts of an omnidirectional pinion wheel are described. In one embodiment, the wheel includes a hub, first and second annular rims each including inner and outer rim surfaces, spokes that extend from the hub to the first and second annular rims, a pinion ring including pinion rods that extend between the inner surfaces of the first and second annular rims, and first and second annular rings of rollers affixed on the outer surfaces of the first and second annular rims. Using an axis of freedom of the rollers, the wheel can move sideways in addition to forward and backward. Further, when used with a vertical rack gear, the wheel can provide vertical displacement by engagement between teeth of the gear and the pinion ring. Additionally, various racks and tracks with teeth for pinion ring engagement are described along with an example vehicle capable of vertical displacement using the wheels.
A computing resource monitoring service receives a request to store a measurement for a metric associated with a computing resource. The request includes the measurement itself and metadata for the measurement, which specifies attributes of the measurement. Based at least in part on the metadata, the computing resource monitoring service generates a fully qualified metric identifier and, using the identifier, selects a logical partition for placement of the measurement. From the logical partition, the computing resource monitoring service transmits the measurement to an aggregator sub-system comprising one or more in-memory datastores. The computing resource monitoring service stores the measurement in an in-memory datastore within the aggregator sub-system.
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
H04L 43/04 - Traitement des données de surveillance capturées, p.ex. pour la génération de fichiers journaux
H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p.ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
Techniques for content testing during image production are described herein. Information associated with a content item may be loaded onto a first virtual machine instance and a second virtual machine instance. On the second virtual machine instance, production of a virtual machine image including the information associated with the content item may be initiated. On the first virtual machine instance, a first instance of the content item may be executed. At least part of a time during which the first instance of the content item is executed may occur during the production of the virtual machine image. Upon completion of production of the virtual machine image and approval of its use, the virtual machine image may be replicated onto other content item instances, and the first virtual machine instance may be terminated or repurposed.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A63F 13/00 - Jeux vidéo, c. à d. jeux utilisant un affichage à plusieurs dimensions généré électroniquement
45.
CUSTOM COMMUNICATION CHANNELS FOR APPLICATION DEPLOYMENT
An application deployment service (ADS) component receives a request to establish a communication channel for clients to submit deployment artifacts associated with an application. A set of endpoints are created for the channel. In response to receiving a message via one of the endpoints, the ADS determines that additional security verification operations are to be performed before a deployment task indicated in the message can be performed. After the security verification operations are completed, the task is implemented.
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 67/141 - Configuration des sessions d'application
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
46.
CONTENT DELIVERY NETWORK VIDEO CONTENT INVALIDATION THROUGH ADAPTIVE BITRATE MANIFEST MANIPULATION
A method for invalidating content segments of a bitstream. The method comprises a step of delivering a manifest file from an origin server to a content delivery network. The manifest file may have a time-to-live value and may be redelivered based on the time-to-live value. The method comprises a step of delivering one or more content segments from the origin server to the content delivery network. The manifest file may contain pointers to the content segments. The method comprises a step of modifying the manifest file at the origin server to include invalidation information based on an input signal. The method comprises a step of invalidating the content segments throughout the content delivery network based on the invalidation information.
H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
H04N 21/262 - Ordonnancement de la distribution de contenus ou de données additionnelles, p.ex. envoi de données additionnelles en dehors des périodes de pointe, mise à jour de modules de logiciel, calcul de la fréquence de transmission de carrousel, retardement d
H04N 21/845 - Structuration du contenu, p.ex. décomposition du contenu en segments temporels
H04L 47/28 - Commande de flux; Commande de la congestion par rapport à des considérations temporelles
H04L 65/80 - Dispositions, protocoles ou services dans les réseaux de communication de paquets de données pour prendre en charge les applications en temps réel en répondant à la qualité des services [QoS]
H04L 67/1095 - Réplication ou mise en miroir des données, p.ex. l’ordonnancement ou le transport pour la synchronisation des données entre les nœuds du réseau
47.
AUTOMATIC SCALING OF RESOURCE INSTANCE GROUPS WITHIN COMPUTE CLUSTERS
A service provider may apply customer-selected or customer-defined auto-scaling policies to a cluster of resources (e.g., virtualized computing resource instances or storage resource instances in a MapReduce cluster). Different policies may be applied to different subsets of cluster resources (e.g., different instance groups containing nodes of different types or having different roles). Each policy may define an expression to be evaluated during execution of a distributed application, a scaling action to take if the expression evaluates true, and an amount by which capacity should be increased or decreased. The expression may be dependent on metrics emitted by the application, cluster, or resource instances by default, metrics defined by the client and emitted by the application, or metrics created through aggregation. Metric collection, aggregation and rules evaluation may be performed by a separate service or by cluster components. An API may support auto-scaling policy definition.
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
48.
MANAGING LOAD BALANCERS ASSOCIATED WITH AUTO-SCALING GROUPS
A computing resource service provider may provide computing instances organized into logical groups, such as auto-scale groups. Computing instances assigned to an auto-scale group may be associated with one or more load balancers configured to direct traffic to the computing instances. Furthermore, customers of the computing resource service provider may add or remove load balancer from the auto-scale groups.
Methods and apparatus for controlling the movement of portable receptacles within a materials handling facility are described. The materials handling facility utilizes at least one linear induction motor (LEVI) to move the portable receptacles having conductive elements from a first location to a second location within the facility. The LEVIs may be configured such that most, if not all, of the movement of the receptacles is controlled by the application of energy from the LEVIs to the conductive elements of the receptacles. This energy may cause the receptacles to move from one LEVI to another LEVI, where each LIM in sequence can apply force to the receptacle to pass it to the next LIM in the sequence. In some implementations, the portable receptacles are configured such that at least a base portion of the receptacle includes a conductive element to interact with the LIMs, while maintaining an overall light-weight configuration.
B65G 54/02 - Transporteurs non mécaniques, non prévus ailleurs électrostatiques, électriques ou magnétiques
G05B 19/042 - Commande à programme autre que la commande numérique, c.à d. dans des automatismes à séquence ou dans des automates à logique utilisant des processeurs numériques
50.
ENDPOINT MANAGEMENT SYSTEM PROVIDING AN APPLICATION PROGRAMMING INTERFACE PROXY SERVICE
An endpoint management and proxy system is described, by which users can manage and enable exposure of application programming interfaces ("APIs") usable to cause execution of program code on a remote or third party system. Systems and methods are disclosed which facilitate the handling of user requests to perform certain tasks on remote systems. The endpoint management system allows the application developer to define and specify a first proxy API which maps to a second API associated with the remote system. The endpoint proxy system receives requests to execute the proxy API, determines the API mapping, and sends one or more backend API requests to execute program codes by the associated remote systems. Responses from the remote systems are received by the endpoint proxy system which parses and/or transforms the results associated with the response and generates an output result for response back to the user computing systems.
Computing resource service providers may provide computing resources to customers in a multi-tenant environment. These computing resources may be behind a firewall or other security device such that certain information does not reach the computing resources provided to the customer. A logging entity may be implemented on computer server operated by the computing resource service provider. The logging entity may obtain log information from the firewall or other security device and store the log information such that it is accessible to the customer. Additionally, the log information may be provided to other services such as a metrics service or intrusion detection service.
A computer system performs cryptographic operations as a service. The computer system is configured to allow users of the service to maintain control of their respective cryptographic material. The computer system uses inaccessible cryptographic material to encrypt a user's cryptographic material in a token that is then provided to the user. The user is unable to access a plaintext copy of the cryptographic material in the token, but can provide the token back to the service to cause the service to decrypt and use the cryptographic material.
H04L 9/16 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
An unmanned vehicle communicates with other unmanned vehicles. When the unmanned vehicle receives a message from another unmanned vehicle, the unmanned vehicle verifies authenticity of the message. For at least some types of messages, if determined that the message is authentic, the unmanned vehicle updates a set of operations the unmanned vehicle will perform in accordance with information in the message.
H04L 9/28 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant un algorithme de chiffrement particulier
H04L 67/12 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance
A computer system performs cryptographic operations as a service. The computer system is configured to allow users of the service to maintain control of their respective cryptographic material. The computer system uses inaccessible cryptographic material to encrypt a user's cryptographic material in a token that is then provided to the user. The user is unable to access a plaintext copy of the cryptographic material in the token, but can provide the token back to the service to cause the service to decrypt and use the cryptographic material.
A modular LIDAR system may be formed of multiple LIDAR components. Each LIDAR component may include a laser emitter and a laser detector configured in a frame. Multiple LIDAR components may be arranged on a rotatable swivel housing. The rotatable housing may rotate about a first axis that is perpendicular to a plane defined by a mounting base. The multiple LIDAR components may be aimed outward from the swivel housing at different directions, which may range up to 90 degrees or up to 180 degrees in separation in some embodiments. When the rotatable housing is rotated completely around the first axis, the multiple LIDAR components may scan a first field of view of 360 degrees around the first axis and may scan a second field of view of substantially 180 degrees about a second axis. The modular LIDAR system may be implemented with an aircraft for navigational purposes.
Technologies are disclosed herein for executing commands within virtual machine ("VM") instances. A public web service application programming interface ("API") is exposed within a service provider network that includes methods relating to the execution of commands within VM instances. For example, the API might include a method for obtaining a list of the commands that can be executed within a VM instance. The API might also include a method for requesting the execution of a command within a VM instance. The API might also include a method for requesting data describing the status of the execution of a command within a VM instance. The API might also expose other methods. A software agent executing on a VM instance may be utilized to provide a list of commands that can be executed in the VM, to execute requested commands, and to provide data describing the status of execution of a command.
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A storage system may implement dynamic configuration of data volumes. Client utilization of a data volume in a storage system may be tracked or monitored. Based on the utilization of the data volume, configuration recommendations to reconfigure the data volume according to data volume offerings may be determined. The data volume may be configured according to an authorized configuration recommendation. In some embodiments, these recommendations may be provided to a client and selection of the configuration recommendation to perform may be received. In some embodiments, a configuration recommendation may be automatically performed based on previously provided authorization to configure the data volume.
A method for selecting a communication protocol for a virtual desktop instance in a service provider environment may include providing to a client computing device, access to a virtual desktop instance running on a server computer using a first communication channel associated with a first communication protocol. A request for functionality from a user of the device is detected, the requested functionality being unsupported by the first communication protocol. A second communication protocol from a plurality of available communication protocols may be selecting based on the requested functionality. The second communication protocol may support the requested functionality. A user authorization for using the second communication protocol can be verified. Upon successful verification, a second communication channel is established between the server computer and the device using the second communication protocol for performing the functionality, while maintaining access to the virtual desktop instance using the first communication channel.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
H04L 67/08 - Protocoles spécialement adaptés à l'émulation du terminal, p.ex. Telnet
H04L 69/18 - Gestionnaires multi-protocoles, p.ex. dispositifs uniques capables de gérer plusieurs protocoles
59.
GPS ERROR CORRECTION VIA NETWORK OF FIXED POINT GROUND STATIONS
An error correcting location system includes a ground station with fixed reference coordinates. The ground station may receive satellite broadcast messages from a plurality of location system satellites. Further, the ground station may determine location coordinates based on the satellite broadcast messages, and compare the location coordinates to the fixed reference coordinates to determine a compensation value. In addition, the ground station may send the compensation value to location system devices. Upon receipt of the compensation value, the location system devices may utilize the compensation value to generate highly accurate location coordinates.
G01S 19/07 - Systèmes de positionnement par satellite à radiophares émettant des messages horodatés, p.ex. GPS [Système de positionnement global], GLONASS [Système global de navigation par satellite] ou GALILEO Éléments coopérants; Interaction ou communication entre les différents éléments coopérants ou entre les éléments coopérants et les récepteurs fournissant des données pour corriger les données de positionnement mesurées, p.ex. DGPS [GPS différentiel] ou corrections ionosphériques
G01S 19/40 - Correction de position, de vitesse ou d'attitude
60.
ADJUSTABLE LANDING GEAR ASSEMBLY FOR UNMANNED AERIAL VEHICLES
This disclosure describes a configuration of an unmanned aerial vehicle (UAV) landing gear assembly that includes adjustable landing gear extensions (251) that may be extended or contracted so that the body of the UAV is contained in a horizontal plane when the UAV is landed, even on sloping surfaces. For example, when a UAV is landing, the slope of the surface may be determined and the landing gear extensions (251) adjusted based on the slope so that the body of the UAV remains approximately horizontal when the UAV lands and is supported by the landing gear extensions.
B64C 25/26 - Systèmes de commande ou de verrouillage à cet effet
B64C 27/26 - Giravions complexes, c. à d. aéronefs utilisant en vol à la fois les caractéristiques de l'avion et celles du giravion caractérisé par le fait qu'il est doté d'ailes fixes
Techniques for content deployment, scaling and telemetry are described herein. Once a content item is made accessible for deployment, one or more instances of the content item may be installed as an image on a virtual machine instance. Additional instances of the content item may then be launched on the same virtual machine instance and/or by copying the image onto any number of additional virtual machine instances. One or more instances of a content item may be configurable to execute with multiple simultaneously assigned users sessions. Information associated with content item instances may be collected, such as a number of occupied user sessions, a number of unoccupied user sessions, content item instance duration, memory usage, and the like. This information may, in some cases, be used to match and assign authorized users to appropriate content item instances.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
62.
OPPORTUNISTIC RESOURCE MIGRATION TO OPTIMIZE RESOURCE PLACEMENT
A distributed system may implement opportunistic resource migration to optimize resource placement. Resources may be placed amongst different resource hosts of a distributed system. An evaluation of the current placement may be performed according placement criteria that improve placement of the resources at the distributed system. Based on the evaluation, the prospective migration of resources that exceed an improvement threshold may be identified as candidate resources to migrate. Migration for the candidate resources may be opportunistically performed. In some embodiments, a priority may be assigned to the candidate resources according to which the candidate resources are selected for performing migration.
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
63.
SHORT-DURATION DIGITAL CERTIFICATE ISSUANCE BASED ON LONG-DURATION DIGITAL CERTIFICATE VALIDATION
A certificate authority service receives a request to issue a long-duration digital certificate from an entity for validation purposes between the entity and the service. Upon issuance of the long-duration digital certificate, the entity submits a request to the service for issuance of a short-duration digital certificate that includes a shorter validity period than the long-duration digital certificate. The service may utilize the long-duration digital certificate to validate the entity and, upon validating the entity, issues the short-duration digital certificate to the entity. The entity may subsequently utilize the short-duration digital certificate to enable a user client to authenticate the entity and securely communicate with the entity.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
64.
UNMANNED AERIAL VEHICLE WITH EXTERNAL FRAME CARRYING THRUST PROPELLERS AND INTERNAL FRAME CARRYING LIFT PROPELLERS
This disclosure describes a configuration of an unmanned aerial vehicle (UAV) that includes a substantially polygonal perimeter frame (104) and a central frame (107). The perimeter frame includes a front wing (120), a lower rear wing (124), and an upper rear wing (122). The wings provide lift to the UAV when the UAV is moving in a direction that includes a horizontal component. The UAV may have any number of lifting motors (106). For example, the UAV may include four lifting motors (also known as a quad-copter), eight lifting motors (octo-copter), etc. Likewise, to improve the efficiency of horizontal flight, the UAV may also include one or more thrusting motors (110) and corresponding thrusting propellers (112). When the UAV is moving horizontally, the thrusting motor(s) may be engaged and the thrusting propeller(s) will aid in the horizontal propulsion of the UAV.
B64C 27/26 - Giravions complexes, c. à d. aéronefs utilisant en vol à la fois les caractéristiques de l'avion et celles du giravion caractérisé par le fait qu'il est doté d'ailes fixes
B64C 39/08 - Aéronefs non prévus ailleurs à ailes multiples
65.
LANDING OF UNMANNED AERIAL VEHICLES ON MOVING TRANSPORTATION VEHICLES FOR TRANSPORT
Unmanned aerial vehicles ("UAVs") (400) which fly to destinations (e.g., for delivering items) may land on transportation vehicles (e.g., delivery trucks, etc.) (201) for temporary transport. An agreement with the owner of the transportation vehicles (e.g., a shipping carrier) may be made for obtaining consent and determining compensation for landings, and the associated transportation vehicles that are available for landings may be identified by markers on the roof or other identification techniques. The routes of the transportation vehicles (201) may be known and utilized to determine locations where UAVs (400) will land on and take off from the transportation vehicles (201), and in cases of emergencies (e.g., due to low batteries, mechanical issues, etc.) the UAVs (400) may land on the transportation vehicles (201) for later retrieval.
B60P 3/11 - Véhicules adaptés pour transporter, porter ou comporter des charges ou des objets spéciaux pour le transport de véhicules pour le transport d'avions
66.
CONTEXT SENSITIVE FRAMEWORK FOR PROVIDING DATA FROM RELEVANT APPLICATIONS
Functionality is disclosed herein for using a context sensitive framework to identify relevant applications to a current context and to provide data received from the relevant applications to a user. Instead of a user having to manually locate and launch an application, relevant applications determined by a contextual service may provide data in response to receiving the context data. The applications that are identified as relevant to the context determine the application data to provide to the contextual service. The contextual service selects at least a portion of the application data to provide for display within a user interface. In some configurations, the selected application data is displayed within a user interface that maintains a same look and feel regardless of the application data that is displayed.
This disclosure describes a configuration of an unmanned aerial vehicle ("UAV") (100) that will facilitate extended flight duration. The UAV may have any number of lifting motors (102). For example, the UAV may include four lifting motors (also known as a quad-copter), eight lifting motors (also known as an octo-copter), etc. Likewise, to improve the efficiency of horizontal flight, the UAV also includes a pivot assembly (109) that may rotate about an axis (624) from a lifting position to a thrusting position. The pivot assembly may include two or more offset motors (610) that generate a differential force that will cause the pivot assembly to rotate between the lifting position and the thrusting position without the need for any additional motors or gears.
B64C 27/28 - Giravions complexes, c. à d. aéronefs utilisant en vol à la fois les caractéristiques de l'avion et celles du giravion avec hélices propulsives de déplacement pouvant pivoter pour agir comme rotors de sustentation
B64C 15/12 - Commande de l'assiette, de la direction du vol ou de l'altitude par jets réactifs les jets étant des jets propulsifs le groupe propulseur étant basculable
This disclosure describes a collective UAV in which multiple UAVs may be coupled together to form the collective UAV. A collective UAV may be used to aerially transport virtually any size, weight or quantity of items, travel longer distances, etc. For example, rather than using one large UAV to carry a larger or heavier item, multiple smaller UAVs may couple together to form a collective UAV that is used to carry the larger or heavier item.
A cryptography service allows for management of cryptographic keys and for the evaluation of security expectations when processing incoming requests. In some contexts, the cryptography service, upon receiving a request to perform a cryptographic operation, evaluates a set of security expectations to determine whether the cryptographic key or keys usable to perform the cryptographic operation should be trusted. A response to the request is dependent on evaluation of the security expectations.
A system for providing security mechanisms for secure execution of program code is described. The system may be configured to maintain a plurality of virtual machine instances. The system may be further configured to receive a request to execute a program code and allocate computing resources for executing the program code on one of the virtual machine instances. One mechanism involves executing program code according to a user-specified security policy. Another mechanism involves executing program code that may be configured to communicate or interface with an auxiliary service. Another mechanism involves splitting and executing program code in a plurality of portions, where some portions of the program code are executed in association with a first level of trust and some portions of the program code are executed with different levels of trust.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 21/52 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
Techniques described and suggested herein include systems and methods for storing, indexing, and retrieving original data of data archives on data storage systems using redundancy coding techniques. For example, redundancy codes, such as erasure codes, may be applied to archives (such as those received from a customer of a computing resource service provider) so as allow the storage of original data of the individual archives available on a minimum of volumes, such as those of a data storage system, while retaining availability, durability, and other guarantees imparted by the application of the redundancy code. Sparse indexing techniques may be implemented so as to reduce the footprint of indexes used to locate the original data, once stored.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
72.
COMMERCIAL AND GENERAL AIRCRAFT AVOIDANCE USING LIGHT, SOUND, AND/OR MULTI-SPECTRAL PATTERN DETECTION
This disclosure is directed to a detection and avoidance apparatus for an unmanned aerial vehicle ("UAV") and systems, devices, and techniques pertaining to automated object detection and avoidance during UAV flight. The system may detect objects within the UAV's airspace through acoustic, visual, infrared, multispectral, hyperspectral, or object detectable signal emitted or reflected from an object. The system may identify the source of the object detectable signal by comparing features of the received signal with known sources signals in a database. The features may be, for example, a light arrangement or number of lights associated with the object. Furthermore, a trajectory envelope for the object may be determined based on characteristic performance parameters for the object such as cursing speed, maneuverability, etc. The UAV may determine an optimized flight plan based on the trajectory envelopes of detected objects within the UAV's airspace to avoid the detected objects.
H04B 7/26 - Systèmes de transmission radio, c. à d. utilisant un champ de rayonnement pour communication entre plusieurs postes dont au moins un est mobile
G01B 11/00 - Dispositions pour la mesure caractérisées par l'utilisation de techniques optiques
G01N 29/14 - Recherche ou analyse des matériaux par l'emploi d'ondes ultrasonores, sonores ou infrasonores; Visualisation de l'intérieur d'objets par transmission d'ondes ultrasonores ou sonores à travers l'objet utilisant des techniques d'émission acoustique
G01N 29/46 - Traitement du signal de réponse détecté par analyse spectrale, p.ex. par analyse de Fourier
G01S 7/41 - DÉTERMINATION DE LA DIRECTION PAR RADIO; RADIO-NAVIGATION; DÉTERMINATION DE LA DISTANCE OU DE LA VITESSE EN UTILISANT DES ONDES RADIO; LOCALISATION OU DÉTECTION DE LA PRÉSENCE EN UTILISANT LA RÉFLEXION OU LA RERADIATION D'ONDES RADIO; DISPOSITIONS ANALOGUES UTILISANT D'AUTRES ONDES - Détails des systèmes correspondant aux groupes , , de systèmes selon le groupe utilisant l'analyse du signal d'écho pour la caractérisation de la cible; Signature de cible; Surface équivalente de cible
G01S 7/539 - DÉTERMINATION DE LA DIRECTION PAR RADIO; RADIO-NAVIGATION; DÉTERMINATION DE LA DISTANCE OU DE LA VITESSE EN UTILISANT DES ONDES RADIO; LOCALISATION OU DÉTECTION DE LA PRÉSENCE EN UTILISANT LA RÉFLEXION OU LA RERADIATION D'ONDES RADIO; DISPOSITIONS ANALOGUES UTILISANT D'AUTRES ONDES - Détails des systèmes correspondant aux groupes , , de systèmes selon le groupe utilisant l'analyse du signal d'écho pour la caractérisation de la cible; Signature de cible; Surface équivalente de cible
A system for providing automatic resource resizing is provided. The system may be configured to maintain a plurality of virtual machine instances. The system may be further configured to receive a request to execute a program code and allocate computing resources for executing the program code on one of the virtual machine instances. The amount of resources allocated for executing the program code may be specified by the request and adjusted as needed.
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
Disclosed are various embodiments for tracking and verifying the authenticity of items. Public and private unique identifiers are generated for an item, and an identifier label is printed and affixed to the item. The public identifier is visible, but the private identifier is not visible unless a tamper-evident action is performed. Events involving scans of the public identifier are recorded. The private identifier is scanned by a client, and in response, authenticity information for the item is sent to the client. The authenticity information is determined based at least in part on the events relative to the public identifier.
This disclosure describes a configuration of an unmanned aerial vehicle (UAV) that will facilitate extended flight duration. The UAV may have any number of lifting motors. For example, the UAV may include four lifting motors (also known as a quad-copter), eight lifting motors (octo-copter), etc. Likewise, to improve the efficiency of horizontal flight, the UAV also includes a pushing motor and propeller assembly that is oriented at approximately ninety degrees to one or more of the lifting motors. When the UAV is moving horizontally, the pushing motor may be engaged and the pushing propeller will aid in the horizontal propulsion of the UAV.
An unmanned aerial vehicle, comprising a monolithic uni-body frame including a hub (1120) positioned near a center of the UAV; a plurality of motor arms (1108), each motor arm having a first end and a second end, each first end coupled to the hub; and a perimeter protective barrier (1114) completely surrounding the hub and the plurality of motor arms. The frame and perimeter protective barrier are formed as a monolithic uni-body to increase the structural integrity of the UAV.
This disclosure describes a configuration of an unmanned aerial vehicle (UAV) that will facilitate extended flight duration. The UAV may have any number of lifting motors. For example, the UAV may include four lifting motors (also known as a quad-copter), eight lifting motors (octo-copter), etc. Likewise, to improve the efficiency of horizontal flight, the UAV also includes a pushing motor and propeller assembly that is oriented at approximately ninety degrees to one or more of the lifting motors. The UAV has a thermally conductive frame. A first power supply container is coupled to the frame at a first position, and a second power supply container coupled to the frame at a second position. A payload is configured to be removably positioned between the first power supply container and the second power supply container.
B64C 27/26 - Giravions complexes, c. à d. aéronefs utilisant en vol à la fois les caractéristiques de l'avion et celles du giravion caractérisé par le fait qu'il est doté d'ailes fixes
78.
DYNAMIC SCALING OF STORAGE VOLUMES FOR STORAGE CLIENT FILE SYSTEMS
A network-based data store maintaining storage volumes for file systems at storage clients may implement dynamic storage volume scaling. A scaling event may be detected according to a specified scaling policy for a storage volume maintained at a network-based data store that is mounted at a storage client and configured for a file system. In a least some embodiments, the scaling policy for the storage volume may be received from the storage client. In response to detecting the storage event, storage maintaining the storage volume may be modified according to the scaling policy to scale the storage volume. An indication of the scaling event may be sent to the storage client in order to update the file system at the storage client so that the file system may utilize the scaled storage volume.
Disclosed are various embodiments of a multi-scale fiducial. A multi-scale fiducial may have three or more scales, where the child fiducials are nested or otherwise linked by a relative position to the parent fiducials. Multi-scale fiducials may facilitate target identification and tracking at varying distances, potentially without the aid of a scale-invariant recognition algorithm. One application of multi-scale fiducials may involve target identification for autonomously controlled aerial vehicles.
G05D 3/20 - Commande de la position ou de la direction utilisant la contre-réaction utilisant un dispositif de comparaison numérique
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p.ex. forme, nature, code
H01L 23/544 - Marques appliquées sur le dispositif semi-conducteur, p.ex. marques de repérage, schémas de test
80.
RULE-BASED ACTION TRIGGERING IN A PROVIDER NETWORK
Methods, systems, and computer-readable media for implementing rule-based triggering in a provider network are disclosed. When conditions are met for one or more triggers, one or more rules that comprise the one or more triggers are determined. The conditions are determined in a provider network comprising a plurality of resources. One or more actions are determined in the one or more rules that comprise the one or more triggers. The one or more actions are performed, comprising modifying one or more of the resources in the provider network.
H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/5041 - Gestion des services réseau, p.ex. en assurant une bonne réalisation du service conformément aux accords caractérisée par la relation temporelle entre la création et le déploiement d’un service
H04L 41/5061 - Gestion des services réseau, p.ex. en assurant une bonne réalisation du service conformément aux accords caractérisée par l’interaction entre les fournisseurs de services et leurs clients réseau, p.ex. la gestion de la relation client
H04L 67/51 - Découverte ou gestion de ceux-ci, p.ex. protocole de localisation de service [SLP] ou services du Web
H04L 41/5054 - Déploiement automatique des services déclenchés par le gestionnaire de service, p.ex. la mise en œuvre du service par configuration automatique des composants réseau
A method and apparatus for document collaboration and management are disclosed. User devices associated with a user of a document management and collaboration system are identified. Documents associated with the user are downloaded to the user devices from the document management and collaboration system. A targeted denial of access to the downloaded documents is performed.
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06F 21/44 - Authentification de programme ou de dispositif
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
82.
MANAGEMENT OF APPLICATION ACCESS TO DIRECTORIES BY A HOSTED DIRECTORY SERVICE
Features are disclosed for facilitating management of network directories of multiple organizations by a centralized directory management system. Various applications can access the directories of the organizations via the directory management system according to the permissions that the applications have been granted by the respective organizations. Organizations may maintain directories on-premises or off-premises, and the applications can access the directories via the directory management system regardless of the physical location of the directories. Additionally, the applications may be hosted by a computing service provider that also hosts or otherwise manages the directory management service, or the applications can be hosted by third-party servers separate from the directory management system and the organizations.
A service manages a plurality of virtual machine instances for low latency execution of user codes. The service can provide the capability to execute user code in response to events triggered on an auxiliary service to provide implicit and automatic rate matching and scaling between events being triggered on the auxiliary service and the corresponding execution of user code on various virtual machine instances. An auxiliary service may be configured as an event triggering service to detect events and generate event messages for execution of the user codes. The service can request, receive, or poll for event messages directly from the auxiliary service or via an intermediary message service. Event messages can be rapidly converted to requests to execute user code on the service. The time from processing the event message to initiating a request to begin code execution is less than a predetermined duration, for example, 100 ms.
G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
84.
USING CREDENTIALS STORED IN DIFFERENT DIRECTORIES TO ACCESS A COMMON ENDPOINT
A global endpoint may be associated with an organization name and a plurality of directories located in different geographic regions. The global endpoint may be a computing system that hosts a page used by users to access an application or service. A user may be able to access the application or service using already existing credentials. For example, the user may access the application or service using credentials stored and maintained by an entity with which the user is affiliated. Users having credentials stored in different geographic regions may be able to access the application or service via the same global endpoint.
H04L 61/4523 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant un protocole allégé d’accès annuaire [LDAP]
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
H04L 67/1021 - Sélection du serveur pour la répartition de charge basée sur la localisation du client ou du serveur
H04L 67/51 - Découverte ou gestion de ceux-ci, p.ex. protocole de localisation de service [SLP] ou services du Web
H04L 67/52 - Services réseau spécialement adaptés à l'emplacement du terminal utilisateur
H04L 61/4511 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
A system for providing dynamic code deployment and versioning is provided. The system may be configured to receive a first request to execute a newer program code on a virtual compute system, determine, based on the first request, that the newer program code is a newer version of an older program code loaded onto an existing container on a virtual machine instance on the virtual compute system, initiate a download of the newer program code onto a second container on the same virtual machine instance, and causing the first request to be processed with the older program code in the existing container.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A service manages a plurality of virtual machine instances for low latency execution of user codes. The plurality of virtual machine instances can be configured based on a predetermined set of configurations. One or more containers may be created within the virtual machine instances. In response to a request to execute user code, the service identifies a pre-configured virtual machine instance suitable for executing the user code. The service can allocate the identified virtual machine instance to the user, create a new container within an instance already allocated to the user, or re-use a container already created for execution of the user code. When the user code has not been activated for a time-out period, the service can invalidate allocation of the virtual machine instance destroy the container. The time from receiving the request to beginning code execution is less than a predetermined duration, for example, 100 ms.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
An interaction analysis module may collect data about user interactions with video content in a real-time video exploration (RVE) system, analyze the collected data to determine correlations between users or groups of users and particular video content, and provide the analysis data to one or more systems, for example to the RVE system or to an online merchant. The RVE system may dynamically render and stream new video content targeted at particular users or groups based at least in part on the analysis data. Network-based computation resources and services may be leveraged by the RVE system to enable interactive exploration of video content by the users, as well as the real-time rendering and streaming of the new video content. Entities such as online merchants may target information such as advertising or recommendations to particular users or groups based at least in part on the analysis information.
H04N 21/2668 - Création d'un canal pour un groupe dédié d'utilisateurs finaux, p.ex. en insérant des publicités ciblées dans un flux vidéo en fonction des profils des utilisateurs finaux
H04N 21/254 - Gestion au sein du serveur de données additionnelles, p.ex. serveur d'achat ou serveur de gestion de droits
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p.ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données co
A63F 13/30 - Dispositions d’interconnexion entre des serveurs et des dispositifs de jeu; Dispositions d’interconnexion entre des dispositifs de jeu; Dispositions d’interconnexion entre des serveurs de jeu
A63F 13/52 - Commande des signaux de sortie en fonction de la progression du jeu incluant des aspects de la scène de jeu affichée
A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.
A user of a computing device selects a data file and, through an input device, transmits a command to open the selected data file. In response, the computing device launches a location determination application determines, based at least in part on a policy associated with a file type corresponding to the selected data file, that the data file is to be opened in a virtual computing environment. The computing device provides the selected data file to the virtual computing environment along with one or more executable instructions that may cause a server to launch an application within the virtual computing environment capable of opening the selected data file. The user of the computing device, through a virtual computing environment interface installed on the computing device, may access the virtual computing environment to use the selected data file.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
It may be determined that a cloud desktop should be migrated from a current region. A destination region to which the cloud desktop will be migrated can be identified. A data volume of the cloud desktop may be copied from the current region to the destination region. The data volume at the current region and the data volume at the destination region may be maintained in sync during the copying. Upon completion of the copying, a current user session associated with the cloud desktop at the current region may be frozen, a current memory and processor state of the current user session may be copied to the destination region, and a second cloud desktop instance at the destination region may be started using the copied data volume and current memory and processor state. The current user session may be connected to the second cloud desktop instance.
G06F 9/48 - Lancement de programmes; Commutation de programmes, p.ex. par interruption
H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p.ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 67/1095 - Réplication ou mise en miroir des données, p.ex. l’ordonnancement ou le transport pour la synchronisation des données entre les nœuds du réseau
H04L 67/52 - Services réseau spécialement adaptés à l'emplacement du terminal utilisateur
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
This disclosure is directed to an automated aerial vehicle ("AAV") and systems, devices, and techniques pertaining to canceling noise, generating audible communications, and/or generating visible communications. The AAV may include one or more propellers utilized, in part, to produce sound that cancels noise generated by one or more other propellers. Additionally or alternatively, the AAV may utilize one or more propellers to generate audible and/or visible communications.
G10K 11/178 - Procédés ou dispositifs de protection contre le bruit ou les autres ondes acoustiques ou pour amortir ceux-ci, en général utilisant des effets d'interférence; Masquage du son par régénération électro-acoustique en opposition de phase des ondes acoustiques originales
B64C 1/40 - Insonorisation ou isolation calorifique
H02K 5/24 - Enveloppes; Enceintes; Supports spécialement adaptés pour la réduction ou à la suppression des bruits ou vibrations
Functionality is disclosed herein for providing an asynchronous processing service for processing storage mapping information. The asynchronous processing service is configured to receive a storage request including identification of a storage object and a description of a storage operation, perform the storage operation for the storage object in response to receiving the storage request, and asynchronously update mapping information for the performed storage operation.
A first transaction manager of a partitioned storage group stores a first conditional commit record for a first write of a multi-partition transaction based on a first conflict detection operation. A second transaction manager stores a second conditional commit record for a second write of the transaction based on a second conflict detection operation. A client-side component of the storage group determines that both writes have been conditionally committed, and stores an unconditional commit record in a commit decision repository. A write applier examines the first conditional commit record and the unconditional commit record before propagating the first write to the first partition.
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
A first transaction manager of a partitioned storage group stores a first conditional commit record for a first write of a multi-partition transaction based on a first conflict detection operation. A second transaction manager stores a second conditional commit record for a second write of the transaction based on a second conflict detection operation. A client-side component of the storage group determines that both writes have been conditionally committed, and stores an unconditional commit record in a commit decision repository. A write applier examines the first conditional commit record and the unconditional commit record before propagating the first write to the first partition.
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
The disclosure describes an automated aerial vehicle (AAV) and system for automatically detecting a contact or an imminent contact between a propeller of the AAV and an object (e.g., human, pet, or other animal). When a contact or an imminent contact is detected, a safety profile may be executed to reduce or avoid any potential harm to the object and/or the AAV. For example, if a contact with a propeller of the AAV by an object is detected, the rotation of the propeller may be stopped to avoid harming the object. Likewise, an object detection component may be used to detect an object that is nearing a propeller, stop the rotation of the propeller, and/or navigate the AAV away from the detected object.
At a machine learning service, a set of candidate variables that can be used to train a model is identified, including at least one processed variable produced by a feature processing transformation. A cost estimate indicative of an effect of implementing the feature processing transformation on a performance metric associated with a prediction goal of the model is determined. Based at least in part on the cost estimate, a feature processing proposal that excludes the feature processing transformation is implemented.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
97.
INTERACTIVE INTERFACES FOR MACHINE LEARNING MODEL EVALUATIONS
A first data set corresponding to an evaluation run of a model is generated at a machine learning service for display via an interactive interface. The data set includes a prediction quality metric. A target value of an interpretation threshold associated with the model is determined based on a detection of a particular client's interaction with the interface. An indication of a change to the prediction quality metric that results from the selection of the target value may be initiated.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G06F 3/04847 - Techniques d’interaction pour la commande des valeurs des paramètres, p.ex. interaction avec des règles ou des cadrans
At a machine learning service, a set of candidate variables that can be used to train a model is identified, including at least one processed variable produced by a feature processing transformation. A cost estimate indicative of an effect of implementing the feature processing transformation on a performance metric associated with a prediction goal of the model is determined. Based at least in part on the cost estimate, a feature processing proposal that excludes the feature processing transformation is implemented.
A machine learning service implements programmatic interfaces for a variety of operations on several entity types, such as data sources, statistics, feature processing recipes, models, and aliases. A first request to perform an operation on an instance of a particular entity type is received, and a first job corresponding to the requested operation is inserted in a job queue. Prior to the completion of the first job, a second request to perform another operation is received, where the second operation depends on a result of the operation represented by the first job. A second job, indicating a dependency on the first job, is stored in the job queue. The second job is initiated when the first job completes.
A first representation of a feature processing recipe is received at a machine learning service. The recipe includes a section in which groups of variables on which common transformations are to be applied are defined, and a section in which a set of transformation operations are specified. The first representation of the recipe is validated based at least in part on a library of function definitions supported by the service, and an executable version of the recipe is generated. In response to a determination that the recipe is to be executed on a particular data set, a set of provider network resources is used to implement a transformation operation indicated in the recipe.