Systems, methods, and computer-readable media are disclosed for improved wireless battery charging. The device may include a battery, and may be configured to determine that the battery is de-coupled from a wireless charger at a first time, determine that the battery is coupled to the wireless charger at a second time, determine that a first elapsed time between the first time and the second time is equal to or less than a first threshold, and cause charging of the battery to be disabled for a first time duration.
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
H02J 50/80 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique mettant en œuvre l’échange de données, concernant l’alimentation ou la distribution d’énergie électrique, entre les dispositifs de transmission et les dispositifs de réception
2.
INTERFACE DEVICE FOR INTERCOM ACCESS CONTROL SYSTEMS
This disclosure describes an electronic device that can be installed within an access control system in parallel with a legacy interface device. The electronic device may perform steps of determining a set of configuration settings associated with an access control system to which the electronic device is electrically connected, receiving, by the electronic device, a first signal in a format associated with the access control system, configuring, based on the set of configuration settings, one or more signal pathways within the electronic device, generating, by routing the first signal through the one or more signal pathways, a second signal in a second format, and providing the second signal to at least one second electronic device.
H04M 11/02 - Systèmes de communication téléphonique spécialement adaptés pour être combinés avec d'autres systèmes électriques avec sonnerie ou systèmes annonciateurs
A speech-processing system may provide access to one or more virtual assistants via an audio-controlled device. A multi-agent component of a device may be used to coordinate control of device process(es) regardless of the invoked agent and without necessarily sharing information between agents and corresponding speech-processing system(s). Device-state information may be sent from the multi-agent component to a speech-processing system to interpret a user command. If the command relates to a device process control it may be routed to a device skill and to the multi-agent component of the device. The multi-agent component may track a device state and may inform a particular speech-processing system if a process related to the particular speech-processing system has been controlled.
Disclosed herein are methods for classifying a cell present in a sample, such as a tumor, of a subject, comprising: sequencing bulk DNA from first and second (e.g., tumor and healthy) a subject's tissue samples; classifying somatic variants as first or second sample alleles; sequencing RNA from the cell; aligning each RNA sequence with the bulk DNA; classifying each RNA sequence as a first, a second, or an unknown allele sequence, depending on whether it substantially aligns with the first, the second sample allele, or cannot be determined; and identifying the cell as a first, a second, or an unknown cell, based on the classifying of each of the plurality of RNA sequences. Methods can comprise validating identification by allelic frequency of germ-line variants in the RNA sequences. The methods provide improved characterization of heterogenous cell populations, such as cell populations contaminated with cells from different sources, or tumor populations.
C12Q 1/6886 - Produits d’acides nucléiques utilisés dans l’analyse d’acides nucléiques, p.ex. amorces ou sondes pour les maladies provoquées par des altérations du matériel génétique pour le cancer
G01N 33/574 - Tests immunologiques; Tests faisant intervenir la formation de liaisons biospécifiques; Matériaux à cet effet pour le cancer
5.
PERSONALIZED LONGITUDINAL ANALYSIS OF CIRCULATING MATERIAL TO MONITOR AND ADAPT NEOANTIGEN CANCER VACCINES
Disclosed herein is a method, comprising administering to a subject in need thereof an initial immunogenic composition comprising a plurality of tumor-specific neoantigens, each corresponding to a member of a first set of tumor-associated mutations in a subject, and none corresponding to a member of a second set of tumor-associated mutations in the subject; and quantifying each member of the first set of tumor-associated mutations and each member of the second set of tumor-associated mutations in circulating material comprising tumor-associated mutations isolated from the subject at each of multiple time points.
G01N 33/50 - Analyse chimique de matériau biologique, p.ex. de sang ou d'urine; Test par des méthodes faisant intervenir la formation de liaisons biospécifiques par ligands; Test immunologique
G01N 33/574 - Tests immunologiques; Tests faisant intervenir la formation de liaisons biospécifiques; Matériaux à cet effet pour le cancer
Systems and methods described herein provide for novel boundary' generation features for interleaving additional content into media content. Media content may be received which includes a video and audio portion. An unencrypted encode of the video portion may be generated. A first set of time stamps for the video portion may be generated using a computer vision algorithm. A second set of time stamps for the video portion may be generated for identifying IDR frames using a first algorithm. A third set of time stamps may be generated to serve as boundaries for interleaving additional content into the media content based on a priority algorithm that uses the first set of time stamps and the second set of time stamps. The video portion may be encoded using the third set of time stamps to determine the IDR frames for the media content.
H04N 21/234 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4
H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
H04N 21/845 - Structuration du contenu, p.ex. décomposition du contenu en segments temporels
Techniques for providing execution verification at an integrated circuit device are described. The integrated circuit device may include a processor core configured to execute instructions. The integrated circuit device may also include a trace block configured to extract an execution trace from the processor core, the execution trace indicating the instructions that have been executed by the processor core. The integrated circuit device may further include a verification core configured to receive the execution trace from the trace block, extract an address from a control transfer instruction in the execution trace, perform one or more checks on the address, and generate an alarm signal based on the one or more checks.
G06F 21/71 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p.ex. les mémoires adressables directement
Techniques are generally described for user-customized computer vision event detection. A camera device may capture a first frame of image data. A first machine learning model may generate first embedding data for the first frame of image data. The first embedding data may be input into a second machine learning model associated with the camera device. The second machine learning model and the first embedding data may be used to determine that an area-of-interest represented by the first frame of image data is in a first state. State data stored in memory may be determined. The state data may indicate that the area-of-interest was previously in a second state. An alert may be sent to a device associated with the camera device indicating that the area-of-interest has changed from the second state to the first state.
G06V 10/25 - Détermination d’une région d’intérêt [ROI] ou d’un volume d’intérêt [VOI]
G06V 10/40 - Extraction de caractéristiques d’images ou de vidéos
G06V 10/70 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique
G06V 20/52 - Activités de surveillance ou de suivi, p.ex. pour la reconnaissance d’objets suspects
9.
ISOLATED RUNTIME ENVIRONMENTS FOR SECURING SECRETS USED TO ACCESS REMOTE RESOURCES FROM COMPUTE INSTANCES
An instance secrets management isolated runtime environment is launched at a virtualization server, and utilizes a subset of memory assigned to a compute instance. The subset of memory is inaccessible from entities external to the runtime environment. A secrets manager of the runtime environment provides a security artifact to an application, running at the compute instance, which has requested access to a resource. The artifact is generated by the secrets manager using a security secret associated with the compute instance; the secret is not accessible to programs external to the runtime environment. In response to a determination that the artifact is valid, the application obtains access to the resource.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
G06F 21/44 - Authentification de programme ou de dispositif
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
Systems and methods are described for implementing a distributed unit in a radio access network that synchronizes its clock with a radio unit. A distributed unit may be deployed in a location where it cannot receive timing information from a satellite or may lack the equipment to obtain and process satellite signals. The clock of the distributed unit may thus drift relative to the clocks of the radio units, which may cause the distributed unit to mistime its transmissions of data to radio units for delivery to user devices. The distributed unit may prevent clock drift by obtaining timing information from the radio units, determining an amount of clock drift that is occurring, and applying a correction factor to keep the distributed unit clock synchronized with the radio unit clock. The distributed unit may determine how often to synchronize based on the severity and variability of the clock drift.
Described are systems and methods directed to the processing of two-dimensional ("2D") images of a body to determine a physical activity performed by the body, repetitions of the physical activity, whether the body is performing the physical activity with proper form, and providing physical activity feedback. In addition, the disclosed implementations are able to determine the physical activity, repetitions, and/or form through the processing of 2D partial body images that include less than all of the body of the user.
G06V 40/20 - Mouvements ou comportement, p.ex. reconnaissance des gestes
G06V 10/26 - Segmentation de formes dans le champ d’image; Découpage ou fusion d’éléments d’image visant à établir la région de motif, p.ex. techniques de regroupement; Détection d’occlusion
A system for utilizing media content reference point information to perform media content encoding, and supplemental content stitching and/or insertion. Media content can be encoded and packaged based on boundaries of the media content. The boundaries can be received from a third-party and/or generated via an automated process. Target boundaries can be selected based on accuracy levels associated with the received and/or generated boundaries. Supplemental content can be stitched and/or inserted into packaged media content based on audio and video content of the packaged media content being aligned.
H04N 21/234 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4
G06F 18/2413 - Techniques de classification relatives au modèle de classification, p.ex. approches paramétriques ou non paramétriques basées sur les distances des motifs d'entraînement ou de référence
G06V 10/70 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique
H04N 19/136 - Caractéristiques ou propriétés du signal vidéo entrant
H04N 19/179 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant le codage adaptatif caractérisés par l’unité de codage, c. à d. la partie structurelle ou sémantique du signal vidéo étant l’objet ou le sujet du codage adaptatif l’unité étant une scène ou une prise de vues
H04N 21/262 - Ordonnancement de la distribution de contenus ou de données additionnelles, p.ex. envoi de données additionnelles en dehors des périodes de pointe, mise à jour de modules de logiciel, calcul de la fréquence de transmission de carrousel, retardement d
H04N 21/845 - Structuration du contenu, p.ex. décomposition du contenu en segments temporels
H04N 21/8547 - Création de contenu impliquant des marquages temporels pour synchroniser le contenu
13.
MEDIA CONTENT BOUNDARY-AWARE SUPPLEMENTAL CONTENT MANAGEMENT
A system for utilizing media content reference point information to perform media content encoding, and supplemental content stitching and/or insertion. Media content can be encoded and packaged based on boundaries of the media content. The boundaries can be received from a third-party and/or generated via an automated process. Target boundaries can be selected based on accuracy levels associated with the received and/or generated boundaries. Supplemental content can be stitched and/or inserted into packaged media content based on audio and video content of the packaged media content being aligned.
H04N 21/234 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4
H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
H04N 21/845 - Structuration du contenu, p.ex. décomposition du contenu en segments temporels
H04L 65/612 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p.ex. radio sur Internet pour monodiffusion [unicast]
14.
HYBRID TRANSACTIONAL AND ANALYTICAL PROCESSING ARCHITECTURE FOR OPTIMIZATION OF REAL-TIME ANALYTICAL QUERYING
Methods for replicating transactional tables of a transactional database to an analytical database and maintaining updates to those transactional table representations are disclosed. Snapshots of the transactional tables are provided to the analytical database via a transport mechanism, such as a data storage service or a data streaming service, and stored at the analytical database. Then, checkpoints comprising portions of a change-data-capture log that has recorded transactional changes to the transactional tables of the transactional database are provided to the analytical database via the same or different transport mechanism and used to commit those transactional changes to the snapshot representations. The snapshot representations may be used to respond to incoming analytical queries in order to provide real-time querying results.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
A multimedia streaming device can include a first circuit board configured to provide user controls and a second circuit board electrically coupled with the first circuit board and configured to provide content processing. The multimedia streaming device can also include a heat sink positioned between the first circuit board and the second circuit board and defining a speaker enclosure that includes a first portion in contact with the first circuit board, a second portion in contact with the second circuit board, and a third portion. The multimedia streaming device can additionally include a speaker installed in the third portion of the speaker enclosure.
F21V 33/00 - Combinaisons structurales de dispositifs d'éclairage avec d'autres objets, non prévues ailleurs
H04R 1/04 - Association constructive d'un microphone avec son circuit électrique
H04R 1/40 - Dispositions pour obtenir la fréquence désirée ou les caractéristiques directionnelles pour obtenir la caractéristique directionnelle désirée uniquement en combinant plusieurs transducteurs identiques
Techniques for providing remote attestation at an integrated circuit device are described. The integrated circuit device may include a memory. The integrated circuit device may also include a write bitmap comprising a bitmap that tracks the write addresses of detected memory write operations to the memory. The integrated circuit device may further include a security subsystem configured to send one or more address ranges of interest to the write bitmap and obtain a bitmap status from the write bitmap indicating that a write address within the one or more address ranges of interest was detected.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/71 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information
G06F 21/79 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données dans les supports de stockage à semi-conducteurs, p.ex. les mémoires adressables directement
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
17.
MULTI-TALKER AUDIO STREAM SEPARATION, TRANSCRIPTION AND DIARAIZATION
A plurality of talker embedding vectors may be derived that correspond to a plurality of talkers in an input audio stream. Each talker embedding vector may represent respective voice characteristics of a respective talker. The talker embedding vectors may be generated based on, for example, a pre-enrollment process or a cluster-based embedding vector derivation process. A plurality of instances of a personalized noise suppression model may be executed on the input audio stream. Each instance of the personalized noise suppression model may employ a respective talker embedding vector. A plurality of single-talker audio streams may be generated by the plurality of instances of the personalized noise suppression model. A plurality of single-talker transcriptions may be generated based on the plurality of single-talker audio streams. The plurality of single-talker transcriptions may be merged into a multi-talker output transcription.
Systems and methods are described for implementing a distributed unit in an open radio access network that manages its workload to reduce the risk of missing a radio unit timeslot. A distributed unit may receive data from a centralized unit and transmit the data to a radio unit, which may transmit the data to user devices during fixed timeslots. The distributed unit must therefore transmit data to the radio unit for delivery during each timeslot to prevent "dead air" and potential connectivity issues. The distributed unit thus monitors its workload, determines whether its risk of missing a window for transmitting data to the radio unit satisfies a criterion, and then if necessary reduces its workload until the criterion is no longer satisfied. The distributed unit may communicate with an access and mobility management function or other network component to facilitate workload management.
A network interface adapter can select between a first transport protocol and a second transport protocol to transmit a network packet based on a state of a connection to a destination address for the second transport protocol. The second transport protocol encapsulates the network packet formatted in the first transport protocol. The network interface adapter can automatically use the second transport protocol when the state of the connection is in an active state, and the first transport protocol when the state of the connection is not in the active state.
H04L 69/165 - Implémentation ou adaptation du protocole Internet [IP], du protocole de contrôle de transmission [TCP] ou du protocole datagramme utilisateur [UDP] critères de sélection à cet effet
H04L 69/18 - Gestionnaires multi-protocoles, p.ex. dispositifs uniques capables de gérer plusieurs protocoles
H04L 69/326 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche transport [couche OSI 4]
H04L 69/321 - Protocoles de communication inter-couches ou définitions d'unité de données de service [SDU]; Interfaces entre les couches
H04L 69/168 - Implémentation ou adaptation du protocole Internet [IP], du protocole de contrôle de transmission [TCP] ou du protocole datagramme utilisateur [UDP] spécialement adaptés aux protocoles de couche liaison, p.ex. en mode de transfert asynchrone [ATM], réseau optique synchrone [SONET] ou protocole point à point [PPP]
20.
REAL-TIME LOW-COMPLEXITY STEREO SPEECH ENHANCEMENT WITH SPATIAL CUE PRESERVATION
Real-time low-complexity stereo speech enhancement with spatial cue preservation may be performed. A stereo speech enhancement system receives a stereo input signal (e.g., a left and right input signal). The stereo speech enhancement system estimates spatial cues for a target speaker and downmixes the stereo input signal into a monaural signal. A low-complexity model may then process the monaural signal to generate an enhanced monaural signal. The stereo speech enhancement system upmixes the enhanced monaural signal based on the estimated spatial cues for the target speaker, to generate an enhanced stereo output signal.
Automatic onboarding, management, and control across heterogeneous edge devices of a client network using device abstractions may be performed (e.g., different types of edge devices manufactured by different vendors). A device onboarding and integration service may emulate, by a first device abstraction, an edge device of a client network, where the edge device is a first type of device. The service emulates, by a second device abstraction, the edge device as a second type of edge device (e.g., from a different vendor/uses a different API). The service updates a state of the first device abstraction based on a state of the edge device. The service then updates a state of the emulating, by a second device abstraction, the edge device as a second type of edge device. The second device abstraction sends its updated state to an application at the client network.
H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p.ex. prêt à l’emploi [plug-and-play]
H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p.ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
H04L 67/125 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p.ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance en impliquant la commande des applications des terminaux par un réseau
H04L 41/046 - Architectures ou dispositions de gestion de réseau comprenant des agents de gestion de réseau ou des agents mobiles à cet effet
22.
VALIDATING AND PROVIDING PROACTIVELY GENERATED CODE SUGGESTIONS
Code completion suggestions may be proactively obtained and validated. An event that triggers obtaining a code completion suggestion for inclusion in a code file being edited using an integrated development environment may be detected. The code completion suggestion may be obtained. The characters of the code completion suggestion may be compared with characters added to the code file after the detection of the event that triggered obtaining the code completion suggestion to determine whether the code completion suggestion is valid. A valid code completion suggestion may then be displayed.
G06F 8/33 - Création ou génération de code source Éditeurs intelligents
G06F 3/023 - Dispositions pour convertir sous une forme codée des éléments d'information discrets, p.ex. dispositions pour interpréter des codes générés par le clavier comme codes alphanumériques, comme codes d'opérande ou comme codes d'instruction
23.
MANAGING NETWORK FUNCTION ACCELERATORS FOR RADIO-BASED APPLICATIONS FROM VIRTUALIZED COMPUTING SERVICE CONTROL PLANE
Respective network addresses are assigned to a networking hardware device and a network function accelerator incorporated within an offloading card of a virtualization server by a control plane server of a virtualized computing service. A compute instance is launched at the virtualization server using a virtualization controller of the offloading card. The compute instance executes a network function of a radio-based application in response to a request received using the network address assigned to the hardware device, and requests execution of a second network function at the accelerator. The result of the second network function is sent to a radio unit of the application using the address assigned to the accelerator.
H04L 67/04 - Protocoles spécialement adaptés à la portabilité du terminal
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
24.
SYSTEM FOR ESTABLISHING INITIAL COMMUNICATION WITH SATELLITE SYSTEM
A satellite constellation provides communication between user terminals (UTs) and ground stations that connect to other networks, such as the Internet. Satellites transmit beacon transmissions to particular areas on Earth at particular times. The beacon transmissions include information used by a UT to use a random access channel (RACH) uplink to request communication. Responsive to the request, encryption is established between the satellite and the UT. The satellite may then allocate uplink resources, send data to the UT on a downlink, and so forth. The UT receives additional data about future handovers to other satellites. Based on previously received data the UT may quickly re-establish communication with a satellite after an interruption, such as due to a power outage at the UT. If the previously received data has expired, the UT may again use a beacon transmission.
Various embodiments of apparatuses and methods for multi-cast, multiple unicast, and unicast distribution of messages with time synchronized delivery are described. In some embodiments, the disclosed system and methods include a reference timekeeper providing a reference clock to one or more host computing devices. The one or more host computing devices host compute instances, and also contain respective isolated timing hardware outside the control of the compute instances. The isolated timing hardware of the one or more host computing devices then receive respective packets, and obtain the same time to deliver the respective packets. Each isolated timing hardware provides either the packet, or information to access the packet, to its respective destination compute instance subsequent to determining that the same specified time to deliver the packet has occurred. Thus, the respective packets are delivered near simultaneously to the one or more destination compute instances.
A vehicle data streaming service provides a curated catalog of vehicle attributes and allows a vehicle data stream source to register to the vehicle data streaming system and associate its data stream to a vehicle attribute of the attribute catalog. The vehicle data streaming service also allows vehicle data stream destinations to subscribe to the vehicle attribute in the vehicle catalog, receives streamed vehicle data from the data stream source, and sends streamed vehicle data conforming to registration requirements to the data stream destinations. Additionally, the vehicle data streaming service may allow management of the vehicle attribute catalog and may further manage the registration one or more sources and the subscriptions of one or more destinations.
Techniques for granting, for a device, access to additional functionality requested by user inputs received by the device are described. A system may receive, from a device, a first user input requesting content of a content type requiring additional functionality access in order for the content to be sent to the device. The system may exchange data with an access control system in order to determine the device is capable of performing the additional functionality. The system may prompt the user as to whether the additional functionality access should be granted. In response to receiving a confirmatory user input, the system may cause the access control system to grant the additional functionality access for the device.
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
28.
PACKAGE DELIVERY GUIDANCE AND ASSISTANCE SYSTEM USING VEHICLE SENSOR DATA
Systems, devices, and methods are provided for package delivery guidance and assistance. A vehicle may comprise one or more sensors. A processing unit of the vehicle may determine, based on vehicle data obtained from the one or more sensors, that the vehicle is in a first state, determine that the first state corresponds to a first sub-task of the plurality of sub-tasks, determine a first graphical interface for performance of the first sub-task, present the first graphical interface on a first display screen of the at vehicle, responsive to additional vehicle data obtained from the one or more sensors indicating that the vehicle is in a second state: determine that the second state corresponds to a second sub-task of the plurality of sub-tasks, and update the first display screen with a second graphical interface that is for performance of the second sub-task.
G06Q 50/28 - Logistique, p.ex. stockage, chargement, distribution ou expédition
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
A data guard circuit can be used to verify encryption of the data traffic on a bus between two integrated circuit (IC) devices. The data guard circuit can monitor the data traffic on the bus to analyze the data traffic based on a configuration. The analysis can be performed by sampling the data traffic, and a statistical data pattern can be identified in the sampled data traffic. The statistical data pattern can be compared with a threshold to determine whether the data traffic is encrypted. The data guard circuit can generate a notification if the data traffic is not encrypted as expected so that an appropriate action can be taken to protect the data.
Systems and methods are disclosed for implementing a vehicle shadow service configured to construct and maintain up-to-date vehicle shadows using asynchronously received disaggregated vehicle data. For example, different sensors of a vehicle may provide sensor data into a data stream at different times in a disaggregated manner. A vehicle shadow may be constructed using partial sensor data from a sub-set of sensors of the vehicle, and may be updated or augmented using asynchronously received sensor data from other sensors of the vehicle.
Techniques for generating synthetic data are described. An exemplary approach includes receiving one or more requests to generate synthetic data based on a first dataset; generating the synthetic dataset is generated according to the request by choosing a set of synthetic datapoints between pairs of datapoints of the first dataset along a line connecting them while sampling a likely value of a local probability distribution; and providing the synthetic dataset as configured by the request.
A request to deploy an application is received at a network function management service of a cloud computing environment. Based on an expected geographical distribution of the application, a premise is selected from a set of premises at which computing resource are managed from the cloud computing environment. A virtualized network function of the application is executed at a resource located at the premise.
A plurality of identities may be added to a new policy identity pool associated with new policy generation. Each identity of the plurality of identities may have respective selected permissions associated with permission usage by the identity. A new policy may be generated, based on a set of new policy constraints, that corresponds to a largest group of identities within the new policy identity pool for which the set of new policy constraints is satisfied. The set of new policy constraints may include a first constraint that the new policy includes the respective selected permissions for each identity within the largest group of identities and a second constraint that the new policy does not exceed one or more maximum additional permission thresholds. One or more indications may be provided, to a user, to attach the new policy to each identity within the largest group of identities.
A vehicle data management system and data jurisdiction system manage vehicle data between multiple jurisdictions and enables a set of jurisdiction rules involving rules of various jurisdictions to be applied consistently. The vehicle data jurisdiction system can detect changes in jurisdiction of a vehicle based on various pieces of received vehicle information and applies appropriate jurisdiction rules from a set of jurisdiction rules. Various jurisdictions may have conflicting jurisdiction rules and, in such circumstances, the data jurisdiction system resolves potential conflicts between the rules using a jurisdiction rules resolution workflow. Based on the resolution of the conflict, the data jurisdiction system can migrate data of the vehicle to one or more other jurisdictions, or otherwise implement the correct rules determined by resolving the conflict.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
35.
NETWORK CHANGE VERIFICATION BASED ON OBSERVED NETWORK FLOWS
A network change verification (NCV) system is disclosed for checking whether a proposed configuration change on a network alters the way that the network controls recently observed network flows. In embodiments, the system builds an observed flow control model (OFCM) from logs of recent flows observed in the network. The OFCM, which may be periodically updated based on newly observed flows, provides a compact representation of how individual network flows were ostensibly controlled by the network. When a proposed configuration change is received, the system analyzes the change against the OFCM to check whether the change will alter how the network controls recently observed flows. If so, the proposed change is blocked, and an alert is generated identifying flows that are affected by the change. The NCV system thus prevents network operators from accidentally making changes on the network that will materially alter the behavior of the network.
Systems and methods are described for executing tightly coupled parallel applications on a serverless computing system. A serverless computing system executes user-submitted code in sandboxed environments such as virtual machines or containers. To support execution of parallel applications that require data transfer between instances of the application, the serverless computing system implements an ephemeral mesh network that allows instances of the parallel application to communicate with each other while executing in their respective sandboxes. In some embodiments, a controller or parent application may also connect to the ephemeral mesh network to coordinate execution of the parallel applications. In other embodiments, the parent application may be external to the serverless computing system. The serverless computing system may connect and disconnect sandboxed environments from the ephemeral mesh network as parallel applications start and stop executing, and may remove the network and terminate the parallel applications when the parent application stops executing.
A queue or media queue of music is generated by multiple listeners for playing by one or more devices. Listeners may select music using user interfaces rendered by their respective devices, and rank or vote to determine an order in which the music is played in accordance with the queue or media queue. Where a song or another media entity is accessible at a premium or only with a subscription, and one of the multiple listeners is not authorized to access the song, an unauthorized listener may be invited to purchase a subscription, or a substitute song may be selected for the unauthorized listener. Once a queue or media queue has been generated, music may be played in accordance with the queue or media queue by a single device in the presence of the multiple listeners, or by multiple devices each having any number of listeners within a vicinity.
H04N 21/262 - Ordonnancement de la distribution de contenus ou de données additionnelles, p.ex. envoi de données additionnelles en dehors des périodes de pointe, mise à jour de modules de logiciel, calcul de la fréquence de transmission de carrousel, retardement d
H04N 21/25 - Opérations de gestion réalisées par le serveur pour faciliter la distribution de contenu ou administrer des données liées aux utilisateurs finaux ou aux dispositifs clients, p.ex. authentification des utilisateurs finaux ou des dispositifs clients ou
Execution status of managed time series processing tasks may be tracked. Status of a time series processing task that operations on different portions of a time series may be respectively captured. A request for the status of one of the portions of the time series with respect to the time series processing task may be received. The status may be identified and returned. For failed tasks, a failure reason may be generated by the time series processing system and included in a response with a failure status.
A quantum computing service includes a quality of service (QoS) and out-of-band prioritization module. The QoS and out-of-band prioritization module enforces QoS guarantees for quantum tasks and quantum jobs submitted to the quantum computing service while allowing for processing of the quantum jobs and quantum tasks based on QoS guarantees and not necessarily in an order in which the quantum jobs or quantum tasks are received. Also, the QoS and out-of-band prioritization module determines updated priorities out-of-band based on quantum resource usage information for previously executed quantum tasks such that submittal of pending quantum tasks is not delayed in while update priorities are being determined.
Techniques for certificate authority (CA) selection are described. A certificate management service of a cloud provider network receives a first request to generate a certificate from an electronic device, the first request including an indication of an identity of a user and an identification of a domain name to associate with the certificate. A CA selection policy applicable to the first request is identified, the CA selection policy including a CA selection rule. A CA to generate the certificate is identified by evaluating the CA selection rule, the CA selection rule associates at least a portion of the domain name with the CA. A second request to generate the certificate is sent to the identified CA. The certificate or an identification of the certificate from the CA is returned to the electronic device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Systems and methods are provided for improved 3D garment draping simulation. A garment pattern may be obtained that includes a number of flat, 2D garment panels designated to be connected at seam lines. Triangulated versions of each of the 2D garment panels may then be positioned in 3D virtual space relative to a 3D model of a human body, such that one or more annotated points on each triangulated garment panel are aligned with a corresponding labelled point or region on the 3D body. A warped 3D garment mesh may then be generated by repeatedly applying geometric manipulations to the triangulated garment panels to connect their corresponding seam lines without causing collisions between the triangulated garment panels and the 3D body. This warped 3D garment may then be provided as input to a physics-based draping simulator.
G06T 19/20 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie Édition d'images tridimensionnelles [3D], p.ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
G06T 17/20 - Description filaire, p.ex. polygonalisation ou tessellation
A41H 1/02 - Dispositifs pour la prise des mesures sur le corps
42.
CUSTOMIZED CROSS-PREMISE RESOURCE SELECTION FOR CONTAINERIZED APPLICATIONS
A container management service of a provider network causes a container of an application to be run using resources identified for the application at a premise external to the provider network. A condition under which a container of the application is to be run at a resource at a data center of the provider network is determined. In response to detecting that the condition has been satisfied, a container is run at a resource at a data center of the provider network
Various embodiments of apparatuses and methods for trusted and/or attested packet timestamping are described. In some embodiments, the disclosed system and methods include a reference timekeeper providing a reference clock to host computing devices. The host computing devices host compute instances using a first set of computing resources, and also contain isolated timing hardware utilizing a different set of computing resources. The isolated timing hardware sets a hardware clock based on a signal corresponding to the reference clock from the reference timekeeper. The isolated timing hardware then receives a packet from a particular compute instance, creates a timestamp for the packet based at least in part on the hardware clock, where the timestamp is outside the control of the compute instances, and sends the packet and the timestamp through a data network to transmit to a packet destination.
H04B 7/26 - Systèmes de transmission radio, c. à d. utilisant un champ de rayonnement pour communication entre plusieurs postes dont au moins un est mobile
44.
LOCATION RESTRICTED CONTENT STREAMING TO NON-LOCATION AWARE DEVICES
Disclosed are systems and methods to deliver location restricted content to devices that do not have a location component, such as a Global Positioning System component. A location aware device may send to a content delivery service, location information determined by a location component of the location aware device and receive, from the content delivery service, an encrypted access token. The location aware device may then send the access token to a non-location aware device that is on a same local area network as the location aware device. The non-location aware device may provide the access token to the content delivery service along with a request for location restricted content. The content delivery service may use the access token provided by the non-location aware device to verify that the non-location aware device is within a defined area for which the requested location restricted content is allowed for presentation.
A semiconductor package can include a capacitance die. The package can have multiple dice (e.g., logic die, memory die) mounted on a substrate. Each die can include a power domain. The dice can be distributed on the substrate such that an extra space is present on the substrate between at least some of the dice. For example, an extra space may be present between two dice, at a corner of the substrate, or other locations. The extra space can disrupt a coplanarity of the semiconductor package. The capacitance die can be located in the extra space so as to establish the coplanarity with the other dice. The capacitance die can include a capacitor array electrically coupled to multiple power domains of the plurality of dice.
H01L 23/50 - Dispositions pour conduire le courant électrique vers le ou hors du corps à l'état solide pendant son fonctionnement, p.ex. fils de connexion ou bornes pour des dispositifs à circuit intégré
H01L 25/16 - Ensembles consistant en une pluralité de dispositifs à semi-conducteurs ou d'autres dispositifs à l'état solide les dispositifs étant de types couverts par plusieurs des groupes principaux , ou dans une seule sous-classe de , , p.ex. circuit hybrides
Systems, devices, and methods are provided for facet-based context-aware user interfaces. A system such as an online purchasing system may determine one or more intent contexts based at least in part on one or more user interactions with an online purchasing system associated with a first product. A list of substitute products may be determined based on the intent context and facets associated with the substitute products to provide for a diversity of dimensions along which a user can explore different products.
Disclosed herein are methods for evaluating the efficacy of an immunogenic composition by monitoring circulating tumor DNA. The disclosure also relates to methods for treating a subject having cancer.
Techniques for using a shared encoder and multiple different decoders for natural language understanding (NLU) tasks are described. The individual decoders are configured to perform different tasks using the output from one shared encoder. The decoders can process with respect to different domains and different languages. Using the shared encoder can reduce computation time during runtime. Using the shared encoder can reduce training costs (e.g., time and resources) when the system is updated to incorporate additional intents and entities. The system employs an attention mechanism to extract encoded representation data that can be used by the different decoders for its specific task.
Systems and methods, to efficiently prepare for live and stored file content, implement one or more warm inputs, which actively ingest and demux content, but do not actively decode the content until an input switch is commanded. Each warm input can cache a most recent instantaneous decoder refresh and subsequent reference frames (I-frames and P -frames). Upon an input switch being commanded, the subject input commences decoding of such preserved frames. The formerly-warm input then acts as a hot input (decoding every frame) until the input switch completes. The use of warm inputs, which avoid the decoding stage, reduces computational resource use, allows preparation of all inputs by default, and permits metrics, status reports, and thumbnails to be generated regarding non-active inputs.
H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
H04N 21/426 - Structure de client; Structure de périphérique de client Éléments internes de client
H04N 21/434 - Désassemblage d'un flux multiplexé, p.ex. démultiplexage de flux audio et vidéo, extraction de données additionnelles d'un flux vidéo; Remultiplexage de flux multiplexés; Extraction ou traitement de SI; Désassemblage d'un flux élémentaire mis en paquets
H04N 21/438 - Interfaçage de la voie descendante du réseau de transmission provenant d'un serveur, p.ex. récupération de paquets MPEG d'un réseau IP
H04N 21/44 - Traitement de flux élémentaires vidéo, p.ex. raccordement d'un clip vidéo récupéré d'un stockage local avec un flux vidéo en entrée ou rendu de scènes selon des graphes de scène MPEG-4
H04N 21/845 - Structuration du contenu, p.ex. décomposition du contenu en segments temporels
H04N 21/433 - Opération de stockage de contenu, p.ex. opération de stockage en réponse à une requête de pause ou opérations de cache
A system and method for establishing and using quantum safe enclaves is described. In some embodiments, secure shared randomness is distributed between nodes, for example using quantum key distribution. The secured shared randomness is used to generate quantum safe network keys that enable quantum safe network links to be established between any of the nodes included in the quantum safe enclave. A network manager enforces policies that restrict communications between nodes of the quantum safe enclave to transmission via quantum safe network links. Such an arrangement protects communicated data from quantum enabled attacks that may compromise other forms of encryption.
A system and method for providing quantum entanglement using a hybrid space-fiber quantum network are described. The hybrid space-fiber quantum network includes a communications hub located proximate to an optical ground station and also includes an aerial entangled particle source, such as an entangled photon source attached to a satellite, drone, aircraft, etc. An atmospheric or free-space channel is used to distribute quantum entanglement between optical ground stations that are separated by geographic distances, via the aerial entangled particle source. Also, fiber optic links are connected to the communications hub located proximate to the optical ground station. The communications hub includes optical switches that enable any of the fiber optic links connected to the communications hub to receive or send distributed quantum entanglement to a remotely located recipient endpoint via the atmospheric or free-space channel.
H04B 10/118 - Dispositions spécifiques à la transmission en espace libre, c. à d. dans l’air ou le vide spécialement adaptées aux communications par satellite
52.
VOICE ADAPTATION USING SYNTHETIC SPEECH PROCESSING
A text-to-speech (TTS) system may be configured to imitate characteristics of a target voice based on a limited dataset. The TTS system may include a machine learning model pre-trained using a synthetic parallel dataset and fine-tuned using examples of the target voice. A TTS component trained using a large single-speaker dataset may be used to generate the synthetic parallel dataset based on a multi-speaker dataset. The synthetic parallel dataset may include target audio data representing speech in the multi-speaker dataset and predicted audio data generated by the TTS component based on transcripts of the speech. The machine learning model may be pre-trained using the synthetic parallel dataset and fine-tuned using audio data representing target voice speech and predicted audio generated by the TTS component based on transcripts of the target voice speech. The trained model may be used to modify synthetic speech to approximate the characteristics of the target speech.
G10L 13/04 - Procédés d'élaboration de parole synthétique; Synthétiseurs de parole - Détails des systèmes de synthèse de la parole, p.ex. structure du synthétiseur ou gestion de la mémoire
G10L 13/033 - Procédés d'élaboration de parole synthétique; Synthétiseurs de parole Édition de voix, p.ex. transformation de la voix du synthétiseur
A quantum computing monitoring system may receive a request from user describing an algorithm to be executed using classical and quantum computing resources and a metric to be monitored associated with execution of the algorithm at the quantum computing resources. In execution, the quantum computing monitoring system may cause measurements to be obtained from the quantum computing resources at individual steps of the execution of the algorithm at the quantum computing resources, and the metric to be determined based on the obtained measurements. The quantum computing monitoring system may evaluate the metric with respect to a threshold, and provide an alert to the user responsive to determining that the metric fails to satisfy the threshold. The quantum computing monitoring system may further perform an operation to modify the execution of the algorithm at the quantum computing resources as needed.
G06N 10/60 - Algorithmes quantiques, p.ex. fondés sur l'optimisation quantique ou les transformées quantiques de Fourier ou de Hadamard
G06N 10/80 - Programmation quantique, p.ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiques; Plate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p.ex. informatique quantique en nuage
54.
ON-DEMAND CO-PROCESSING RESOURCES FOR QUANTUM COMPUTING
An algorithm execution management system of a provider network may receive a request from a user for executing an algorithm using different types of computing resources, including classical computing resources and quantum computing resources. The request may indicate a container that includes the algorithm code and dependencies such as libraries for executing the algorithm. The algorithm execution management system may first determine that the quantum computing resources are available to execute the algorithm, and then cause the classical computing resources to be provisioned. The algorithm execution management system may cause at least one portion of the algorithm to be executed at the classical computing resources using the container indicated by the user, and at least another portion of the algorithm to be executed at the quantum computing resources. The quantum task of the algorithm may be provided a priority during execution of the algorithm for using the quantum computing resources.
G06N 10/80 - Programmation quantique, p.ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiques; Plate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p.ex. informatique quantique en nuage
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
55.
QUANTUM COMPUTING PROGRAM COMPILATION USING CACHED COMPILED QUANTUM CIRCUIT FILES
A quantum computing service may store, in a cache, one or more compiled files of respective quantum functions included in one or more quantum computing programs received one or more customers. When the quantum computing service receives another quantum computing program, from the same or a different customer, the quantum computing service may determine whether the quantum computing program may include one or more of the quantum functions corresponding to the compiled files in the cache. If so, the quantum computing service may use the compiled files in the cache to compile the quantum computing program.
G06N 10/80 - Programmation quantique, p.ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiques; Plate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p.ex. informatique quantique en nuage
56.
LIMITING USE OF ENCRYPTION KEYS IN AN INTEGRATED CIRCUIT DEVICE
A host device may include an interconnect, a host memory, and a set of processor cores. A processor core may execute a VM assigned to a cryptographic key and may send a request to access a physical address in the host memory toward the interconnect. An enforcer device may receive the request and extract a key identifier from the request. The enforcer device may determine whether to allow the request to access the physical address via the interconnect based on the key identifier and a list of allowed keys stored on the enforcer device. If the enforcer device determines to not allow the request to access, the enforcer device may modify the physical address and/or the key identifier of the request.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A device is configured to detect multiple different wakewords. A device may operate a joint encoder that operates on audio data to determine encoded audio data. The device may operate multiple different decoders which process the encoded audio data to determine if a wakeword is detected. Each decoder may correspond to a different wakeword. The decoders may use fewer computing resources than the joint encoder, allowing for the device to more easily perform multiple wakeword processing. Enabling / disabling wakeword(s) may involve the reconfiguring of a wakeword detector to add / remove data for respective decoder(s).
A system may include a first acoustic event detection (AED) component configured to detect a predetermined set of acoustic events, and include a second AED component configured to detect custom acoustic events that a user configures a device to detect. The first and second AED components are configured to perform task-specific processing, and may receive as input the same acoustic feature data corresponding to audio data that potentially represents occurrence of one or more events. Based on processing by the first and second AED components, a device may output data indicating that one or more acoustic events occurred, where the acoustic events may be a predetermined acoustic event and/or a custom acoustic event.
G10L 25/51 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
Systems and methods for contextual awareness in dynamic device groups are disclosed. For example, a dynamic device group may be generated while output of content is occurring. When a user provides user input to alter the output of the content, contextual data indicating the devices in the dynamic device group when the user input is received may be generated and utilized by an application to determine which devices are to receive a command to perform an action responsive to the user input.
H04N 21/43 - Traitement de contenu ou données additionnelles, p.ex. démultiplexage de données additionnelles d'un flux vidéo numérique; Opérations élémentaires de client, p.ex. surveillance du réseau domestique ou synchronisation de l'horloge du décodeur; Intergiciel de client
H04N 21/442 - Surveillance de procédés ou de ressources, p.ex. détection de la défaillance d'un dispositif d'enregistrement, surveillance de la bande passante sur la voie descendante, du nombre de visualisations d'un film, de l'espace de stockage disponible dans l
H04N 21/436 - Interfaçage d'un réseau de distribution local, p.ex. communication avec un autre STB ou à l'intérieur de la maison
Systems and methods are described for a multi-tenant mode of a serverless code execution system. For instance, a method may include maintaining a set of execution environments, wherein each execution environment is associated with a serverless function, wherein the serverless function is associated with a software as a service (SaaS) provider that is a tenant of a cloud services provider, wherein the SaaS provider provides services to sub-tenants, wherein the set of execution environments are partitioned based on sub-tenants of the SaaS provider; receiving a call to execute a serverless function, wherein the call includes a serverless function identifier and a sub-tenant identifier; identifying a sub-tenant-specific execution environment of the set of execution environments that is associated with the sub-tenant; and in response to identifying the tenant-specific execution environment, invoking the serverless function on the sub-tenant-specific execution environment.
A system and method for providing quantum entanglement as a service are described. Intermediate nodes which may be located in trusted or trustless locations are used to distribute quantum entanglement to endpoints, such as endpoints of customers of a quantum entanglement distribution service. The distributed quantum entanglement provides a secure communication path that does not rely on trust placed in an infrastructure or software provider. To distribute the quantum entanglement, intermediate nodes comprising quantum memories are used. Joint measurements are performed on quantum particles of respective entangled quantum pairs received at the intermediate nodes without collapsing superposition states of the particles. This allows for the quantum entanglement to be extended across intermediate nodes while maintaining entanglement and superposition of the entangled quantum particles.
Disclosed are various embodiments for provisioning radio-based networks with locality rules. In one embodiment, at least one locality rule associated with an organization is accessed. The locality rule(s) require that at least a subset of network traffic for a radio-based network remain within a particular geographic area. The radio-based network includes a radio access network and an associated core network. A topology for the radio-based network is determined based at least in part on the locality rule(s). The radio-based network is provisioned or reconfigured for the organization to have the topology complying with the at least one locality rule.
H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p.ex. prêt à l’emploi [plug-and-play]
H04L 41/122 - Découverte ou gestion des topologies de réseau des topologies virtualisées, p.ex. les réseaux définis par logiciel [SDN] ou la virtualisation de la fonction réseau [NFV]
H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/50 - Fourniture de services ou reconfiguration de services
H04W 28/00 - Gestion du trafic du réseau; Gestion des ressources du réseau
H04L 45/12 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données Évaluation de la route la plus courte
H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p.ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
H04L 41/0896 - Gestion de la bande passante ou de la capacité des réseaux, c. à d. augmentation ou diminution automatique des capacités
H04L 41/0897 - Capacité à monter en charge au moyen de ressources horizontales ou verticales, ou au moyen d’entités de migration, p.ex. au moyen de ressources ou d’entités virtuelles
H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p.ex. entités SDN ou NFV
H04L 41/5054 - Déploiement automatique des services déclenchés par le gestionnaire de service, p.ex. la mise en œuvre du service par configuration automatique des composants réseau
H04L 43/0811 - Surveillance ou test en fonction de métriques spécifiques, p.ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant la connectivité
H04L 43/0876 - Utilisation du réseau, p.ex. volume de charge ou niveau de congestion
H04L 43/20 - Dispositions pour la surveillance ou le test de réseaux de commutation de données le système de surveillance ou les éléments surveillés étant des entités virtualisées, abstraites ou définies par logiciel, p.ex. SDN ou NFV
63.
TECHNIQUES FOR PROVIDING A SEARCH INTERFACE WITHIN A CAROUSEL
Techniques are described herein for providing search features within a carousel. A request may be received to display a network page (e.g., user profile page). The carousel may present a subset of items of a set of items (e.g., items associated with user profile). User input indicating a scrolling action within the carousel can be received. In response, a user interface (UI) element associated with conducting a search may be presented in an expanded form overlaid atop the carousel. After a predefined period of time has elapsed, the user interface element may transition to a collapsed form. If the user interface element is selected, the user may be navigated to the end of the carousel where a statically-positioned presentation of the user interface element is presented. A search may be conducted from the statically-positioned presentation. The search may be performed against the set of items associated with the user profile.
Techniques are described for enabling users of a certificate management service to create certificate issuance policies that can be applied to certificate issuance requests across both public and private certificate authorities (CAs) and other certificate-related services. According to embodiments described herein, a certificate issuance policy includes one or more certificate issuance rules to be applied to requests associated with one or more specified user accounts or roles for certificate-related resources (e.g., public certificates, private certificates, etc.). The application of a certificate issuance rule can be conditioned on a particular request context (e.g., based on a user account or role associated with a request, a type of certificate requested, a subject name identified in the request, etc.) and can specify a wide range of actions to be performed on requests matching a rule (e.g., allowing or denying a request, modifying one or more parameters of the request, etc.).
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
65.
SYSTEMS FOR ENABLING ACCESS TO A SHIPPING BENEFIT FROM SELLER CONTENT
A seller provides customers with the ability to order items using shipping benefits associated with a separate fulfillment entity, such as an online store, by providing inventory to a designated fulfilment location. When a customer accesses the webpage, identifiers for the customer device and item are used to determine an estimated delivery time the separate fulfillment entity may provide, which may be presented in a widget or other type of element within the webpage. In response to input to the element, the customer may be presented with a prompt for authentication data, and after a successful authentication, the estimated delivery time may be updated based on a location of the authenticated customer. In response to input confirming the transaction, an order for the item is generated by the separate fulfillment entity and the customer may continue navigating the seller website.
Systems and methods are provided for management of network segments that cross geographic regions and/or other types of network divisions in a cloud-based network environment. A cloud-based network provider's geographically-dispersed network infrastructure may serve as the core of a client's private wide area network, and the client may define isolated segments to which other networks (virtual private clouds, virtual private networks, etc.) may be attached. The various segments may remain logically isolated from each other even when implemented across some or all of the same regions—and using the same physical and/or virtual routing components—as other segments of the same client and/or other clients.
A networking manager of an extension server of a virtualized computing service detects that a data link layer frame has been obtained at the extension server. The networking manager delivers at least a portion of contents of the frame to a compute instance running at the extension server in response to determining that a destination media access control (MAC) address of the frame matches a MAC address of a local-premise-access virtual network interface attached to the compute instance. The local-premise-access virtual network interface is not assigned an Internet Protocol (IP) address from a range of IP addresses managed by the virtualized computing service.
A system comprising one or more computing devices implements a vehicle information extraction service. The vehicle information extraction service enables customers to maintain a model of a fleet of vehicles and collect vehicle information from heterogenous vehicles included in the fleet, wherein the vehicles are configured with different in-vehicle communication configurations. The vehicle information extraction service automatically generates scheme packets for data collection to be sent to the heterogenous vehicles, wherein are formatted in accordance with the different respective in-vehicle communication configurations of the heterogenous vehicles, without the customer of the vehicle information extraction service having to account for these differences.
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
G08G 1/123 - Systèmes de commande du trafic pour véhicules routiers indiquant la position de véhicules, p.ex. de véhicules à horaire déterminé
G08G 1/00 - Systèmes de commande du trafic pour véhicules routiers
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
G08G 1/01 - Détection du mouvement du trafic pour le comptage ou la commande
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
69.
MACHINE LEARNING USING SERVERLESS COMPUTE ARCHITECTURE
A serverless computing system is configured to provide access to a machine learning model by at least associating an endpoint, comprising code that accesses the machine learning model, with an extension that interfaces between a serverless compute architecture and the endpoint. A request to perform an inference is received by the system and processed by using the serverless compute architecture to execute a compute function. The compute function cases the extension to interface with the endpoint to cause the machine learning model to perform the inference.
Idle periods may be for management actions at processing clusters for managed databases. A leader node of a processing cluster for a managed database may monitor a network endpoint at a proxy service associated with a database managed by the database service. An idle period for the database may be detected. A management action for the processing cluster may be determined to be performed during the detected idle period. The leader node may cause the determined management action to be performed.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06F 16/21 - Conception, administration ou maintenance des bases de données
A system comprising one or more computing devices implements a vehicle information extraction service. The vehicle information extraction service enables customers to optimize an amount of relevant vehicle sensor information extracted from vehicles by reducing instances of collection of redundant data. The vehicle information extraction service additionally, or alternatively, enables customers to maintain a model of a fleet of vehicles and determine number of the vehicles of the fleet in a certain partition to calculate a data reduction factor that will filter out sensor data. The vehicle information extraction service communicates the reduction factor to the vehicles in the geographical region using a vehicle scheme to indicate to the vehicles the probability with which the vehicle is to transmit a particular type of sensor data.
H04W 4/40 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons
G08G 1/123 - Systèmes de commande du trafic pour véhicules routiers indiquant la position de véhicules, p.ex. de véhicules à horaire déterminé
G08G 1/00 - Systèmes de commande du trafic pour véhicules routiers
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
G08G 1/01 - Détection du mouvement du trafic pour le comptage ou la commande
72.
FAST DATABASE SCALING UTILIZING A DECOUPLED STORAGE AND COMPUTE ARCHITECTURE
Techniques for fast online scaling of a database via a split architecture including decoupled storage and compute tiers in a database service are described. A cluster of database (DB) nodes is scaled to add a new DB node. The scaling includes determining a split for data of a first volume managed by an existing DB node. A second DB node is obtained, and the first volume is cloned according to a lightweight copy technique to yield a second volume for use by the second DB node. After the cloning, a set of database modifications are applied to the second volume based on modifications caused by database traffic received by the first DB node, involving the volume, during the cloning of the first volume. Each DB node may drop the portion of the volume that it does not need according to the split.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
73.
EXTENDING CLOUD-BASED VIRTUAL PRIVATE NETWORKS TO USER EQUIPMENT ON RADIO-BASED NETWORKS
Disclosed are various embodiments for extending cloud-based virtual private networks to user equipment on radio-based networks. In one embodiment, a request is received from a client device for service from a radio-based network. The client device is provided with access to a virtual private cloud network through the radio-based network in response to receiving the request from the client device for service from the radio-based network. Encapsulated network traffic is forwarded from the client device to the virtual private cloud network via a network link between the radio-based network and a cloud provider network that hosts one or more resources on the virtual private cloud network.
Techniques for building, validating, and utilizing custom database software in a shared management environment are described. A database customization service allows users to provide database installation files as part of a configuration to generate a custom database engine version. The creation of custom database engine versions may be governed by policy, and the database customization service may provide recommendations for creating custom database engine versions according to various criteria. The custom database engine version can be built, and its functionality and correctness verified. Users may launch database instances using these custom database engine versions that can be managed under a shared management scheme where both users and the database customization service can perform host-level management.
A PCR testing module (100) that includes a housing having a PCR machine (106) disposed therein; a sample input station (104) on the housing, wherein the sample input station is configured to receive a sample collection device (SCD) comprising a biological specimen sample provided by the patient; an SCD processing mechanism configured to transfer a lysed microportion of the biological specimen sample into a PCR sample tube (308, 507, 1104, 1204, 1302) attached to the SCD; at least one mechanism configured to separate the PCR sample tube (308, 507, 1104, 1204, 1302) from the SCD and transfer the PCR sample tube to the PCR machine (106); and a controller configured to (i) use the PCR machine (106) to conduct a PCR test on contents of the PCR sample tube (308, 507, 1104, 1204, 1302), and (ii) generate results of the PCR test.
A61B 10/00 - Autres méthodes ou instruments pour le diagnostic, p.ex. pour le diagnostic de vaccination; Détermination du sexe; Détermination de la période d'ovulation; Instruments pour gratter la gorge
B01L 3/00 - Récipients ou ustensiles pour laboratoires, p.ex. verrerie de laboratoire; Compte-gouttes
C12M 1/30 - Inoculateur ou échantillonneur incorporé au récipient l'échantillonneur étant un tampon
C12M 1/00 - Appareillage pour l'enzymologie ou la microbiologie
C12Q 1/686 - Réaction en chaine par polymérase [PCR]
G01N 1/02 - Dispositifs pour prélever des échantillons
G01N 1/38 - Dilution, dispersion ou mélange des échantillons
G01N 35/04 - Analyse automatique non limitée à des procédés ou à des matériaux spécifiés dans un seul des groupes ; Manipulation de matériaux à cet effet en utilisant une série de récipients à échantillons déplacés par un transporteur passant devant un ou plusieurs postes de traitement ou d'analyse - Détails du transporteur
G01N 35/00 - Analyse automatique non limitée à des procédés ou à des matériaux spécifiés dans un seul des groupes ; Manipulation de matériaux à cet effet
Light weight ophthalmic lenses include a curved back lens attached to a curved front lens assembly having a functional element. An ophthalmic lens includes a curved front lens assembly and a curved back lens. The curved front lens assembly has an essentially constant thickness, forms an external world-side convex surface of the ophthalmic lens, and includes a functional element operable to modify an image of a real world scene viewed via the ophthalmic lens. The curved back lens forms an external user-side surface of the ophthalmic lens, has a world-side convex surface that is shaped complementary to and interfaced with the front lens assembly, and provides a prescribed vision correction.
Described herein are systems and techniques for implementing a third-party item tracking and payment system that enables a user to walk out without a manual checkout process. The techniques include receiving user identifying information associated with a payment account and conveying an identifier of the account to a management system of the retailer. Items, as selected by the user, are added to a virtual cart that is checked out automatically when the user exits the store and the third party system communicates the cart contents to the retailer for cost calculation and then instructs payment using the stored payment information without disrupting existing inventory and account management systems.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
A quantum computing service includes a quantum circuit compilation module that uses received information about quantum processing units (QPUs) along with information about a quantum circuit to be compiled in order to generate an optimized ordered list of compilation passes to be performed to compile the quantum circuit for execution on a given QPU.
G06N 10/80 - Programmation quantique, p.ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiques; Plate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p.ex. informatique quantique en nuage
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p.ex. couplage ou commande de qubit
Described are systems and methods to determine one or more body dimensions of a body based on a processing of one or more two-dimensional images that include a representation of the body. Body dimensions include any length, circumference, etc., of any part of a body, such as shoulder circumference, chest circumference, waist circumference, hip circumference, inseam length, bicep circumference, leg circumference, etc.
Techniques for a distributed data processing application service in a cloud provider network are described. A virtual machine bundle is obtained, the virtual machine bundle including a copy of a memory and one or more registers of a paused virtual machine executing a distributed data processing application runtime. A request to launch a virtual machine to execute a distributed data processing application runtime is received, the request to launch the virtual machine including a bundle identifier that identifies the virtual machine bundle. The virtual machine is launched based at least in part on the virtual machine bundle. The virtual machine sends a message to register the virtual machine with a cluster of virtual machines.
Disclosed are various embodiments for a container execution environment. In one embodiment, a container is executed in a virtual machine instance running on a computing device. A container control plane is executed separately from the virtual machine instance in an off-load device operably coupled to the computing device via a hardware interconnect interface. The container is managed using the container control plane executing on the off-load device.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 9/46 - Dispositions pour la multiprogrammation
82.
TRANSLATING BETWEEN VERSIONS OF DATA OBJECT SCHEMAS FOR DATA PRODUCERS AND DATA CONSUMERS
Translations between versions of data object schemas may be performed between data object producers and data object consumers. A request to update a data object may be an update according to an additional version of a schema applicable to the data object from an existing version of a schema. The data object may be provided by one component of a distributed system. A trigger event may be detected to send the data object to a different component of the distributed system. The data object may be translated from the additional version to the existing version and sent to the different component.
Disclosed are various embodiments for customer-defined capacity limit plans in communication networks. In one embodiment, a request for a service from a radio-based network is received from a first client device. A network function in the radio-based network is determined to be at a capacity limit. Service from the network function to a second client device to the network function is suspended in response to determining that the network function in the radio-based network is at the capacity limit and based at least in part on a rule set specific to the radio-based network. The first client device is provided access to the network function instead of the second client device.
H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles
H04W 48/00 - Restriction d'accès; Sélection de réseau; Sélection de point d'accès
H04L 47/76 - Contrôle d'admission; Allocation des ressources en utilisant l'allocation dynamique des ressources, p.ex. renégociation en cours d'appel sur requête de l'utilisateur ou sur requête du réseau en réponse à des changements dans les conditions du réseau
H04L 47/74 - Mesures pour pallier la non-disponibilité des ressources
H04L 47/24 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS
H04L 47/80 - Actions liées au type d'utilisateur ou à la nature du flux
H04L 47/70 - Contrôle d'admission; Allocation des ressources
H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p.ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p.ex. entités SDN ou NFV
H04L 43/20 - Dispositions pour la surveillance ou le test de réseaux de commutation de données le système de surveillance ou les éléments surveillés étant des entités virtualisées, abstraites ou définies par logiciel, p.ex. SDN ou NFV
Techniques for compressing a neural network model by mixing compression ratios (sparsity patterns) are described. The weight tensor of a neural network model is divided into weight groups. The pruning cost of compressing the weight values according to a compression ratio is determined for each weight group, and a pruning cost distribution for the compression ratio is generated from the pruning costs of the weight groups. A cost threshold can then be selected from the pruning cost distribution, and weight groups having a pruning cost below the selected cost threshold are compressed according to the compression ratio. The remaining weight groups can be compressed using one or more less aggressive compression ratios. The cost threshold can be adjusted to tune the overall sparsity and accuracy of the compressed neural network.
G06N 3/044 - Réseaux récurrents, p.ex. réseaux de Hopfield
G06N 3/0442 - Réseaux récurrents, p.ex. réseaux de Hopfield caractérisés par la présence de mémoire ou de portes, p.ex. mémoire longue à court terme [LSTM] ou unités récurrentes à porte [GRU]
G06N 3/063 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens électroniques
Extensible change control management for development and deployment of applications is described. A change control manager may register plugin components, including requester, approver and performer components, to process changes to a resource of a resource type, where registering is performed responsive to request(s) received via programmatic interface(s). Upon receiving a change request from the requester component, the change control manager may send the change request to the approver component to approve the change request and, responsive to notification of approval from the approver component, the change control manager may then send the change request to the performer component to implement the requested change. The change control manager and the various components each send and/or receive change requests encoded in a standardized schema for the resource type, the standardized schema independent of the implementation of the resource and the means of implementing changes to the resource by the performer component.
A computer system may receive a request that includes a requested weight quantity of an item and identifies the item. The computer system may use this information to lookup correlating information for the item. The correlating information may correlate item weight with item quantity. The computer system may use the correlating information and the weight quantity to determine a corresponding numerical quantity of the item. A visual indicator that represents the numerical quantity of the item may be presented in a user interface to provide context for how the requested weight quantity translates to the numerical quantity.
Technologies are disclosed for reconciliating payment transactions performed by a payment service provider. Instead of reconciling the payment transactions in a serial manner, a reconciliation service performs payment reconciliation in a distributed manner among different reconciliation processes within a service provider network such that payment reconciliation for payment transactions can be distributed between a number of different reconciliation processes. Remittance data received from a payment service provider and deposit data received by a financial institution may be used by the reconciliation processes to perform payment reconciliation. The payment reconciliation processes may be performed within a selected geographic region in order to satisfy different reconciliation requirements/regulations.
System and methods are provided for detecting, tracking, and managing outages of transaction processors. An indication is received indicating a potential outage associated with a transaction processor computer configured to process transactions of an online retail website. The indication can be received from a threshold monitoring service and/or from a machine-learning detection system. A computing service can be initiated to confirm and track the outage over time. An outage may include a number of situations in which the transaction processor fails to process transactions according to a set of predefined processing parameters. If the outage spans a particular time period, the service can perform a number of remedial actions (e.g., notifying an administrator of the outage, etc.).
A system for providing a geofence service is disclosed. The geofence service receives an encrypted geospatial index for a specified geofence based on application of a hash function to respective ones of a plurality of locations for the specified geofence in accordance with a secret key that is unknown to the geofence service. The geofence service stores the encrypted geospatial index to a data store according to a geofence identifier for the specified geofence. The geofence service receives an encrypted device location identifier generated based on application of the hash function to a representation of a current location of a user device in accordance with the secret key. The geofence service determines whether the user device is located in a location of the plurality of locations based on a query of the encrypted geospatial index according to the encrypted device location identifier.
Systems, devices, and methods are provided for secure multiparty computation (MPC) protocols. A first computing entity may send a first cryptographically protected data set to a server and a second computing entity may send a second cryptographically protected data set to the server. The server may lack access to plaintext versions of the data sets. The server may compare cryptographically protected data elements from the first and second data sets as part of a secure MPC protocol to determine certain information regarding the data sets, such as determining which data elements are included in both sets, and perform homomorphic computations according to a homomorphic encryption scheme. The server is accordingly able to determine an encrypted result.
A system is disclosed allowing a buyer to directly build a shopping cart(s) on a supplier's portal (such as website, applications) without initiating any shopping request from company's network or system (such as eProcurement system). A standard cXML document can be used to transmit a Punchout Order Message (POOM) address to a customer system where the POOM can be retrieved. Additionally, a buyer identifier (e.g., an email address) can be included in the cXML document so that the customer system can verify the buyer making purchases. An address is returned to the supplier's portal, which can be used by the buyer to complete the purchase. In one example, the address directs the buyer to log into the customer system to verify the purchase.
Systems and methods are provided to perform multiply-accumulate operations of reduced precision numbers in a systolic array. Each row of the systolic array can receive reduced inputs from a respective reducer. The reduced input can include a reduced input data element and/or a reduced weight. The systolic array may lack support for inputs with a first bit-length and the reducers may reduce the bit-length of a given input from the first bit-length to a second shorter bit-length and provide the reduced input to the array. In order to reduce the bit-length, the reducer may reduce the number of trailing bits of the input. Further, the systolic array can receive a reduced and rounded input. The systolic array can propagate the reduced input through the processing elements in the systolic array. Each processing element may include a multiplier and/or an adder to perform arithmetical operations based on the reduced input.
G06F 7/483 - Calculs avec des nombres représentés par une combinaison non linéaire de nombres codés, p.ex. nombres rationnels, système de numération logarithmique ou nombres à virgule flottante
G06F 7/544 - Méthodes ou dispositions pour effectuer des calculs en utilisant exclusivement une représentation numérique codée, p.ex. en utilisant une représentation binaire, ternaire, décimale utilisant des dispositifs non spécifiés pour l'évaluation de fonctions par calcul
A satellite provides communication between user terminals (UTs) and ground stations that connect to other networks, such as the Internet. Because the satellite is within range of many UTs at any given time, many UTs are in contention to use an uplink to send upstream data to the satellite. This saturates a random-access channel (RACH) on the uplink. When a UT has data to uplink, it sends a short buffer data status (SBDS) message using the RACH. The minimal size of the SBDS facilitates use of a non-orthogonal multiple access uplink. Based on the SBDS, the satellite allocates a grant to the UT to use the uplink. Additional messages from the UT involving buffer status may be sent using the granted uplink. Unsolicited grants may be issued to the UT based on analysis of uplink and downlink traffic. If needed, the RACH may still be used to request additional grants.
A new type system may be added to a type registry for a data processing service. A request to add the new type system may be received that describes the new type system for a data store. The new type system may be used to perform a data processing job that accesses the data store to obtain or store data as a source or target data store.
A message-level policy implemented with for a message routing system may be used to mediate between a variety of message sources and message targets that receive and use messages. The message-level policy may allow fine grained message-by-message policy assessment that a message routing system policy may be able to provide. The message-level policy may furthermore interact with the message routing system policy to provide mechanisms to avoid accidental leakage of protected messages or spill-over to protected regions.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p.ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
96.
MAKING DECISIONS FOR PLACING DATA IN A MULTI-TENANT CACHE
Placement decisions may be made to place data in a multi-tenant cache. Usage of multi- tenant cache nodes for performing access requests may be obtained. Usage prediction techniques may be applied to the usage to determine placement decisions for data amongst the multi-tenant cache nodes. Placement actions for the data amongst at the multi-tenant cache nodes may be performed according to the placement decisions.
Systems and methods are described for rotating keys in a trust store to be used by a group of peer devices for secure communications between the peers in the group. In some examples, a service, such as an identify authority service, may make a determination that a set of peers that individually trust at least one public key from a group of public keys satisfies a set of conditions. As a result of the determination, the service may update the plurality of public keys by at least removing at least one public key from the group of public keys and indicate the updated plurality of public keys to at least one of the peers in the group. The service may remove the at least one public key from the group upon determining that less than a threshold number of peers in the group use the at least one public key.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
98.
INTERFACES FOR CREATING RADIO-BASED PRIVATE NETWORKS
Disclosed are various embodiments for interfaces for creating radio-based private networks. In one embodiment, a request is received via an interface to create a radio-based private network for a customer. The request indicates a quantity of wireless devices that will connect to the radio-based private network. A quantity of radio units to serve the radio-based private network is determined based at least in part on the quantity of wireless devices. The radio units are preconfigured to implement a radio access network for the radio-based private network. A shipment is initiated to the customer of the radio units that have been preconfigured. Resources in a cloud provider network are provisioned to function as a core network for the radio-based private network.
Techniques for automated alignment of image capture of physical ailments are described. A method of automated alignment of image capture of physical ailments includes determining an alignment class of a first image of an object using an alignment classifier executing on a user device, providing alignment instructions based on the alignment class and a reference image associated with the object using at least one machine learning model executing on the user device, obtaining an aligned image of the object after the user device has been repositioned relative to the object based on the alignment instructions, and sending the aligned image to an agent device via a telemedicine service of a provider network.
G16H 40/63 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santé; TIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour le fonctionnement d’équipement ou de dispositifs médicaux pour le fonctionnement local
G16H 30/40 - TIC spécialement adaptées au maniement ou au traitement d’images médicales pour le traitement d’images médicales, p.ex. l’édition
G16H 80/00 - TIC spécialement adaptées pour faciliter la communication entre les professionnels de la santé ou les patients, p.ex. pour le diagnostic collaboratif, la thérapie collaborative ou la surveillance collaborative de l’état de santé
100.
STREAMING ANALYTICS USING A SERVERLESS COMPUTE SYSTEM
Systems and methods are described implementing streaming analytics on a serverless compute system. A user can specify a data stream against which analytics should be conducted, serverless functions to be used to conduct the analysis, and criteria for the analytics, such as windowing criteria and aggregation criteria. The windowing criteria can specify windows of items within the stream that should be collectively analyzed. The aggregation criteria can specify how to group items within each window during analysis. A poller device can read data items from the stream, window and group the items according to the windowing and aggregation criteria, and invoke serverless functions to conduct streaming analytics on the data items. The poller device can further maintain state between invocations.