-
公开(公告)号:US20210119962A1
公开(公告)日:2021-04-22
申请号:US17134285
申请日:2020-12-26
摘要: Systems and methods may be used to provide neutral host edge services in an edge network. An example method may include generating a virtual machine for a communication service provider at a compute device. The method may include receiving a user packet originated at a user device associated with the communication service provider and identifying dynamic route information related to the user packet using the virtual machine corresponding to the communication service provider. Data may be output corresponding to the user packet based on the dynamic route information.
-
公开(公告)号:US20210117864A1
公开(公告)日:2021-04-22
申请号:US17133075
申请日:2020-12-23
申请人: John Charles Weast , Rajesh Poornachandran , Hassnaa Moustafa , Rita H. Wouhaybi , Francesc Guim Bernat , Marcos E. Carranza
发明人: John Charles Weast , Rajesh Poornachandran , Hassnaa Moustafa , Rita H. Wouhaybi , Francesc Guim Bernat , Marcos E. Carranza
摘要: Various systems and methods for customizing training data for an artificial intelligence (AI) or machine-learning (ML) model are disclosed. A set of data is identified from a plurality of sets of data used to train the AI or ML model. The set of data is identified based on a set of metadata associated with the set of data indicating an association between the set of data and a jurisdiction of a digital services tax (DST). Based on the identifying, the plurality of sets of data is modified by removing or reducing reliance upon the set of data. The AI or ML model is retrained based on the modified plurality of sets of data. The retrained AI or ML model is provided for deployment in an individual autonomous agent.
-
公开(公告)号:US20210117697A1
公开(公告)日:2021-04-22
申请号:US17134291
申请日:2020-12-26
申请人: Francesc Guim Bernat , Karthik Kumar , Rita H. Wouhaybi , Marcos E. Carranza , Cesar Martinez-Spessot
发明人: Francesc Guim Bernat , Karthik Kumar , Rita H. Wouhaybi , Marcos E. Carranza , Cesar Martinez-Spessot
摘要: Various aspects of methods, systems, and use cases include coordinate operations based on event occurrence. A method may include processing a captured image to determine whether an event has occurred. The method may include detecting that the event has occurred by comparing an attribute of the image with a selected criterion, and sending, in response to detecting the event, an activation function to a network interface component (NIC). The NIC may be at a remote device, such as in an edge appliance, in a remote image capture device, or the like. The activation function may activate a bit-stream corresponding to the event, such as to activate an accelerator.
-
公开(公告)号:US20210109584A1
公开(公告)日:2021-04-15
申请号:US17132202
申请日:2020-12-23
摘要: Various aspects of methods, systems, and use cases include coordinating actions at an edge device based on power production in a distributed edge computing environment. A method may include identifying a long-term service level agreement (SLA) for a component of an edge device, and determining a list of resources related to the component using the long-term SLA. The method may include scheduling a task for the component based on the long-term SLA, a current battery level at the edge device, a current energy harvest rate at the edge device, or an amount of power required to complete the task. A resource of the list of resources may be used to initiate the task, such as according to the scheduling.
-
95.
公开(公告)号:US20180089044A1
公开(公告)日:2018-03-29
申请号:US15277522
申请日:2016-09-27
摘要: Technologies for providing network interface support for remote memory and storage failover protection include a compute node. The compute node includes a memory to store one or more protected resources and a network interface. The network interface is to receive, from a requestor node in communication with the compute node, a request to access one of the protected resources. The request identifies the protected resource by a memory address. Additionally, the network interface is to determine an identity of the requestor node and determine, as a function of the identity and permissions data associated with the memory address, whether the requestor node has permission to access the protected resource. Other embodiments are described and claimed.
-
公开(公告)号:US20240348606A1
公开(公告)日:2024-10-17
申请号:US18754752
申请日:2024-06-26
申请人: Stephen T. Palermo , Valerie J. Parker , Patrick L. Connor , Francesc Guim Bernat , John Joseph Browne , Rajesh Poornachandran , Marcos E. Carranza
发明人: Stephen T. Palermo , Valerie J. Parker , Patrick L. Connor , Francesc Guim Bernat , John Joseph Browne , Rajesh Poornachandran , Marcos E. Carranza
IPC分类号: H04L9/40
CPC分类号: H04L63/0876
摘要: Various approaches for the verification of 5G networks, including the use of fingerprint-based IQ measurements for authentication and integrity monitoring, are discussed. In an example, a method of using fingerprints for authentication of network use includes: capturing in-phase and quadrature (IQ) data from a network connection between a user equipment (UE) and a 5G network; performing authentication of the network connection between the UE and the 5G network, by using a symbol of the IQ data as a random factor for the authentication; and monitoring the IQ data on an ongoing basis to verify the network connection between the UE and the 5G network. The method may also include creating a baseline IQ measurement from the IQ data when performing the authentication between the UE and the 5G network, and monitoring the IQ data by using a comparison of an ongoing IQ measurement to the baseline IQ measurement.
-
公开(公告)号:US20240134648A1
公开(公告)日:2024-04-25
申请号:US18398107
申请日:2023-12-27
CPC分类号: G06F9/3017 , G06F15/8038
摘要: In one embodiment, an apparatus includes a plurality of processing cores, where each processing core is capable of executing at least one of a subset of an instruction set architecture (ISA). The apparatus also includes hardware circuitry to determine, during runtime, whether a thread comprising instructions of a particular ISA subset can execute on a particular processing core, and based on the determination, indicate a capability of the thread to be executed on the particular processing core in subsequent executions.
-
公开(公告)号:US20230124192A1
公开(公告)日:2023-04-20
申请号:US18069751
申请日:2022-12-21
摘要: Example heating and cooling systems for edge data centers are disclosed herein. A system disclosed herein includes a subterranean vault to be disposed at least partially below ground level an of environment, an edge data center in the subterranean vault, and a geothermal heat pump system to regulate a temperature of ambient air in the subterranean vault.
-
公开(公告)号:US20210109731A1
公开(公告)日:2021-04-15
申请号:US17131561
申请日:2020-12-22
申请人: Dario Nicolas Oliver , Marcos E. Carranza , Cesar Martinez-Spessot , Francesc Guim Bernat , Mateo Guzman , Sindhu Pandian , Ignacio Javier Alvarez Martinez , Mats Gustav Agerstam
发明人: Dario Nicolas Oliver , Marcos E. Carranza , Cesar Martinez-Spessot , Francesc Guim Bernat , Mateo Guzman , Sindhu Pandian , Ignacio Javier Alvarez Martinez , Mats Gustav Agerstam
IPC分类号: G06F8/61 , H04W12/033 , G06F21/71 , H04L29/08 , H04B1/38
摘要: System and techniques for hands-free deployment of geographically linked applications are described herein. A radio transceiver of a vehicle may detect a beacon. Here, the beacon includes an indication that an application linked to a geographical area covered by the beacon is available. The vehicle may establish a secure communications link with an application server corresponding to the beacon and receive, through the secure communications link, an application. Then, the vehicle may execute the application in a protected execution environment without intervention by a user of the vehicle.
-
公开(公告)号:US20200218669A1
公开(公告)日:2020-07-09
申请号:US16820630
申请日:2020-03-16
申请人: Ginger H. Gilsdorf , Karthik Kumar , Mark A. Schmisseur , Thomas Willhalm , Francesc Guim Bernat
发明人: Ginger H. Gilsdorf , Karthik Kumar , Mark A. Schmisseur , Thomas Willhalm , Francesc Guim Bernat
IPC分类号: G06F12/123 , G06F12/0891 , G06F12/02 , G06F1/14 , G11C7/22
摘要: An apparatus and/or system is described including a memory device including a memory range and a temporal data management unit (TDMU) coupled to the memory device to receive from an interface, the memory range and a temporal range corresponding to validity of data in the memory range, check the temporal range against a time and/or date value provided by a timer or clock to identify the data in the memory range as expired, and invalidate the data that is expired in the memory device. In some embodiments, the TDMU includes hardware logic that resides on a memory module with the memory device and is coupled to invalidate expired data when the memory module is decoupled from the interface. Other embodiments may be disclosed and claimed.
-
-
-
-
-
-
-
-
-