Abstract:
Examples are generally described that include monitoring an electrocaloric effect device. A varying voltage may he applied across an electrocaloric effect material. A capacitance change of the electrocaloric effect material at least in part responsive to the varying voltage may be measured. A temperature change of the electrocaloric effect material may be calculated based, at least in part, on the capacitance change.
Abstract:
Technologies are generally described for providing full-motion animation-as-a-service. In some examples, short motion-capture segments may be captured from user motion user interface devices and stored in a database. When a full-motion animation is desired, a start pose and a target pose may be provided, and a multiple-path, multiple-iteration search through the database may be used to assemble the full-motion animation. Motion retargeting may be used to further refine the assembled hill-motion animation.
Abstract:
Technologies are generally described to send distributed user interface elements to a customer. In some examples, a virtualization server may receive an application to be provided to a customer. The virtualization server may separate the application into multiple user interface elements and encapsulate each user interface element with virtualization components for individual delivery to the customer. Subsequently, the virtualization server may then forward the encapsulated element(s) to one or more customer devices.
Abstract:
Technologies are generally described for systems, devices and methods effective to execute a first computing task by a processor of a data center. In some examples, the first computing task may be executed using an instruction set extension. Execution of the first computing task using the instruction set extension may require a first number of clock cycles. In other examples, execution of the first computing task without using the instruction set extension may require a second number of clock cycles. In some examples, a savings value may be determined. The savings value may represent a difference between the first number of clock cycles and the second number of clock cycles. An amount of processing time may be allocated on the processor to a second computing task. The amount of processing time may be based on the savings value. The second computing task may be different from the first computing task.
Abstract:
Technologies are generally described to redirect local storage for embedded applications. In some examples, a computing device such as a redirection router, coupled to network-attached storage, may detect a request for an application being delivered from a server to a destination device such as a ubicomp device and intercept the requested application. The redirection router may determine whether the destination device has sufficient local storage. In response to determination that the destination device does not have sufficient local storage or a predefined configuration such as requesting device being configured for local storage, a reference to the client-side storage associated with the application may be replaced with a link, to the network-attached storage prior to delivery of the application. Subsequent retrievals of the application or portions thereof may be from the network-attached storage directly or via the redirection router.
Abstract:
Technologies are generally described for providing datacenter border-issued analytics for monitoring federated services. In some examples, a deployment manager, which manages placement of application deployment instances across a federation and thus already knows which datacenter each instance is in, may register a package trigger with a gateway at each datacenter when an application is placed in each datacenter. The datacenter gateway(s) may then search through data packets for registered package properties such as content of a packet header that indicates it is a monitoring packet, and inject additional data according to instructions from the deployment manager. For example, the deployment manager may instruct the gateway(s) to inject a datacenter identifier or a network location identifier to each monitoring data packet. The additional data may be customer-defined and the modified monitoring data including the additional data may be sent to a monitoring system to be analyzed.
Abstract:
Technologies are presented for reducing lag time via speculative graphics rendering in cloud based gaming. In some examples, historical data about statistically relevant large populations of players is provided. The historical data may include state transitions through various game locations or situations. In some of the game locations there may be a correlation between a probability of a particular upcoming scene and a player state. Example game locations or situations may include areas that players tend to cross in one or more straight lines, corners that players may round in a particular fashion, spots where certain player motions are commonly engaged in, such as looking up, and the like. The historical data may be tested against a certain predictive strength and rendered predicted game states may be prepared ahead of player need.
Abstract:
Technologies for virtual machine placement within a data center are described herein. An example method may include determining a shared threat potential for a virtual machine based, at least in part, on a degree of co-location the virtual machine has with a current virtual machine operating on a physical machine, determining a workload threat potential for the virtual machine based, at least in part, on a level of advantage associated with placing the virtual machine on the physical machine, determining a threat potential for the virtual machine based, at least in part, on a combination of the shared threat potential and the workload threat potential, and placing the virtual machine on the physical machine based on the threat potential.
Abstract:
Technologies are generally described to provide a fail-safe licensing system. An example system may include a quorum detection module of an instance of a software program configured to query a licensing queue corresponding to the software program for messages to determine a number of active instances of the software program. Based on a comparison of the determined number of active instances and a maximum number of allowed instances of the software program, the quorum detection module may be configured to determine whether the instance of the software program is authorized. In response to a determination that the instance of the software program is authorized, the quorum detection module may generate a unique instance identification tag and post a message to the licensing queue, where the message includes an indication that the instance of the software program is active and an indication of the generated unique instance identification tag.
Abstract:
Technologies related to observer filtered activity recommendations are generally described. In some examples, a computing device may collect activity and observer information for a device user, may identify limited observer activities, and may generate observer filtered activity recommendations for the device user, the observer filtered activity recommendations corresponding to the identified limited observer activities. Observer filtered activity recommendations may optionally be restricted in the presence of current observers outside a limited observer group. In some examples, the computing device may provide automated access to observer information and/or to observer filtered activity information to enable observer filtered activity recommendations by applications accessing the observer information and/or the observer filtered activity information.