Abstract:
Technologies are generally described for methods and systems to assign threads in a multi-core processor. In an example, a method to assign threads in a multi-core processor may include determining data relating to memory controllers fetching data in response to cache misses experienced by a first core and a second core. Threads may be assigned to cores based on the number of cache misses processed by respective memory controllers. Methods may further include determining that a thread is latency-bound or bandwidth-bound. Threads may be assigned to cores based on the determination of the thread as latency-bound or bandwidth-bound. In response to the assignment of the threads to the cores, data for the thread may be stored in the assigned cores.
Abstract:
An apparatus for use with a medical device is disclosed that includes an end plate. The end plate includes a fixation portion configured to attach to a proximal bone segment. The end plate further includes a second portion including an opening configured to receive a medical device. The apparatus further includes a tightening head shaped for selective placement within the opening. The tightening head is further configured for engagement with the medical device.
Abstract:
Technologies related to intermediary graphics rendition are generally described. In some examples, an intermediary computing device may store graphics models in a model store. A server computing device may generate and send a compositing flow to the intermediary computing device. The compositing flow may comprise model identifiers and model rendering information. The intermediary computing device may retrieve models identified in the compositing flow from the model store, and provide the identified models and model rendering information to a Graphics Processing Unit (GPU) for rendering. The GPU may render graphics for delivery via a network to a client device.
Abstract:
When confidential information is displayed at a display device, a secure image may be generated so that the confidential information is visible only to an authorized user within a predetermined viewing distance. In some examples, incorrect information may be generated to mislead an unauthorized viewer outside the predetermined viewing distance.
Abstract:
Technologies are generally described for systems and methods effective to output video content. In some examples, a content output device may be effective to receive a first request for first video content including a first identifier and a first category. The device may receive a zoom selection for the first video content including a first zoom level assigned to the first video content. The selection may be based on the first identifier or the first category. The device may store the zoom selection in a memory and receive a second request for second video content including a second identifier and a second category. The device may analyze the memory to determine a second zoom level for the second video content based on the first zoom level and the first identifier or the first category. The device may output the second video content at the second zoom level.
Abstract:
Technologies are described for display of a merged image on a display. A processor may receive first data that relates to a first image of a real object and second data that relates to a second image of a virtual object. The second image, if displayed, may overlap, in an overlap region, at least part of the first image if the first image were displayed. The processor may identify an overlap part in the first data that corresponds to the overlap region, clip the overlap part from the first data to produce clipped data, and blur the clipped data to produce blurred data. The processor may subtract the clipped data from the blurred data to produce an additive blur component, add the additive blur component to the second data to produce merged data, and generate the merged image to be displayed on the display based on the merged data.
Abstract:
Technologies are generally described for employing proximity sensing mechanisms in augmented reality (AR) systems. Sensors strategically placed on AR eyeglasses in locations such as right and/or left arms, bridge, or flip-up feature of the eyeglasses may be used to detect AR eyeglass usage for power management and/or to provide user interface elements like volume control, display controls, user input, and comparable ones. According to some examples, the sensors may be mechanical sensors, capacitive sensors, optical sensors, inductive sensors, magnetic sensors, and/or similar components.
Abstract:
In some examples, a device may include at least one communication interface configured to exchange signals with another device, and a pairable component configured to: assure the another device of mutual proximity by exchange of at least two progressively increasing locator signals and corresponding acknowledgement signals, receive executable validating code from the another device, execute the validating code, output a self-validating result of executing the validating code, verify pairing with the another device, and generate a secret key to ensure a private exchange of data between the mutually proximate, paired, and validated device and another device.
Abstract:
Thermostatic heating or cooling materials and method for making and using the materials are disclosed. The thermostatic materials may be usable as packaging material and may include a mixture of at least two materials which exhibit a liquid crystalline (LC) phase, or mesophase. Mixtures of two or more compatible LC components may provide a tunability for both operating temperature (temperature control) and latent heat of transition (cooling capacity).