Abstract:
Technologies are generally provided for a hybrid architecture of an enhanced networked environment implementing a centralized management of peer-to-peer (P2P) code exchange for secure real-time content distribution. In some examples, central game servers in a massively multiplayer online game (MMOG) service may prepare both P2P admission and eviction planning and P2P element integration packages, instructing a game client whom to send data to while also removing exploitable data from the P2P channel. Thus, large amounts of data may be offloaded from a datacenter hosting an MMOG or similar service involving high numbers of users to P2P connections.
Abstract:
Technologies are generally described for detecting transcoding and adjusting visual content for optimal display on user devices. A content provider may transmit a sample of a visual content to a user device over a service provider network, and may monitor the quality of the sample that the user device receives. The service provider may apply transcoding to the sample during the transmission causing the quality of the sample to be degraded. The content provider may receive a sample as rendered from the user device and may compare the sample as rendered to the visual content to identify a transcoding applied by the service provider network. The content provider may the transcoding to the visual content and may transmit visual content that is transcoded for optimal display over the service provider network to the user device.
Abstract:
Technologies are presented for providing a suggestion list presenting options for posting information related to viewed content on a communication network. In some examples, a user may desire to contribute to posted content by adding comments and other relevant information. A system may identify one or more key terms included in the viewed content, and may compare the key terms with content, such as files, emails, websites, images and media content, on computing devices and web browser histories associated with the user to identify information that may be related to the viewed content. If the system identifies information related to the key terms of the viewed content, the system may present the identified information associated with key terms to the user, and may enable selection from a posting suggestion list for automatically posting.
Abstract:
Technologies are generally described for providing full-motion animation-as-a-service. In some examples, short motion-capture segments may be captured from user motion user interface devices and stored in a database. When a full-motion animation is desired, a start pose and a target pose may be provided, and a multiple-path, multiple-iteration search through the database may be used to assemble the full-motion animation. Motion retargeting may be used to further refine the assembled full-motion animation.
Abstract:
Technologies related to personal assistant context building are generally described. In some examples, network service communications, such as network traffic resulting from the use of mobile applications or “apps” on a mobile device, may be captured, parsed, and included in personal assistant context databases for use in configuring automated personal assistant user interaction operations. In some examples, parsing services may be provided to parse forwarded network service communications and generate converted data for inclusion in personal assistant context databases.
Abstract:
Technologies are generally described for systems, devices and methods effective to provision computing resources based on deduplication. In an example, a resource cost may be produced. The resource cost may relate to execution of a first virtual machine at a data center. A processor may receive a first representation related to an image of the first virtual machine. The processor may receive a second representation related to one or more instances of second virtual machines being executed by the data center. The processor may compare the first and second representations to produce a deduplication value for the first virtual machine. The processor may transform the deduplication value to produce the resource cost.
Abstract:
Technologies are generally described for systems, methods, and devices for implementing device and session identification. In some examples, a processor may receive a first communication from a device. The first communication may include requests to interact with a web page, a session identifier associated with the first communication, and a protocol address associated with the device. The processor may receive a second communication from the device. The second communication may include a device identifier associated with the device, where the device identifier may be different from the internet protocol address, and the session identifier. The processor may link the first communication with the device identifier based on the session identifier. The processor may further analyze the first communication with respect to the device identifier to produce an analyzed first communication.
Abstract:
Techniques described herein generally include methods and systems related to cooperatively caching data in a chip multiprocessor. Cooperatively caching of data in the chip multiprocessor is managed based on an eviction rate of data blocks from private caches associated with each individual processor core in the chip multiprocessor. The eviction rate of data blocks from each private cache in the cooperative caching system is monitored and used to determine an aggregate eviction rate for all private caches. When the aggregate eviction rate exceeds a predetermined value, for example the threshold beyond which network flooding can occur, the cooperative caching system for the chip multiprocessor is disabled, thereby avoiding network flooding of the chip multiprocessor.
Abstract:
Technologies are generally described to provide a leakage current variability based power management of a processor. According to some examples, instruction counters and aggregated power consumption of the processor may be used to process power measurements of the processor into linear equations. The linear equations may be processed to produce a set of leakage values for the processor. In an example scenario, computation data from a power controller and processor instruction counters (PICs) of a core of the processor may be used to determine the leakage current variability of the core. A table of linear combination samples may be generated from the computation data. A micro-architectural leakage map of the core may be generated from the linear combination samples within the table.
Abstract:
Technologies are generally described for systems, devices and methods effective to generate a message that may be sent to a social network. Power information from an electronic device may be detected by a power detector and received by a processor. For example, a power consumption profile of an appliance may be detected. The processor may classify the power information to produce descriptive data. For example, the processor may determine that an oven has been turned on for a period of time. The processor may generate the message by applying one or more rules to the descriptive data. For example, the processor may generate a message relating to consumption of dinner based on the determination that the oven has been turned on.