Virtual machine switching based on processor power states
    171.
    发明授权
    Virtual machine switching based on processor power states 有权
    基于处理器电源状态的虚拟机切换

    公开(公告)号:US09501137B2

    公开(公告)日:2016-11-22

    申请号:US14373897

    申请日:2013-09-17

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally provided to switch virtual machines based on processor power states. In some examples, a virtual machine manager (VMM) may determine that a processor configured to execute a first virtual machine (VM) is to execute a VM switch, and cause the processor to enter a low-power state and store a first VM state. The VMM, which may be a VM itself, may then replace the stored first VM state with a second VM state and cause the processor to exit the low-power state. When the processor exits the low-power state, it may load the second VM state and execute a second VM.

    Abstract translation: 通常提供技术来基于处理器电源状态来切换虚拟机。 在一些示例中,虚拟机管理器(VMM)可以确定被配置为执行第一虚拟机(VM)的处理器是执行VM切换,并使处理器进入低功率状态并存储第一VM状态 。 可以是VM本身的VMM可以用第二VM状态替换所存储的第一VM状态,并使处理器退出低功率状态。 当处理器退出低功耗状态时,它可以加载第二个VM状态并执行第二个VM。

    SUPPRESSION OF DISCOVERY OF MOBILE DEVICES IN A WIRELESS NETWORK

    公开(公告)号:US20160262003A1

    公开(公告)日:2016-09-08

    申请号:US15156635

    申请日:2016-05-17

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for suppressing discovery of mobile devices in a wireless ubiquitous computing (ubicomp) network, reducing the number of network transmissions by devices in the network and reducing network congestion and prolonging battery life. A mobile device may add supplementary information to introductory beacons transmitted by the device that indicate no response is necessary from other devices participating in the network except for a coordinator of the network. The mobile device may transmit a malformed introductory beacon that will be ignored by other devices in the network except for the coordinator. The coordinator of the wireless network may detect the mobile device moving through the network and transmit a suppression signal to other devices in the network causing the devices to ignore the introductory beacons transmitted by the mobile device.

    Tiered eviction of instances of executing processes
    175.
    发明授权
    Tiered eviction of instances of executing processes 有权
    分阶段驱逐执行过程的实例

    公开(公告)号:US09424060B2

    公开(公告)日:2016-08-23

    申请号:US14239970

    申请日:2013-05-29

    Inventor: Ezekiel Kruglick

    Abstract: In one example embodiment, an instance of a virtual machine to evict may be identified. A determination may be made within a predetermined range of probabilities, that processing on the identified instance of the virtual machine will resume within a predetermined range of time. Thus, the identified instance of the virtual machine may be softly evicted by allocating processing resources away from the identified instance of the virtual machine, receiving an instruction to resume the processing on the identified instance of the virtual machine, and restoring the processing on the identified instance of the virtual machine.

    Abstract translation: 在一个示例实施例中,可以识别要驱逐的虚拟机的实例。 可以在预定的概率范围内进行确定,对所识别的虚拟机的实例的处理将在预定的时间范围内恢复。 因此,可以通过将处理资源远离所识别的虚拟机的实例分配处理资源,接收指示以恢复所识别的虚拟机的实例上的处理,并恢复所识别的虚拟机的处理 虚拟机的实例。

    DATA SCRUBBING CERTIFICATION FOR PLATFORM TECHNOLOGIES
    176.
    发明申请
    DATA SCRUBBING CERTIFICATION FOR PLATFORM TECHNOLOGIES 审中-公开
    平台技术数据清理认证

    公开(公告)号:US20160232176A1

    公开(公告)日:2016-08-11

    申请号:US14761935

    申请日:2014-10-15

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F16/1748 G06F16/24553 G06F21/57 G06F21/6254

    Abstract: Technologies are generally described to monitor an ingress and egress of data to and from platform provided storage. In some examples, a data scrubbing certification module of a platform may be configured to determine an existence of a data retention and elimination policy of a service associated with an application executed at the platform, where the service may store application data within a data store of the platform. The data scrubbing certification module may activate a certification process for the application, and the data store may receive the application data inserted with one or more sentinels from the service such that the data scrubbing certification module may track the sentinels to verify an ingress and egress of the application data to and from the data store. Evidence that the service is compliant with the data retention and elimination policy may then be provided to the application based on the verification.

    Abstract translation: 技术通常被描述为监视从平台提供的存储进出数据的入口和出口。 在一些示例中,平台的数据擦除认证模块可以被配置为确定与在平台处执行的应用相关联的服务的数据保留和消除策略的存在,其中服务可以将应用数据存储在数据存储 的平台。 数据擦除认证模块可以激活应用的认证过程,并且数据存储可以从服务接收插入有一个或多个哨兵的应用数据,使得数据擦除认证模块可以跟踪哨兵来验证进入和离开 来自数据存储的应用数据。 然后可以基于验证向应用程序提供服务符合数据保留和消除策略的证据。

    Viewer optimized model compression
    177.
    发明授权
    Viewer optimized model compression 有权
    查看器优化模型压缩

    公开(公告)号:US09406152B2

    公开(公告)日:2016-08-02

    申请号:US14334465

    申请日:2014-07-17

    Inventor: Ezekiel Kruglick

    CPC classification number: G06T9/00 G06T9/001 G06T17/10

    Abstract: Technologies may be generally described to provide viewer optimized compression of a model. In some examples, a computing device may receive a request to compress a master model for a viewer. The computing device may determine shape primitives of the master model through use of a shape primitive identification technique such as a random sample consensus (RANSAC) technique. The identified or determined shape primitives may be subtracted from the master model to determine residues of the master model. A processed model may be generated from the residues of the master model and the shape primitives. Visible subsets, visible based on a view cone of the viewer, of the residues and the shape primitives may be selected from the processed model, from which a compressed model may be generated. The processed model may then be used to generate a second view without redetermining the shape primitives.

    Abstract translation: 通常可以描述技术来提供观看者优化的模型压缩。 在一些示例中,计算设备可以接收针对观看者压缩主模型的请求。 计算设备可以通过使用诸如随机样本共有(RANSAC)技术的形状原语识别技术来确定主模型的形状基元。 可以从主模型中减去识别或确定的形状基元,以确定主模型的残差。 可以从主模型和形状基元的残差生成经处理的模型。 可以从处理的模型中选择残留物和形状基元的基于观察者的视锥的可见子集,可以从其生成压缩模型。 然后可以使用经处理的模型来生成第二视图而不重新确定形状基元。

    Mobile device prevention of contactless card attacks
    178.
    发明授权
    Mobile device prevention of contactless card attacks 有权
    移动设备防止非接触式卡攻击

    公开(公告)号:US09379841B2

    公开(公告)日:2016-06-28

    申请号:US14431034

    申请日:2014-11-17

    Abstract: Technologies related to mobile device prevention of contactless card attacks are generally described. In some examples, a mobile computing device may monitor for electromagnetic signals at frequencies used for short range communications with contactless cards. Detection of such electromagnetic signals by the mobile computing device may indicate an attack attempt on a proximal contactless card. In response to detection of such electromagnetic signals, the mobile computing device may automatically generate a disruption signal effective to disrupt communications between contactless card readers and any proximal contactless cards, to thereby foil the attack before sensitive contactless card data is stolen.

    Abstract translation: 通常描述与非接触式卡攻击的移动设备防止相关的技术。 在一些示例中,移动计算设备可以在用于与非接触式卡进行短距离通信的频率下监视电磁信号。 由移动计算设备检测这样的电磁信号可以指示对近侧非接触式卡的攻击尝试。 响应于这种电磁信号的检测,移动计算设备可以自动产生有效地中断非接触式读卡器与任何近侧非接触式卡之间的通信的中断信号,从而在敏感的非接触式卡数据被盗之前消除攻击。

    Dynamic reconfiguration of programmable hardware
    179.
    发明授权
    Dynamic reconfiguration of programmable hardware 有权
    可编程硬件的动态重新配置

    公开(公告)号:US09361416B2

    公开(公告)日:2016-06-07

    申请号:US13994882

    申请日:2013-01-30

    CPC classification number: G06F17/5054

    Abstract: Technologies related to dynamic reconfiguration of programmable hardware are generally described. In some examples, coprocessor regions in programmable hardware such as a Field Programmable Gate Array (FPGA) may be dynamically assigned to transition the FPGA from a starting arrangement of coprocessor regions to an efficient arrangement. A placement algorithm may be executed to determine the efficient arrangement, and a path finding algorithm may be executed to determine path finding operations leading from the starting arrangement to the efficient arrangement. The path finding operations may be performed to implement the transition.

    Abstract translation: 通常描述与可编程硬件的动态重新配置相关的技术。 在一些示例中,诸如现场可编程门阵列(FPGA)的可编程硬件中的协处理器区域可以被动态分配以将FPGA从协处理器区域的启动布置转换到有效的布置。 可以执行放置算法以确定有效的布置,并且可以执行路径查找算法以确定从起始布置到有效布置的路径查找操作。 可以执行路径查找操作以实现转换。

    Repeater emulation to increase network range

    公开(公告)号:US09350439B2

    公开(公告)日:2016-05-24

    申请号:US14812664

    申请日:2015-07-29

    Inventor: Ezekiel Kruglick

    CPC classification number: H04B7/145 H04B7/15507 H04W56/00

    Abstract: Technologies are generally described for methods and systems configured to increase a range of a network. In an example, a method for increasing a range of a first network may include sending a request by a communication device to a network device while the communication device is in a range of the first network. The request may include a request for discovery data that identifies the first network. The method may further include receiving, by the communication device, the discovery data. The method may further include broadcasting, by the communication device, information based on the discovery data when the communication device is outside the range of the first network and when the communication device is configured to communicate over a second network. The second network may be different from the first network.

Patent Agency Ranking