Abstract:
Technologies are generally provided to switch virtual machines based on processor power states. In some examples, a virtual machine manager (VMM) may determine that a processor configured to execute a first virtual machine (VM) is to execute a VM switch, and cause the processor to enter a low-power state and store a first VM state. The VMM, which may be a VM itself, may then replace the stored first VM state with a second VM state and cause the processor to exit the low-power state. When the processor exits the low-power state, it may load the second VM state and execute a second VM.
Abstract:
Technologies are provided for locally processing queue requests from co-located workers. In some examples, information about the usage of remote datacenter queues by co-located workers may be used to determine one or more matched queues. Messages from local workers to a remote datacenter queue classified as a matched queue may be stored locally. Subsequently, local workers that request messages from matched queues may be provided with the locally-stored messages.
Abstract:
Technologies are generally described for suppressing discovery of mobile devices in a wireless ubiquitous computing (ubicomp) network, reducing the number of network transmissions by devices in the network and reducing network congestion and prolonging battery life. A mobile device may add supplementary information to introductory beacons transmitted by the device that indicate no response is necessary from other devices participating in the network except for a coordinator of the network. The mobile device may transmit a malformed introductory beacon that will be ignored by other devices in the network except for the coordinator. The coordinator of the wireless network may detect the mobile device moving through the network and transmit a suppression signal to other devices in the network causing the devices to ignore the introductory beacons transmitted by the mobile device.
Abstract:
In one example embodiment, an instance of a virtual machine to evict may be identified. A determination may be made within a predetermined range of probabilities, that processing on the identified instance of the virtual machine will resume within a predetermined range of time. Thus, the identified instance of the virtual machine may be softly evicted by allocating processing resources away from the identified instance of the virtual machine, receiving an instruction to resume the processing on the identified instance of the virtual machine, and restoring the processing on the identified instance of the virtual machine.
Abstract:
Technologies are generally described to monitor an ingress and egress of data to and from platform provided storage. In some examples, a data scrubbing certification module of a platform may be configured to determine an existence of a data retention and elimination policy of a service associated with an application executed at the platform, where the service may store application data within a data store of the platform. The data scrubbing certification module may activate a certification process for the application, and the data store may receive the application data inserted with one or more sentinels from the service such that the data scrubbing certification module may track the sentinels to verify an ingress and egress of the application data to and from the data store. Evidence that the service is compliant with the data retention and elimination policy may then be provided to the application based on the verification.
Abstract:
Technologies may be generally described to provide viewer optimized compression of a model. In some examples, a computing device may receive a request to compress a master model for a viewer. The computing device may determine shape primitives of the master model through use of a shape primitive identification technique such as a random sample consensus (RANSAC) technique. The identified or determined shape primitives may be subtracted from the master model to determine residues of the master model. A processed model may be generated from the residues of the master model and the shape primitives. Visible subsets, visible based on a view cone of the viewer, of the residues and the shape primitives may be selected from the processed model, from which a compressed model may be generated. The processed model may then be used to generate a second view without redetermining the shape primitives.
Abstract:
Technologies related to mobile device prevention of contactless card attacks are generally described. In some examples, a mobile computing device may monitor for electromagnetic signals at frequencies used for short range communications with contactless cards. Detection of such electromagnetic signals by the mobile computing device may indicate an attack attempt on a proximal contactless card. In response to detection of such electromagnetic signals, the mobile computing device may automatically generate a disruption signal effective to disrupt communications between contactless card readers and any proximal contactless cards, to thereby foil the attack before sensitive contactless card data is stolen.
Abstract:
Technologies related to dynamic reconfiguration of programmable hardware are generally described. In some examples, coprocessor regions in programmable hardware such as a Field Programmable Gate Array (FPGA) may be dynamically assigned to transition the FPGA from a starting arrangement of coprocessor regions to an efficient arrangement. A placement algorithm may be executed to determine the efficient arrangement, and a path finding algorithm may be executed to determine path finding operations leading from the starting arrangement to the efficient arrangement. The path finding operations may be performed to implement the transition.
Abstract:
Technologies are generally described for methods and systems configured to increase a range of a network. In an example, a method for increasing a range of a first network may include sending a request by a communication device to a network device while the communication device is in a range of the first network. The request may include a request for discovery data that identifies the first network. The method may further include receiving, by the communication device, the discovery data. The method may further include broadcasting, by the communication device, information based on the discovery data when the communication device is outside the range of the first network and when the communication device is configured to communicate over a second network. The second network may be different from the first network.