Abstract:
Technologies are provided to automatically vary a structure of a netlist computation arranged to configure a field programmable gate array (FPGA). In an example scenario, an FPGA netlist may be received from a client to configure the FPGA. A perturbation generator may be activated in response to a detection of one or more security risk factors associated with the netlist. The netlist may be altered through schemes designed to repair one or more FPGAs. The repair schemes may be used to repair the FPGAs to work around failed cells and failed sub-cells. The perturbation generator may produce a false map of failed cells. The false map may be used to generate different timings and different intermediate values associated with the netlist to generate an alternate netlist. The alternate netlist may be used to configure the FPGA to prevent side channel attacks.
Abstract:
Implementations and techniques for outputting information about estimated QoEs on a terminal on which plural applications can be executed are generally disclosed. The estimated QoEs may be obtained by performing QoE estimation on an application basis.
Abstract:
Technologies are generally described for systems, devices and methods effective to implement a line of sight initiated handshake. In some examples, a processor in a first communication device may detect a line of sight directed from the first communication device to a second communication device. The first communication device may send a handshake request to the second communication device. The first communication device may receive a handshake acknowledgement from the second communication device. The handshake request and handshake acknowledgement may be effective to create the handshake. The first and second communication devices can thereafter share data.
Abstract:
Technologies are described for health monitoring using snapshot backups through test vectors. In some examples, health of an application deployed at a datacenter may be monitored and key metrics recorded in the metadata of progressive backup snapshots of an instance of the application such that warning metrics can be reviewed retrospectively upon failure of the instance and a snapshot can be automatically selected for restoration of the application instance based on lack of high incidence of suspect metric values. Moreover, an operating state associated with snapshot backups may be assessed as the snapshots are captured and selected ones with operating conditions desired as part of a test suite may be saved for use as test scenarios. In particular, state information from added or existing deployment monitoring may be used by a test logic process to evaluate whether each snapshot is needed for testing scenarios.
Abstract:
The current disclosure provides methods for producing C2-C5 carboxylic acids from a carbohydrate source. In some embodiments, the method may be: (a) contacting the carbohydrate source with an alkali to form a plurality of intermediate compounds; and (b) reducing the intermediate compounds to form at least one C2-C5 carboxylic acid. In some embodiments, the carbohydrate source may be organic waste.
Abstract:
Technologies are generally described for methods and systems effective to monitor a data access activity. In some examples, a method may include receiving, by a processor, a destination concept. The processor may identify a set of concepts, which may include the destination concept and at least one related concept associated with the destination concept, in an ontology. The processor may generate a planned path, which may define a first data access order associated with access of at least one of the related concepts and the destination concept, using the set of concepts. The processor may generate a browsing path which may define a second data access order associated with the data access activity. The processor may compare the planned path with the browsing path. The processor may determine a deviation based on the comparison of the planned path and the browsing path. The processor may monitor the data access activity using the deviation.
Abstract:
A strengthened glass substrate can include a polysiloxane film on at least one surface of the glass substrate. The polysiloxane film can be under internal compressive stress. such that the fracture strength of the glass substrate may be improved. The polysiloxane film can be a color-filtering polysiloxane film, a polarizing polysiloxane film or both.
Abstract:
Technologies are generally described to provide multi-objective dynamic resource optimization for self-organizing networks. In some examples, a system employing dynamic resource optimization may allocate network resources to a group of subscribers to enable granular policy management per cell, per subscriber type, per service, and/or per user resource. The dynamic resource optimization may be based on optimization/improvement of a throughput objective and a quality of experience (QoE) objective. Users maybe segmented into different groups according to subscriber types with each group having a priority level assigned. Resources may be allocated first to a highest or relatively higher priority group of users, and remaining resources may be consecutively allocated to lower priority groups. The QoE objective may be quantitatively determined by mapping real time quality of service (QoS) parameters associated with the subscriber group. A set of group policy parameters may also be applied to weight the throughput and QoE objectives.
Abstract:
Technologies are generally described for a memory system that may be a solid state drive. The memory system may include memory blocks, where each memory block may have multiple memory pages, and each memory page may have multiple memory cells. The memory cells may have multiple programmed states. In various examples, a method to control the memory system may include determining one or more memory pages to be analyzed, identifying read threshold voltages of each memory cell associated with the memory pages to be analyzed, performing statistical analysis on the identified read threshold voltages, and determining a distribution of the read threshold voltages based at least in part on the statistical analysis.