Abstract:
To reduce the reliance on software for complex computations used in machine sensory perception, a sensory perception accelerator may include a neural network accelerator a linear algebra accelerator. The neural network accelerator may include systolic arrays to perform neural network computation circuits concurrently on image data and audio data. The linear algebra accelerator may include matrix computation circuits operable to perform matrix operations on image data and motion data.
Abstract:
Network hardware devices organized in a wireless mesh network (WMN) in which a home access node (HAN) device that includes a first set of radios, each of the first set of radios being coupled to a beam-steering antenna and each of the first set of radios establishing a first point-to-point (PtP) wireless connection over which the HAN relay device communicates with a second HAN relay device in a first sub-mesh network of HAN relay devices. The HAN device also includes a second set of radios, each of the second set of radios being coupled to a beam-steering antenna and each of the second set of radios establishing a second PtP wireless connection over which the HAN relay device communicates with at least one of a plurality of HAN devices in a second sub-mesh network in the WMN.
Abstract:
A mesh network device includes a radio and an application processor including a hop-aware multicast engine to: determine a mesh header time to live (TTL) value for a broadcast frame in a data link layer. The mesh header TTL value is the lessor of an internet protocol (IP) header TTL value of the first broadcast frame in an IP layer and a predefined value. The broadcast frame includes a request for a service or a resource to be sent. The hop-aware multicast engine sends the broadcast frame to a first set of mesh network devices being defined by the mesh header TTL value. The hop-aware multi-case engine determines that a response was not received within a time period; increases the mesh header TTL value; and sends a broadcast frame to a second set of one or more additional mesh network devices being defined by the increased mesh header TTL value.
Abstract:
Network hardware devices organized in a wireless mesh network (WMN) in which one network hardware devices includes three radios, two of which operate with a frequency separation less than 100 MHz. A first network hardware device communicates with a second network hardware device when not serving data to a client device. When serving data to a client device, the first network hardware device communicates wireless wide area network (WWAN) data to a WWAN network through a third network hardware device in the WMN that has its own WWAN connection to create spatial separation for simultaneous communication.
Abstract:
Disclosed are various embodiments for determining whether a client device is authorized to receive media content based at least in part on the call signs of broadcast stations that the client device is able to receive. A computing device receives a broadcast station identifier and a program identifier from a client computing device. The computing device determines that the client computing device is authorized to access media content identified by the program identifier based at least in part on the broadcast station identifier. Finally, the computing device streams the media content to the client computing device in response to determining that the client computing device is authorized to access the media content.
Abstract:
A wearable computing device, such as a wearable credit card type device or a wearable identification type device, that provides for location based authentication to verify that a user currently in possession of the wearable computing device is indeed the authorized user. In this aspect, the wearable computing device may detect wireless network signals in range of the wearable computing device, and transmit authentication data and the detected wireless network signals to an authentication service. The wearable computing device may then be authenticated when the authentication data corresponds to the user and the detected wireless network signals correspond to a pre-authorized location for authentication.
Abstract:
Computing devices can utilize various low power wakeup transceivers in order to control functional states of various components of those devices. Each transceiver can broadcast a beacon including appropriate information, which can be received by any other device with a transceiver that is within a propagation range of the beacon. A transceiver receiving the beacon can cause the received beacon to be analyzed by appropriate decision logic, which can determine any appropriate functionality to be activated or otherwise contacted in response to the beacon. In at least some embodiments, the beacon can cause another type of communication channel to be activated to establish communications with a device from which the beacon was received. In this way, the communications channel can be established without having to leave the channel active or manually activate that channel.
Abstract:
Two unmanned vehicles come within communication range of one another. The unmanned vehicles exchange logs of messages each has received. Each of the unmanned vehicles analyzes the messages that it received from the other unmanned vehicle to determine whether any of the received messages warrants changing a set of tasks it was planning to perform. When a message indicates that a task should be changed, the task is updated accordingly.
Abstract:
A server determines that communications with a first user device are to be made in a voice call mode. The server receives, from a second user device, a first text data packet corresponding to text communications with the first user device, converts the first text data packet into a first voice data packet, and sends, via a wireless network, the first voice data packet to the first user device.
Abstract:
This disclosure describes a system for managing inventory as it transitions into a materials handling facility, as it transitions between locations within a materials handling facility and/or as it transitions out of a materials handling facility. In some instances, a user (e.g., picker or picking agent) may retrieve an item from an inventory location and place the item into a tote. The systems described herein detect the item when it is added to or removed from the tote.