Abstract:
Techniques described herein generally include methods for the testing and repair of a hardware accelerator image in a programmable logic circuit. In a processor chip that includes multiple programmable logic circuits, a hardware accelerator image programmed into a first programmable logic circuit is tested by programming a testing circuit with a duplicate hardware accelerator image and bringing the testing circuit to the same logic state as the first programmable logic circuit. Comparing outputs from the first programmable logic circuit and the testing circuit indicates the accuracy of the hardware accelerator image programmed into the first programmable logic circuit. The testing circuit may replace the first programmable logic circuit, or the testing circuit may be reprogrammed for testing other hardware accelerator images programmed into other programmable logic circuits of the processor chip.
Abstract:
In some examples, one or more processors of a computing system may receive telemetry data from a plurality of devices, user identifications (IDs) of a set of users of the plurality of the devices, and information from social media indicative of user sentiments toward the devices. The computing system may predict user experience related to the devices based at least in part on the telemetry data, the user IDs, and the information from the social media.
Abstract:
Technologies are generally described that relate to verification location determination for entity presence confirmation of online purchases. An example method may include determining whether a first risk level associated with a first candidate transaction is capable of mitigation to a defined level via physical verification of an entity associated with the first candidate transaction, wherein the first candidate transaction is determined to satisfy a defined risk profile. The method may also include, in response to determining that the first risk level associated with the first candidate transaction is capable of the mitigation to the defined level via the physical verification, generating location information indicative of a selected location for the physical verification.
Abstract:
In one example embodiment, live migration in a datacenter may include JIT compiling a process that is configured to be executed on both a source instruction set architecture and a destination instruction set architecture, mapping variables and address stacks of the process on both the source instruction set architecture and the destination instruction set architecture into a labeled form thereof, and mapping the labeled form of the variables and address stacks onto the destination instruction set architecture.
Abstract:
Techniques described herein generally relate to a task management system for a chip multiprocessor having multiple processor cores. The task management system tracks the changing instruction set capabilities of each processor core and selects processor cores for use based on the tracked capabilities. In this way, a processor core with one or more failed processing elements can still be used effectively, since the processor core may be selected to process instruction sets that do not use the failed processing elements.
Abstract:
In some examples, a computing system may receive a plurality of string matching requests with respect to a plurality of data streams, and determine one or more opportunities for aggregation of string matching.