Abstract:
The present technology provides an illustrative method for delegating user interface-related tasks. In some examples, the method includes receiving a request to delegate a user interface-related task to a delegated computing device, and causing the transceiver of the delegating device to send a delegation command to the delegated computing device to establish a delegation session on the delegated computing device. The delegation command requests establishment of a delegated user interface to facilitate performance of the user interface-related task on the delegated computing device, and the delegated user interface is substantially similar to the user interface of the delegating device. The method also includes exchanging data associated with the user interface-related task with the delegated computing device.
Abstract:
The disclosed technology receives at a second computing device a message from a first computing device comprising at least an indication of a physical motion, a requested motion, or an indication of a camera control operation. The indicated motion can correspond to a physical motion made to the first computing device. The indicated camera control operation can correspond to a camera control operation made at the first computing device. The technology requests to physically move the second computing device if the received message indicates a motion; and controls a digital camera associated with the second computing device if the received message indicates a camera control operation made at the first computing device.
Abstract:
Methods and systems are provided that are effective to generate an alarm for a vehicle. The methods include receiving, by a device, a first sensor value from a first sensor for the vehicle. The methods further include receiving, by the device, a second sensor value from a second sensor for the vehicle. The methods further include retrieving, by the device, an instruction from a memory disposed in the vehicle while the memory is in a write-protected mode. The methods further include evaluating, by the device, the first sensor value and the second sensor value based on the instruction. The methods further include determining, by the device, that the first sensor value is outside a range associated with the first sensor based on the evaluation. The methods further include transforming, by the device, the determination into an alarm.
Abstract:
Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack.
Abstract:
Technologies are generally described for systems, devices and methods effective to utilize a solid state memory device. A memory device may include one or more input/output ports effective to receive data at, and facilitate transfer from, the memory device. The memory device may further include a memory controller. The memory controller may be effective to control access to data stored in the memory device. The memory device may further include two or more flash chips effective to store data in the memory device. The memory device may further include a crossbar switch. The crossbar switch may be coupled between the one or more input/output ports and the two or more flash chips. The crossbar switch may be effective to enable the one or more input/output ports to access the two or more flash chips through the memory controller.
Abstract:
The present technology provides an illustrative method for delegating user interface-related tasks. In some examples, the method includes receiving a request to delegate a user interface-related task to a delegated computing device, and causing the transceiver of the delegating device to send a delegation command to the delegated computing device to establish a delegation session on the delegated computing device. The delegation command requests establishment of a delegated user interface to facilitate performance of the user interface-related task on the delegated computing device, and the delegated user interface is substantially similar to the user interface of the delegating device. The method also includes exchanging data associated with the user interface-related task with the delegated computing device.
Abstract:
Methods to facilitate monitoring the execution of a first instance and a second instance, such as multiple instantiations of a program, are generally described. The methods may include generating a first instance and a second instance, appending first monitoring instructions to the first instance to produce a first modified instance and appending second monitoring instructions to the second instance to produce a second modified instance. The first and second monitoring instructions may relate to monitoring an execution of the first instance and the second instance. The processor may further send the first modified instance to a first computing device and send the second modified instance to a second computing device different from the first computing device. The computing devices may provide different computational functionality and/or may split a load in processing the program.
Abstract:
Technologies are generally described to establish a hardware interconnect based communication between SSD controllers. According to some examples, a first solid state drive (SSD) controller and a second SSD controller are detected. The hardware interconnect is detected between the first SSD controller and the second SSD controller. Next, a communication connection between the first SSD controller and the second SSD controller is established through the hardware interconnect. The first SSD controller may be allowed to manage a flash controller of the second SSD controller for tasks that include a deduplication task and a low level redundant array of independent disks (RAID) task.