Abstract:
Systems and methods to wirelessly transmit power are provided. A power delivery system may include a central controller assembly and a transmit assembly. The central controller assembly can form transmit coils in the transmit assembly. The central controller assembly can also receive information from devices coupled to the transmit assembly and optimize the transmit coils based on the received information and on information about the transmit assembly.
Abstract:
Technologies are generally described for detection of incidental robot-human contact. In some examples, a robotic actuator movement may generate a feedback signal, such as a haptic signal, a proprioreceptive signal, an optical signal, and/or an infrared signal. A tremor detector may determine whether the feedback signal contains a tremor signal characteristic of a human, for example by determining whether frequency components in the feedback signal fall within particular frequency ranges. Upon determining that the feedback signal does contain a tremor signal characteristic of a human, the tremor detector may conclude that the robotic actuator has come into contact with a human, and may cause the actuator to halt its movement.
Abstract:
Technologies are directed to a detector to identify a side channel attack between virtual machines. According to some examples, an inter-processor interrupt (IPI) rate of a first virtual machine (VM), a time stamp counter (TSC) rate of a second VM, and a cache miss ratio (CMR) of a third VM may be monitored. A side channel attack may then be detected based on the IPI rate, the TSC rate, and the CMR.
Abstract:
Technologies are generally described to detect malware on field programmable gate arrays (FPGAs). In some examples, a power map of an FPGA executing coprocessors may be created by determining voltages associated with distinct areas within the FPGA. The power map may then be compared with expected activity information associated with the executing coprocessors to determine whether any mismatches occur, such as detected power usage where no power usage is expected. Mismatches may indicate the presence of malware executing on the FPGA.
Abstract:
Systems and methods to for wireless power transfer are provided. A transmit control module generates a sequence of resonant drive frequencies for a transmit coil. The transmit control module adjusts the resonant frequency of the transmit coil according to the sequence of resonant drive frequencies. A receive control module provides payment verification to the transmit control module and receives the sequence of resonant drive frequencies from the transmit control module in return. The receive control module adjusts a resonant frequency of a receive coil according to the sequence of resonant drive frequencies to match the resonant frequency of the transmit coil. The resonant frequencies of the transmit and receive coils change at the same time to maintain coupling and efficient power transfer.
Abstract:
Systems and methods to wirelessly transmit power are provided. A power delivery system may include a central controller assembly and a transmit assembly. The central controller assembly can form transmit coils in the transmit assembly. The central controller assembly can also receive information from devices coupled to the transmit assembly and optimize the transmit coils based on the received information and on information about the transmit assembly.
Abstract:
Systems and methods to for wireless power transfer are provided. A transmit control module generates a sequence of resonant drive frequencies for a transmit coil. The transmit control module adjusts the resonant frequency of the transmit coil according to the sequence of resonant drive frequencies. A receive control module provides payment verification to the transmit control module and receives the sequence of resonant drive frequencies from the transmit control module in return. The receive control module adjusts a resonant frequency of a receive coil according to the sequence of resonant drive frequencies to match the resonant frequency of the transmit coil. The resonant frequencies of the transmit and receive coils change at the same time to maintain coupling and efficient power transfer.
Abstract:
In one example embodiment, live migration in a datacenter may include JIT compiling a process that is configured to be executed on both a source instruction set architecture and a destination instruction set architecture, mapping variables and address stacks of the process on both the source instruction set architecture and the destination instruction set architecture into a labeled form thereof, and mapping the labeled form of the variables and address stacks onto the destination instruction set architecture.
Abstract:
Technologies are generally described for systems, devices and methods effective to identify an individual. In some examples, a microphone may receive sound data such as sound that may be present in a mall. A processor, that may be in communication with the microphone, may determine a name from the sound data. Stated differently, the processor may determine that the name is part of or included in the sound data. The processor may generate a query based on the name and may send the query to a social network database. The processor may receive a response to the query from the social network database and may identify the individual based on the response.
Abstract:
Technologies are directed to prevention of malicious attacks through cartography of co-processors at a datacenter. According to some examples, configuration data to create a co-processor at a field programmable gate array (FPGA) may be received at a configuration controller. The configuration controller may determine unused arrangements for the co-processor and unused placements at the FPGA corresponding to the unused arrangements. The used arrangements and the unused placements, associated with a type of the co-processor, may be stored in a configuration matrix. One of the unused arrangements and one of the unused placements corresponding to the selected unused arrangement may then be selected by the configuration controller to create the co-processor.