Abstract:
Technologies are described for health monitoring using snapshot backups through test vectors. In some examples, health of an application deployed at a datacenter may be monitored and key metrics recorded in the metadata of progressive backup snapshots of an instance of the application such that warning metrics can be reviewed retrospectively upon failure of the instance and a snapshot can be automatically selected for restoration of the application instance based on lack of high incidence of suspect metric values. Moreover, an operating state associated with snapshot backups may be assessed as the snapshots are captured and selected ones with operating conditions desired as part of a test suite may be saved for use as test scenarios. In particular, state information from added or existing deployment monitoring may be used by a test logic process to evaluate whether each snapshot is needed for testing scenarios.
Abstract:
Technologies related to observer filtered activity recommendations are generally described. In some examples, a computing device may collect activity and observer information for a device user, may identify limited observer activities, and may generate observer filtered activity recommendations for the device user, the observer filtered activity recommendations corresponding to the identified limited observer activities. Observer filtered activity recommendations may optionally be restricted in the presence of current observers outside a limited observer group. In some examples, the computing device may provide automated access to observer information and/or to observer filtered activity information to enable observer filtered activity recommendations by applications accessing the observer information and/or the observer filtered activity information.
Abstract:
Technologies are generally described for systems, devices and methods effective to schedule access to a core. In some examples, a first differential voltage frequency scaling (DVFS) value of a first virtual machine may be received by a virtual machine manager. A second DVFS value of a second virtual machine may be received by the virtual machine manager. A third DVFS value of a third virtual machine may be received by the virtual machine manager. The third DVFS value may be substantially the same as the first DVFS value and different from the second DVFS value. A dispatch cycle may be generated to execute the first, second and third virtual machines on the core. After execution of the first virtual machine, the dispatch cycle may require execution of the third virtual machine before execution of the second virtual machine.
Abstract:
Technologies are generally described for a three dimensional user interface in augmented reality. In some examples, a method for generating a virtual object in a display area may include generating a first virtual object in the display area with use of at least two viewing cones generated by a display. The method may further include receiving spatial data that relates to a location of a real object in the display area and determining that the real object is interfering with at least one of the viewing cones. The method may further include generating a second virtual object corresponding to the first virtual object. The second virtual object may be located between the display and the location of the real object.
Abstract:
Technologies are generally described for systems and methods for reconfiguring a programmable circuit. An accelerator reconfiguration device may detect a trigger. The trigger may indicate that a command has been sent to a processor to switch from execution of a first virtual machine to a second virtual machine. In response to detecting the trigger, the reconfiguration device may identify a programmable circuit and program for the programmable circuit associated with the second virtual machine. The reconfiguration device may further generate a write command to write the program to the programmable circuit.
Abstract:
In one example embodiment, an instance of a virtual machine to evict may be identified. A determination may be made within a predetermined range of probabilities, that processing on the identified instance of the virtual machine will resume within a predetermined range of time. Thus, the identified instance of the virtual machine may be softly evicted by allocating processing resources away from the identified instance of the virtual machine, receiving an instruction to resume the processing on the identified instance of the virtual machine, and restoring the processing on the identified instance of the virtual machine.
Abstract:
Technologies are generally described to develop and implement a searchable knowledge source to identify distributed user interface (DUI) elements. In some examples, a DUI identification system may receive a control record of an application and populate one or more searchable knowledge sources based on an application description retrieved. The application description may include keywords, input elements, and output elements, and the searchable knowledge sources may be generated from control records of a multitude of applications. The DUI identification system may execute a query on the searchable knowledge sources based on the received keywords, input elements, and output elements associated with a target workflow from a requesting client. A query result that includes one or more DUI elements may be provided to the requesting client. The DUI elements may connect the input elements to corresponding output elements and match the keywords associated with the target workflow.
Abstract:
Technologies are generally described for systems, devices and methods effective to schedule access to a core. In some examples, a first differential voltage frequency scaling (DVFS) value of a first virtual machine may be received by a virtual machine manager. A second DVFS value of a second virtual machine may be received by the virtual machine manager. A third DVFS value of a third virtual machine may be received by the virtual machine manager. The third DVFS value may be substantially the same as the first DVFS value and different from the second DVFS value. A dispatch cycle may be generated to execute the first, second and third virtual machines on the core. After execution of the first virtual machine, the dispatch cycle may require execution of the third virtual machine before execution of the second virtual machine.
Abstract:
Technologies are provided for locally processing queue requests from co-located workers. In some examples, information about the usage of remote datacenter queues by co-located workers may be used to determine one or more matched queues. Messages from local workers to a remote datacenter queue classified as a matched queue may be stored locally. Subsequently, local workers that request messages from matched queues may be provided with the locally-stored messages.