Abstract:
Technologies are generally described herein for electrocaloric effect heat transfer devices and methods effective to facilitate thermal energy transfer while mitigating mechanical stresses caused by expansion or contraction of electrocaloric effect material layers during thermal energy transfer operations. Some example heat transfer devices may include heat transfer stacks with at least two electrocaloric effect materials. Expanding electrocaloric effect material and contracting electrocaloric effect material are utilized to cancel the aggregate longitudinal dimensional change during application of an electric field. Some example heat transfer devices may utilize segmented electrocaloric effect material layers with stress relief gaps separating segments to mitigate delamination stress caused by lateral expansion or contraction of the electrocaloric effect material.
Abstract:
Technologies are provided for function-targeted virtual machine switching. In some examples, function usage times on a virtual machine (VM) may be profiled by a virtual machine manager (VMM) and used to manage VM switching in order to preferentially switch VMs during specific targeted functions. The targeted functions and/or VM switching preferences may be adjusted over time in order to provide switching unpredictability, for example to frustrate side-channel attackers by forcing the attackers to gather data for much longer periods of time (e.g., weeks or months) if they want to detect or attack.
Abstract:
Technologies are generally described for providing full-motion animation-as-a-service. In some examples, short motion-capture segments may be captured from user motion user interface devices and stored in a database. When a full-motion animation is desired, a start pose and a target pose may be provided, and a multiple-path, multiple-iteration search through the database may be used to assemble the full-motion animation. Motion retargeting may be used to further refine the assembled full-motion animation.
Abstract:
Technologies are generally described for providing a system that allows data use clients direct access to perform complex analysis on data assets without compromising the assets by sharing the data contained may set up the data assets in virtual datacenters (VDCs) within a physical datacenter and open additional resources within the VDCs to data use clients. The data use clients may be enabled to upload and execute analysis applications with access to valuable data. Data traffic exiting the VDCs through such applications however, ma be controlled by a supervisor that analyses an output and enforces limitations on content and/or volume based on a level of purchased access.
Abstract:
Technologies are described herein to manage the replacement of routing rules. Some example technologies may receive a request to replace one or more active rules in a routing device with one or more stored rules. Each of the active rules and the stored rules may specify a routing rule that specifies how to route packets within a network. The active rules may be routing rules that are actively being used by the routing device. The stored rules may be routing rules that are not currently in use by the routing device. A determination may be made as to whether a number of active rule replacements for the routing device exceeds a threshold. In response to determining that the number of the active rule replacements exceeds the threshold, the request to replace the one or more active rules in the routing device may be denied.
Abstract:
Technologies are generally provided to induce datacenter pricing stability. In some examples, a stabilizer module at a datacenter may be configured to monitor a customer demand for resources from the datacenter and real-time pricing for the demanded resources. The stabilizer module may detect an impending pricing instability in response to increased demand for resources, and may determine an incremental cost to provide the resources based on a determined linearity for available resources. The stabilizer module may determine combinations of linear and non-linear resources to offer to the customers based on a stability metric computed from the incremental cost and the resource demand, where the combination of resources to offer may have a more linear increase in cost per resource compared to one of the demanded resources.
Abstract:
Examples are disclosed for executing vertical handovers of wireless devices configured to couple with heterogeneous wireless networks. In some examples, wireless devices on separate heterogeneous networks may be swapped between the heterogeneous networks.
Abstract:
Technologies are generally described to redirect data from application sandboxes to datacenters. In some examples, an application operating in an application sandbox may exchange data with an application data store, such as a file or a directory, also located in the sandbox. The data store may then exchange data with a datacenter at a particular geographic locale over a network connection established by a sandbox data servicer module. The network connection may be periodically updated to connect the data store with different datacenters at different geographic locales based on geographic information associated with the application, a device on which the application executes, the datacenters, and/or the exchanged data.
Abstract:
Technologies are generally provided for a system to enhance security and prevent side channel attacks of targeted functions. Side channel attacks assume that the targeted functions operate at same speed each time, and observe timing data of the targeted functions to glean secure information. According to some examples, an enhanced security system may alter a processing speed of one or more subunits of a processor executing the targeted function(s) to transparently change an instantaneous performance of the processor in an unpredictable manner. The performance time of the targeted function(s) may thereby be randomized. A virtual machine manager (VMM) may identify a security risk for a targeted function, and trigger one or more subunits of the processor to operate at a reduced frequency. After completion of the targeted function, the subunits may be returned to a default performance speed.