Abstract:
Technologies are provided to automatically vary a structure of a netlist computation arranged to configure a field programmable gate array (FPGA). In an example scenario, an FPGA netlist may be received from a client to configure the FPGA. A perturbation generator may be activated in response to a detection of one or more security risk factors associated with the netlist. The netlist may be altered through schemes designed to repair one or more FPGAs. The repair schemes may be used to repair the FPGAs to work around failed cells and failed sub-cells. The perturbation generator may produce a false map of failed cells. The false map may be used to generate different timings and different intermediate values associated with the netlist to generate an alternate netlist. The alternate netlist may be used to configure the FPGA to prevent side channel attacks.
Abstract:
Technologies related to secure system time reporting are generally described. In some examples, responses to some system time requests may be manipulated to prevent leaking information that may be of interest for timing attacks, while responses to other system time requests need not be manipulated. In particular, responses to system time requests that are separated from a previous system time request by a predetermined minimum value, or less, may be manipulated. Responses to system time requests that are separated from a previous system time request by more than the predetermined minimum value need not be manipulated. Furthermore, secure system time reporting may be adaptively deployed to servers in a data center on an as-needed basis.
Abstract:
Technologies may be provided related to customization and delivery of atlases matched to hardware of a client device in real-time. In some examples, a system according to embodiments may perform an assessment of the target hardware, generate atlases matched to the target hardware, and modify application code to reference graphic assets in their new locations in the modified atlases. An increase in speed of application loading, an increase in speed of resource delivery, a reduction of memory consumption on the client device, and/or an increase in the client device frame rate may be achieved by matching the atlases to attributes of the video hardware.
Abstract:
Technology is described for user assembly of lightweight user interfaces for games, e.g., massively multiplayer online games. The technology can include a set of pre-selectable action modules; an interface element, a messaging element, and a display element for each pre-selectable action module; and a component configured to enable a user to select a subset from the set of pre-selectable action modules. A first subset of the pre-selectable action modules can provide a different user interface than a second subset of the pre-selectable action modules when at least one pre-selectable action module is in the first subset but not the second subset. Action modules may be capable of communicating using a messaging platform with at least one server computing device and relates to a massively multiplayer online gaming system operating at a server computing device.
Abstract:
Technologies are generally provided to integrate hardware accelerators in datacenters. In some examples, a datacenter customer may provide a hardware accelerator configuration to be implemented at a datacenter. The hardware accelerator configuration may include, for example, one or more customer accelerator blocks and one or more accelerator blocks. The datacenter may retrieve the accelerator block(s), integrate the accelerator block(s) with the customer accelerator block(s) to form the hardware accelerator, and then implement the hardware accelerator. In other examples, the datacenter may charge the customer for use of the accelerator block(s), but refrain from providing the accelerator block(s) to the customer.
Abstract:
Technologies are generally provided to switch virtual machines based on processor power states. In some examples, a virtual machine manager (VMM) may determine that a processor configured to execute a first virtual machine (VM) is to execute a VM switch, and cause the processor to enter a low-power state and store a first VM state. The VMM, which may be a VM itself, may then replace the stored first VM state with a second VM state and cause the processor to exit the low-power state. When the processor exits the low-power state, it may load the second VM state and execute a second VM.
Abstract:
Technologies are generally described to employ network tomography to detect an uncooperative device and identify services associated with the uncooperative device. In some examples, employing network tomography over a probed network segment between two or more cooperative devices may enable an activity of cooperative and/or any uncooperative device(s) on the network to be profiled. A service finder application may then be executed to compare an activity profile of the uncooperative device against activity profiles of known network devices within an identification database to identify one or more services. Action strategies may then be determined within an action database, and an action may be suggested to enable cooperation and cross-use of the uncooperative device within the network based on recognized services. Example action strategies may include enabling installation of software, prompting of a user to perform an action, and/or arranging for cooperation.
Abstract:
Technologies are generally described to provide a fail-safe licensing system. An example system may include a quorum detection module of an instance of a software program configured to query a licensing queue corresponding to the software program for messages to determine a number of active instances of the software program. Based on a comparison of the determined number of active instances and a maximum number of allowed instances of the software program, the quorum detection module may be configured to determine whether the instance of the software program is authorized. In response to a determination that the instance of the software program is authorized, the quorum detection module may generate a unique instance identification tag and post a message to the licensing queue, where the message includes an indication that the instance of the software program is active and an indication of the generated unique instance identification tag.