COMPUTING RESOURCE PROVISIONING BASED ON DEDUPLICATION
    261.
    发明申请
    COMPUTING RESOURCE PROVISIONING BASED ON DEDUPLICATION 有权
    基于配偶的计算资源规定

    公开(公告)号:US20150154219A1

    公开(公告)日:2015-06-04

    申请号:US14372407

    申请日:2013-12-02

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F17/30156 G06F9/45558 G06F9/5072 G06F2009/4557

    Abstract: Technologies are generally described for systems, devices and methods effective to provision computing resources based on deduplication. In an example, a resource cost may be produced. The resource cost may relate to execution of a first virtual machine at a data center. A processor may receive a first representation related to an image of the first virtual machine. The processor may receive a second representation related to one or more instances of second virtual machines being executed by the data center. The processor may compare the first and second representations to produce a deduplication value for the first virtual machine. The processor may transform the deduplication value to produce the resource cost.

    Abstract translation: 一般来说,针对有效地根据重复数据删除来提供计算资源的系统,设备和方法来描述技术。 在一个示例中,可以产生资源成本。 资源成本可能涉及数据中心处的第一虚拟机的执行。 处理器可以接收与第一虚拟机的图像有关的第一表示。 处理器可以接收与由数据中心执行的第二虚拟机的一个或多个实例有关的第二表示。 处理器可以比较第一和第二表示以产生第一虚拟机的重复数据删除值。 处理器可以转换重复数据删除值以产生资源成本。

    DATACENTER HEALTH ANALYSIS USING DNS SWITCHING
    262.
    发明申请
    DATACENTER HEALTH ANALYSIS USING DNS SWITCHING 有权
    使用DNS切换的DATACENTER健康分析

    公开(公告)号:US20150127816A1

    公开(公告)日:2015-05-07

    申请号:US14238457

    申请日:2013-05-13

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for monitoring application health in datacenters through load rebalancing. In some examples, a domain name server (DNS) module may cyclically vary load provided to an application instance. A monitoring module may then measure application output data and/or parameters associated with the processing of the load by the application based on a difference or a comparison between parts of the cyclical load variation. The monitoring module may use the measured data/parameters to both determine the health of the application instance and to cause the DNS module to adjust the periodic variation of the load.

    Abstract translation: 技术通常用于通过负载重新平衡来监视数据中心中的应用程序运行状况。 在一些示例中,域名服务器(DNS)模块可以循环地改变提供给应用实例的负载。 然后,监测模块可以基于周期性负载变化的部分之间的差异或比较来测量由应用程序与负载处理相关联的应用输出数据和/或参数。 监控模块可以使用测量的数据/参数来确定应用实例的健康状况,并使DNS模块调整负载的周期性变化。

    AUTOMATIC FLIGHT CONTROL FOR UAV BASED SOLID MODELING
    263.
    发明申请
    AUTOMATIC FLIGHT CONTROL FOR UAV BASED SOLID MODELING 有权
    基于无人机的固体建模自动飞行控制

    公开(公告)号:US20150112516A1

    公开(公告)日:2015-04-23

    申请号:US14574329

    申请日:2014-12-17

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for controlling a flight path of a UAV based image capture system for solid modeling. Upon determining an initial movement path based on an estimate of a structure to be modeled, images of the structure to be modeled may be captured and surface hypotheses formed for unobserved surfaces based on the captured images. A normal vector and a viewing cone may be computed for each hypothesized surface. A set of desired locations may be determined based on the viewing cones for the entire structure to be modeled and a least impact path for the UAV determined based on the desired locations and desired flight parameters.

    Abstract translation: 通常描述了用于控制用于实体建模的基于UAV的图像捕获系统的飞行路径的技术。 在基于要建模的结构的估计确定初始移动路径时,可以捕获要建模的结构的图像,并且基于捕获的图像为未观察的表面形成表面假设。 可以为每个假设的表面计算法向量和视锥。 可以基于待建模的整个结构的观察圆锥和基于所需位置和期望的飞行参数确定的UAV的最小冲击路径来确定一组期望的位置。

    MANAGEMENT OF HARDWARE ACCELERATOR CONFIGURATIONS IN A PROCESSOR CHIP
    265.
    发明申请
    MANAGEMENT OF HARDWARE ACCELERATOR CONFIGURATIONS IN A PROCESSOR CHIP 审中-公开
    加工芯片中硬件加速器配置的管理

    公开(公告)号:US20140380025A1

    公开(公告)日:2014-12-25

    申请号:US14123231

    申请日:2013-01-23

    Inventor: Ezekiel Kruglick

    Abstract: Techniques described herein generally include methods for the management of hardware accelerator images in a processor chip that includes one or more programmable logic circuits. Hardware accelerator images may be optimized by swapping out which hardware accelerator images are implemented in the one or more programmable logic circuits. The hardware accelerator images may be chosen from a library of accelerator programs downloaded to a device associated with the processor chip. Furthermore, the specific hardware accelerator images that are implemented in the one or more programmable logic circuits at a particular time may be selected based on which combination of accelerator images best enhances performance and power usage of the processor chip.

    Abstract translation: 本文描述的技术通常包括用于管理包括一个或多个可编程逻辑电路的处理器芯片中的硬件加速器图像的方法。 可以通过交换在一个或多个可编程逻辑电路中实现哪些硬件加速器图像来优化硬件加速器图像。 可以从下载到与处理器芯片相关联的设备的加速器程序库中选择硬件加速器图像。 此外,可以基于哪个加速器图像的组合最佳地增强处理器芯片的性能和功率使用来选择在特定时间在一个或多个可编程逻辑电路中实现的特定硬件加速器图像。

    DATACENTER APPLICATION PACKAGES WITH HARDWARE ACCELERATORS
    266.
    发明申请
    DATACENTER APPLICATION PACKAGES WITH HARDWARE ACCELERATORS 审中-公开
    DATACENTER应用包与硬件加速器

    公开(公告)号:US20140351811A1

    公开(公告)日:2014-11-27

    申请号:US14234380

    申请日:2013-05-24

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F9/45558 G06F2009/45562

    Abstract: Technologies are generally described for providing application packages with hardware accelerators. In some examples, an application package for a datacenter may include an application and multiple hardware accelerators associated with the application. Each hardware accelerator may be configured for a different datacenter hardware configuration. When a datacenter receives the application package, it may select the appropriate hardware accelerator for implementation based on its hardware configuration.

    Abstract translation: 技术通常被描述为提供具有硬件加速器的应用程序包。 在一些示例中,用于数据中心的应用程序包可以包括应用程序和与应用程序相关联的多个硬件加速器。 可以为每个硬件加速器配置不同的数据中心硬件配置。 当数据中心收到应用程序包时,它可以根据硬件配置选择适当的硬件加速器进行实施。

    VIRTUAL MACHINE MONITOR (VMM) EXTENSION FOR TIME SHARED ACCELERATOR MANAGEMENT AND SIDE-CHANNEL VULNERABILITY PREVENTION
    268.
    发明申请
    VIRTUAL MACHINE MONITOR (VMM) EXTENSION FOR TIME SHARED ACCELERATOR MANAGEMENT AND SIDE-CHANNEL VULNERABILITY PREVENTION 有权
    虚拟机监视器(VMM)延长时间分配的加速器管理和侧面通道易损性预防

    公开(公告)号:US20140189862A1

    公开(公告)日:2014-07-03

    申请号:US13885160

    申请日:2012-12-27

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F21/55 G06F9/5027 G06F21/556

    Abstract: Technologies are presented for automatically generating accelerator code for datacenter users, detecting multiple hardware tenants with overlapping accelerator needs, and managing the accelerator needs of the tenants so that they can share use of programmable accelerator hardware. In some examples, the accelerator code may also be customer supplied. In other examples, a delay that simulates accelerator programming for a user first accessing an accelerator that was virtualized from a pre-existing one may be applied. By simulating the delay, co-location detection (a form of side channel attack) may be prevented.

    Abstract translation: 提供了用于为数据中心用户自动生成加速器代码的技术,检测具有重叠加速器需求的多个硬件租户,以及管理租户的加速器需求,以便他们可以共享可编程加速器硬件的使用。 在一些示例中,加速器代码也可以是客户提供的。 在其他示例中,可以应用模拟用户首先访问从预先存在的加速器虚拟化的加速器的加速器编程的延迟。 通过模拟延迟,可以防止协同位置检测(侧向信道攻击的形式)。

    DETECTING MATCHED CLOUD INFRASTRUCTURE CONNECTIONS FOR SECURE OFF-CHANNEL SECRET GENERATION
    269.
    发明申请
    DETECTING MATCHED CLOUD INFRASTRUCTURE CONNECTIONS FOR SECURE OFF-CHANNEL SECRET GENERATION 有权
    检测匹配的云基础设施连接以确保安全的通道密码生成

    公开(公告)号:US20140164768A1

    公开(公告)日:2014-06-12

    申请号:US13876766

    申请日:2012-12-12

    Inventor: Ezekiel Kruglick

    Abstract: Technology is described for two parties, by leveraging previously established secure connections with third parties, to obtain a shared secret for generating a secure connection with each other in a way that reduces vulnerability to man-in-the-middle attacks. In some examples, the technology can include generating a session identifier; coordinating use of the session identifier by the two parties; finding an available secure communication channel to a third party; transmitting the session identifier to the third party via the available secure communication channel; receiving, via the available secure communication channel, a third party identifier and a session identifier-specific secret; sharing information about the received third party identifier; determining that the received third party identifier matches a third party identifier received by the second party; and using the session identifier-specific secret received with the matching third party identifier to generate a cryptographic key to secure communication between the two parties.

    Abstract translation: 技术被描述为双方,通过利用先前建立的与第三方的安全连接,以获得共享密钥,以减少对中间人攻击的脆弱性的方式相互产生安全连接。 在一些示例中,该技术可以包括生成会话标识符; 协调双方使用会议标识符; 找到一个可用的安全通信频道给第三方; 经由可用的安全通信信道向第三方发送会话标识符; 通过可用的安全通信信道接收第三方标识符和会话标识符特定秘密; 共享关于所接收的第三方标识符的信息; 确定所接收的第三方标识符与由第二方接收的第三方标识符匹配; 以及使用与匹配的第三方标识符接收的会话标识符特定秘密来生成加密密钥以保证双方之间的通信。

Patent Agency Ranking