Abstract:
The present technology provides dynamic security code systems and method for their creation and use. The systems include a base layer including a first pattern and a sublimating compound layer including a plurality of materials selectively covering the base layer. In some embodiments, each of the plurality of materials is configured to sublimate at respective sublimation rates. The system further includes a shielding layer configured to shield the base layer and the sublimating compound layer to form a security code. The shielding layer can be configured to control a diffusion rate of the plurality of materials through the shielding layer such that the security code is changed.
Abstract:
Techniques for packet routing in an on-chip network are provided. In one embodiment, a method for routing packets in a multi-core processor including multiple cores connected by an on-chip network includes identifying ports that are incorrect while routing the packet. After receiving the packet at an input port, some of the ports are excluded from consideration while selecting the output port for the packet. The output port is selected from the remaining ports and the packet is routed to the selected output port.
Abstract:
Technologies are generally described for methods and systems effective to monitor a data access activity. In some examples, a method may include receiving, by a processor, a destination concept. The processor may identify a set of concepts, which may include the destination concept and at least one related concept associated with the destination concept, in an ontology. The processor may generate a planned path, which may define a first data access order associated with access of at least one of the related concepts and the destination concept, using the set of concepts. The processor may generate a browsing path which may define a second data access order associated with the data access activity. The processor may compare the planned path with the browsing path. The processor may determine a deviation based on the comparison of the planned path and the browsing path. The processor may monitor the data access activity using the deviation.
Abstract:
In some examples, a data storage on a cloud platform may be configured to provide cloud services access to general data while preserving the access right to private data. General data is accessible to all applications. The identity information of applications that may access private data may be stored on the data storage. When the identity information of a requesting application matches the identity information stored on the data storage, the cloud platform may grant the access to private data.
Abstract:
Technologies and implementations for facilitating channel-based communication via VOIP are generally disclosed. Example methods may include receiving a communication preference from the plurality Receive a Communication Preference from a Number of Mobile Devices of mobile devices, receiving a status identifier from the plurality of mobile devices and designating one or more of the plurality of mobile devices as belonging to a communication group based at least in part on the received communication preferences and the received Receive a Status Identifier from the Mobile Devices status identifiers.
Abstract:
A method performed under control of a cloud system including a first proxy terminal may include connecting the first proxy terminal with a first end device, receiving, from the first end device, a first information regarding the first end device, and estimating a second information regarding the first end device based at least in part on the first information regarding the first end device. The estimating is performed when the first end device is disconnected from the first proxy terminal.
Abstract:
Technologies are presented for distributing user interface elements and controls among devices. A user may select an element and/or control of a user interface (UI) of a first application displayed on a first device for shifting to one or more other devices. The additional display area at the first device freed up by the shift may be filled with additional application content or UI elements. The shifted element and/or control may remain usable on the one or more other devices the element and/or control shifted to. Overall, a user may be able to remove and redirect application control elements while viewing additional content on the first device in a fast and transparent process.
Abstract:
To get better deals in shopping goods or services, e.g., quantity discount, potential purchasers may be encouraged to buy multiple items on a shopping list together from one supplier at wholesale prices. One or more suppliers may receive the shopping list and provide total prices for the potential purchasers.
Abstract:
In some examples, a system configured to provide data storage is described. The system may include a write server configured to receive data from a first client for storing on the system and computer storage media configured to receive and to store the data. The system may also include a read server configured to receive the data from the write server and to store the data in the read server for a duration. The read server may be further configured to provide the data from the read server to a second client during the duration and, after the duration, to access the data from the computer storage media and to provide the data accessed from the computer storage media to the second client.
Abstract:
A disassembled battery and methods for disassembling the battery are provided. Holes are formed in an enclosure of the battery and a fluid is injected into the battery to inactivate an electrolyte inside the battery. The enclosure of the battery is then cut to define strips in the enclosure that can be peeled back to expose a core inside the battery. The core can be extracted and recycled.