Abstract:
Technologies are generally described for controlling remote display. In some examples, a method for controlling a remote display device using a handheld computing device includes receiving, by a handheld computing device, one or more data from one or more remote display devices over a wireless communication network, selecting a remote display device based on the received data and sending a control signal to the selected remote display device.
Abstract:
Technologies are generally described for providing an encryption method using real-world objects. In some examples, a method may include capturing, by a first electronic device, an external object, generating an object signal associated with the external object, generating an encryption key based on the object signal, and transmitting data encrypted by the encryption key to a second electronic device.
Abstract:
Technologies are generally described for an aggregation of bandwidth from multiple wireless devices. In some examples, a source device may communicate with a destination device at a first bandwidth. The source device may divide data into a first piece and a second piece. The source device may transmit the first piece to a first wireless device and the second piece to a second wireless device over a first network. The first wireless device and second wireless device may communicate with the destination device at a second bandwidth and a third bandwidth respectively. The first bandwidth may be less than an aggregation of the second bandwidth and the third bandwidth. The first wireless device may transmit the first piece over a second network, different from the first network, to the destination device. The second wireless device may transmit the second piece over a third network, different from the first network, to the destination device.
Abstract:
A polymer includes a linker represented by Formula I ([OR1OCH2OR2OCH2]m), where R1 and R2 are, independently, alkylene, alkenylene, arylene, heteroarylene, or alkylarylalkylene; and the polymer has a weight average molecular weight of about 500 g/mol to about 2,000,000 g/mol, and m is 1 to 1000.
Abstract translation:聚合物包括由式I([OR 1 OCH 2 OR 2 OCH 2] m)表示的连接体,其中R 1和R 2独立地为亚烷基,亚烯基,亚芳基,亚杂芳基或烷基芳基亚烷基; 聚合物的重均分子量为约500g / mol至约2,000,000g / mol,m为1至1000。
Abstract:
Embodiments of the disclosure set forth energy storage devices. Some example energy storage devices include a first hybrid capacitor, a first battery and an electric double-layer capacitor. The first hybrid capacitor includes a first positive electrode, a first negative electrode and a first electrolyte. The first battery couples to the first hybrid capacitor and includes a second positive electrode, a second negative electrode and a second electrolyte. The electric double-layer capacitor couples to the first battery and includes a third positive electrode, a third negative electrode and a third electrolyte. The first positive electrode includes the second positive electrode.
Abstract:
Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing storage device are in encrypted form before that data is transferred to another device or over a network. In some examples, the methods, data processing devices and computer readable media may be arranged to encrypt the data passed to the network when the data stored in the backing storage device is in unencrypted form. Also disclosed are methods, data processing devices and computer readable media that identify when the data stored in the backing storage device is in unencrypted form, including methods that may detect that the data may appear to be in encrypted form as a result of the data being compressed.
Abstract:
Technologies are generally provided for conveying tree and index needs of a database by collecting and forwarding a statistically representative set of data requests so that a new datacenter can use its existing auto-learning and adjustment techniques to create local indices before receiving its first real or live requests. In some examples, requests at an origin datacenter may be collected to provide a small population of queries that are representative of a larger population of queries. Filters anonymizers may be employed to adhere to data sharing rules and restrictions while still allowing a new datacenter to build indices and test performance. Thus, the new datacenter may be trained asynchronously from another site and without actual data changing hands. Training and testing of destination database services may be completed before committing to customer migration.
Abstract:
Technologies related to cache-influenced video games are generally described. In some examples, the content of video game outputs as experienced by players of a video game may be adaptively modified to make more effective use of digital assets that are loaded in a computing system cache. Cache-influenced video games may increase cache use by increasing use, within a video game, of digital assets in a cache relative to assets not in the cache, e.g., assets that are on disk or in database storage. Cached digital assets can be retrieved more efficiently than assets stored elsewhere, and therefore video game performance may be improved.
Abstract:
Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a mobile operating server may include determining whether there is an authenticated wireless access point around a mobile device, if there is no authenticated wireless access point, determining whether there is a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device and if there is a non-authenticated wireless access point whose capacity is over the predetermined value, instructing the mobile device to connect to a wireless local area network provided by the non-authenticated wireless access point.
Abstract:
Technologies are generally described for systems methods, and devices related to core affinity bitmask translation. An example system may include first, second, third and fourth cores, and a dispatcher. The dispatcher may be configured to receive a first request where the first request include a core affinity bitmask and instructions. The core affinity bitmask can identify at least the first core and the second core. The dispatcher may be configured to determine a first affinity between the first core and the second core. The dispatcher may then identify the third core and the fourth core as having similar affinity to achieve a substantially similar performance. The dispatcher may also be configured to generate a second request that includes a translated core affinity bitmask. The translated core affinity bitmask may be effective to identify the third core and the fourth core as appropriate cores to execute the instructions.