Abstract:
Technologies are generally described for providing rapid data encryption and decryption for secure communication over an open channel with plausible deniability. In some examples, a single bit of information may be encoded by many alternative combinations of bits thus providing high security as well as enabling a single ciphertext to encrypt several different plaintexts of the same length simultaneously. The ability to encrypt several different plaintexts of the same length simultaneously may allow plausible deniability of messages. Encryption speed may be enhanced through accumulation of useful bit sets with desired properties in advance for later use. When the need arises, several plaintexts of the same size may be encrypted into a single ciphertext using accumulated bit combinations corresponding to different secret keys.
Abstract:
A health sensing device is described for placement on a user. The device may include a sensor, a filter, and a transmitter. The sensor is configured to sense one or more factors relating to an indicator of a health related condition or occurrence. The filter is configured to evaluate a signal from the sensor and determine if the indicator has been detected. The transmitter is arranged for initiating a transmission based on a signal from the filter. The sensor can include one or more microphone devices, accelerometers, and/or MEMS devices. A method of monitoring a user for a health related condition is also described.
Abstract:
Techniques for verifying work performed by untrusted computing nodes are provided. A central computing system determines a first computation that is to be performed, at least in part, by a first untrusted computing node. The central computing system also determines a transformation function that is applied to the first computation to produce an equivalent second computation that is to be performed, at least in part, by a second untrusted computing node. The central computing system assigns the first computation to the first untrusted computing node and the second computation to the second untrusted computing node while keeping the transformation function secret. The central computing system receives a first result for the first computation and a second result for the second computation. The central computing system analyzes the first and second results to verify the work performed by the first and second untrusted computing nodes.
Abstract:
Technologies are generally described for an invitation management scheme. In some examples, an application provider server may include an invitation request receiver unit configured to receive, from an account of a first user, a request to invite a second user to use an application; an interest determination unit configured to determine whether the second user is inclined to use the application based at least in part on behavior information regarding activity in an account of the second user that includes a number of invitations sent to the account of the second user that remain pending; a notification generation unit configured to generate an invitation to be sent to the account of the second user after the interest determination unit determines that the second user is inclined to use the application; and a notification transmitter unit configured to transmit the generated invitation to the account of the second user.
Abstract:
Technologies are presented for managing a resource demand on a data center providing game services by adjusting a probability of various kinds of game events. Data center load data may be received and used to adjust occurrence tables associated with both one-off and lengthy game events that may direct game clients toward events that may involve lesser resource demand. Contrary to conventional load balancing for non-gaming applications, the methods described herein may take advantage of the pseudorandom event nature that may be a part of a game experience in gaming applications. The resource demand may be altered without changing the number of customers served or the quality of service provided. Thus, resource management may be enhanced while serving the same number of customers.
Abstract:
Technologies related to continuous world switch security are generally described. In some examples, a world switch indicator may indicate whether continuous world switch security is on or off for a cloud customer. A hypervisor world switch security setting may be activated and deactivated, according to the world switch indicator, to optionally allow world switches and not context switches between virtual machines executed by a cloud server. Continuous world switch security may optionally be controlled by a cloud customer. Load balancing, cloud customer billing and other techniques are also disclosed to accommodate the activation/deactivation of continuous world switch security.
Abstract:
Modified lignin having covalently attached phosphorous containing groups and methods for preparing such compounds are described herein. The modified lignin described herein provides a renewable source of flame retardant material.
Abstract:
Technologies related to social network recruiting alerts are generally described. Passive recruiting targets may be registered, and a set of contacts linked to the passive recruiting target in a social network graph may be monitored. Recruiting alerts may be generated in response to changes in social network profile data associated with the set of contacts.
Abstract:
Technologies are generally described for methods and systems effective to implement hybrid routers in multicore architectures. A first tile may include a processor core, a cache configured to be in communication with the processor core and a router configured to be in communication with the cache. The router may be effective to move data with a packet switching channel or a circuit switching channel. The first tile may include switching logic configured to be in communication with the cache and the router. The switching logic may be effective to receive a routing objective that may relate to energy or delay costs in routing data through the network. The switching logic may select one of the packet switching channel or the circuit switching channel to move the data through the network based on the routing objective.
Abstract:
Examples include autonomously authenticating a financial transaction, on behalf of the user, without interacting with the user, via wireless communication link. In various embodiments, the user's cellular phone may be configured to process a message that provides at least partial service context and autonomously authenticate the financial transaction.