Abstract:
Technologies are provided for shared secret generation between a server and a client using cached data. In some examples, a server may send a number of encrypted secrets to a client that caches a number of data blocks previously provided by the server. Each of the encrypted secrets may be encrypted using a data block that may or may not be cached at the client. The client may then identify the encrypted secrets that correspond to data blocks in its cache and use those data blocks to recover those secrets. The client may then encrypt a message for the server using the recovered secrets. Upon reception of the message, the server may then recover the message using its knowledge of the data blocks cached at the client.
Abstract:
Technologies related to location graph adapted video games are generally described. In some examples, location graphs may be generated for received environment inputs, such as received three dimensional (3D) models of environments. Video games may be adapted to generated location graphs, such as by placing video game content at nodes of location graphs. Video game and/or user parameters may be accommodated when adapting video games to location graphs.
Abstract:
Technologies are generally described for systems and methods effective to optimize vendors in a cloud computing environment. In an example, bundled services can be de-aggregated and a hierarchical tree can be generated showing the relationships between the service providers and infrastructure providers. When itemized bills are received from the service providers, the hierarchical tree can be used to match items from the itemized bills to specific infrastructure providers. A transaction report showing all the services rendered by the infrastructure providers can then be sent to the respective infrastructure providers to take advantage of discounts and bulk rates. In another example, a set of infrastructure providers that provide the services at the lowest cost can be determined, and the service providers can be configured or requested to switch to that set of infrastructure providers.
Abstract:
Technologies are generally described for display of a merged image on a display. According to some examples, a processor may receive first data that relates to a first image of a real object and second data that relates to a second image of a virtual object. The second image, if displayed, may overlap, in an overlap region, at least part of the first image if the first image were displayed. The processor may identify an overlap part in the first data that corresponds to the overlap region, clip the overlap part from the first data to produce clipped data, and blur the clipped data to produce blurred data. The processor may subtract the clipped data from the blurred data to produce an additive blur component, add the additive blur component to the second data to produce merged data, and generate the merged image to be displayed on the display based on the merged data.
Abstract:
Technologies related to intermediary graphics rendition are generally described. In some examples, an intermediary computing device may store graphics models in a model store. A server computing device may generate and send a compositing flow to the intermediary computing device. The compositing flow may comprise model identifiers and model rendering information. The intermediary computing device may retrieve models identified in the compositing flow from the model store, and provide the identified models and model rendering information to a Graphics Processing Unit (GPU) for rendering. The GPU may render graphics for delivery via a network to a client device.
Abstract:
Technologies are described herein for optimizing resource utilization in a collection of devices having hierarchical network layers. Some example technologies may identify packets exchanged between processes executed on collections of server computers. The hierarchical network layers may couple the collections of server computers. The technologies may determine virtual machine groups based on the identified packets. Each of the virtual machine groups may identify one or more virtual machines configured on the collections of server computers to execute one or more processes. The virtual machine groups may be configured to increase data traffic in a lower layer in the hierarchical network layers and to decrease the data traffic in a higher layer in the hierarchical network layers. The technologies may relocate the virtual machines between the collections of server computers according to the virtual machine groups.
Abstract:
Technologies are generally described for datacenter managed thread and multi-processing support. In some examples, a system may be provided for dynamic core allotment and provisioning within a server such that resources can be efficiently used to accomplish available work during lulls shorter than inter-server balancing time scales. A virtual machine manger (VMM) may enact core level provisioning and make optimal performance multi-processing information available via a virtual application programming interface (API) handler that receives and responds to messages sent to the VMM. The messages may not need to reach an external network and may therefore be exchanged at high speeds.
Abstract:
Technologies are provided for locally processing queue requests from co-located workers. In some examples, information about the usage of remote datacenter queues by co-located workers may be used to determine one or more matched queues. Messages from local workers to a remote datacenter queue classified as a matched queue may be stored locally. Subsequently, local workers that request messages from matched queues may be provided with the locally-stored messages.
Abstract:
Technologies are generally described for methods and systems configured to increase a range of a network. In an example, a method for increasing a range of a first network may include sending a request by a communication device to a network device while the communication device is in a range of the first network. The request may include a request for discovery data that identifies the first network. The method may further include receiving, by the communication device, the discovery data. The method may further include broadcasting, by the communication device, information based on the discovery data when the communication device is outside the range of the first network and when the communication device is configured to communicate over a second network. The second network may be different from the first network.