Abstract:
Technologies are generally described for personalizing an electronic game. In some examples a method for personalizing an electronic game may include intercepting content, extracting particular content from the intercepted content, and personalizing the electronic game based on the extracted content.
Abstract:
Technologies are generally described for providing datacenter border-issued analytics for monitoring federated services. In some examples, a deployment manager, which manages placement of application deployment instances across a federation and thus already knows which datacenter each instance is in, may register a package trigger with a gateway at each datacenter when an application is placed in each datacenter. The datacenter gateway(s) may then search through data packets for registered package properties such as content of a packet header that indicates it is a monitoring packet, and inject additional data according to instructions from the deployment manager. For example, the deployment manager may instruct the gateway(s) to inject a datacenter identifier or a network location identifier to each monitoring data packet. The additional data may be customer-defined and the modified monitoring data including the additional data may be sent to a monitoring system to be analyzed.
Abstract:
Technologies for recycling rechargeable batteries are described. For example, a rechargeable battery may be recycled through a cycle that includes one or more of determining a battery condition while the rechargeable battery may be used in a networkable device, updating a rechargeable battery database with the battery condition over a network, determining recycling instructions, and outputting the recycling instructions on the networkable device. In other examples, multiple rechargeable batteries may be recycled by receiving battery conditions and identification codes over a network, updating a rechargeable battery database with battery conditions and identification codes, and assigning rechargeable batteries to recycling processes according to battery conditions and identification codes.
Abstract:
Technologies related to shared secret identification for secure communication are generally described. In some examples, devices may exchange hashes, such as file deduplication hashes, to identify a matching hash. The identified matching hash represents a shared data item which may be used as a shared secret to encrypt and/or decrypt subsequent secure communications between the devices. Each device retrieves the shared data item from its respective secure memory and may use the shared data item to encrypt and/or decrypt subsequent secure communications. An eavesdropper may observe the hash exchange, but will not be able to decrypt the secure communications without access to the shared data item, because hashes may be effectively non-invertible.
Abstract:
Technologies related to scene analysis for improved eye tracking are generally described. In some examples, detected gaze targets may be derived from gaze direction information from an eye-facing sensor. Detected gaze target positions and/or motion may be improved by capturing and analyzing digital scene information from a scene visible by the eye. Digital scene information captured by a digital camera may be analyzed to identify potential gaze targets, such as stationary gaze targets, moving gaze targets, and/or accelerating gaze targets. Detected gaze targets may be modified to positions of selected gaze targets.
Abstract:
Technologies are generally described for providing a system that allows data use clients direct access to perform complex analysis on data assets without compromising the assets by sharing the data contained may set up the data assets in virtual datacenters (VDCs) within a physical datacenter and open additional resources within the VDCs to data use clients. The data use clients may be enabled to upload and execute analysis applications with access to valuable data. Data traffic exiting the VDCs through such applications however, ma be controlled by a supervisor that analyzes an output and enforces limitations on content and/or volume based on a level of purchased access.
Abstract:
Examples are disclosed for forwarding channel condition information for a wireless communication channel and precoding data to be transmitted over the wireless communication channel based on the forwarded channel condition information.
Abstract:
Techniques described herein generally include methods and systems related to cooperatively caching data in a chip multiprocessor. Cooperatively caching of data in the chip multiprocessor is managed based on an eviction rate of data blocks from private caches associated with each individual processor core in the chip multiprocessor. The eviction rate of data blocks from each private cache in the cooperative caching system is monitored and used to determine an aggregate eviction rate for all private caches. When the aggregate eviction rate exceeds a predetermined value, for example the threshold beyond which network flooding can occur, the cooperative caching system for the chip multiprocessor is disabled, thereby avoiding network flooding of the chip multiprocessor.
Abstract:
Technologies are described for display of a merged image on a display. A processor may receive first data that relates to a first image of a real object and second data that relates to a second image of a virtual object. The second image, if displayed, may overlap, in an overlap region, at least part of the first image if the first image were displayed. The processor may identify an overlap part in the first data that corresponds to the overlap region, clip the overlap part from the first data to produce clipped data, and blur the clipped data to produce blurred data. The processor may subtract the clipped data from the blurred data to produce an additive blur component, add the additive blur component to the second data to produce merged data, and generate the merged image to be displayed on the display based on the merged data.