摘要:
Technologies for transferring offloading or on-loading data or tasks between a processor and a coprocessor include a computing device having a processor and a sensor hub that includes a coprocessor. The coprocessor receives sensor data associated with one or more sensors and detects events associated with the sensor data. The coprocessor determines frequency, resource usage cost, and power state transition cost for the events. In response to an offloaded task request from the processor, the coprocessor determines an aggregate load value based on the frequency, resource usage cost, and power state transition cost, and determines whether to accept the offloaded task request based on the aggregate load value. The aggregate load value may be determined as an exponential moving average. The coprocessor may determine whether to accept the offloaded task request based on a principal component analysis of the events. Other embodiments are described and claimed.
摘要:
Examples are disclosed for adaptive graphics subsystem power and performance management including adjusting one or more power management or performance attributes for a graphics subsystem for a computing platform based on a comparison of a current quality metric to a target quality metric. The current and target quality metric to be separately determined based on current and target quality of service (QoS) values for power management and performance for at least portions of the computing platform.
摘要:
Various approaches for the verification of 5G networks, including the use of fingerprint-based IQ measurements for authentication and integrity monitoring, are discussed. In an example, a method of using fingerprints for authentication of network use includes: capturing in-phase and quadrature (IQ) data from a network connection between a user equipment (UE) and a 5G network; performing authentication of the network connection between the UE and the 5G network, by using a symbol of the IQ data as a random factor for the authentication; and monitoring the IQ data on an ongoing basis to verify the network connection between the UE and the 5G network. The method may also include creating a baseline IQ measurement from the IQ data when performing the authentication between the UE and the 5G network, and monitoring the IQ data by using a comparison of an ongoing IQ measurement to the baseline IQ measurement.
摘要:
System and techniques for an environmental control loop are described herein. A device for an environmental control loop can include a memory including instructions and processing circuitry that when in operation, can be configured by the instructions to receive environmental sensor data from a first component in a set of heterogeneous components installed in an environment with a controller. The environmental sensor data can indicate a service level value sensed by the first component. The controller can also measure a violation of a service level objective based on comparing the environmental sensor data to a threshold. The controller can also transmit an adjustment to an operating parameter of a second component of the set of heterogeneous components. The adjustment can be operative to attenuate the violation of the service level objective when implemented by the second component.
摘要:
Methods, systems, and use cases for extended P2P communication with edge networking are discussed, including an edge computing device with a memory device and processing circuitry. The processing circuitry receives a request from a second edge computing device to perform a P2P exchange. A set of services for execution by the processing circuitry during the P2P exchange is determined. The processing circuitry further determines whether an enhanced edge service is available to substitute at least one service of the set of services. The enhanced edge service is associated with processing resources that are external to the edge computing device. Based on a successful determination that the enhanced edge service is available, the processing resources of the edge computing system that are external to the edge computing device are utilized to execute the enhanced edge service in place of the at least one service during the P2P exchange.
摘要:
Various embodiments for dynamically generating an advertisement in a video stream are disclosed. In one embodiment, video stream content associated with a video stream for a user device is received. Video analytics data is obtained for the video stream content, which indicates a scene recognized in the video stream content. An advertisement to be generated and inserted into the video stream content is then selected based on the scene recognized in the video stream content, and an advertisement template for generating the selected advertisement is obtained. Video advertisement content corresponding to the advertisement is then generated based on the advertisement template and the video analytics data. The video advertisement content is then inserted into the video stream content, and the modified video stream content is transmitted to the user device.
摘要:
Technologies for dynamic display include a mobile compute device that comprises a display transformable between at least two different physical topologies. The mobile compute device determines a current physical topology of the display and retrieves a policy based on the determined current physical topology. The policy identifies a corresponding action to occur in response to each of one or more user inputs to the mobile compute device while the display has the current physical topology. The mobile compute device processes a user input based on the retrieved policy.
摘要:
A system on a chip (SoC) may comprise at least one processor with at least one core and a storage device comprising a first system virtual machine configured to be executed on the at least one processor. The storage device may comprise a second system virtual machine configured to be executed by the at least one processor. The second system virtual machine may include at least one process virtual machine; a modem configured as one of the at least one process virtual machine; and a real-time operating system (RTOS) to schedule execution of the at least one process virtual machine on the at least one processor.
摘要:
In an embodiment, a system on a chip includes: a single core to execute a legacy instruction set, the single core configured to enter a system management mode (SMM) to provide a trusted execution environment to perform at least one secure operation; and a memory controller coupled to the single core, the memory controller to interface with a system memory, where a portion of the system memory comprises a secure memory for the SMM, and the single core is to authenticate and execute a boot firmware, and pass control to the SMM to obtain a key pair from a protected storage and store the key pair in the secure memory. Other embodiments are described and claimed.
摘要:
Techniques are described that can be used to manage drawing requests from applications based in part on whether the drawing requests can be displayed and in part on the power consumption states of hardware in the system. If the drawing request can not be displayed, then a number of responses can take place. For example, instead of providing the drawing request to hardware and the driver provides a zero pixel region to the hardware. In some cases, the driver saves the state changes that would have resulted had the drawing request been performed and the drawing request is rendered to a buffer instead of the hardware being powered-on. Other examples are described herein.