摘要:
Techniques relating to optical communications are illustrated. In an example, a system for optical communications includes a laser emitting device including an emission surface for emission of a laser beam. An optical waveguide may be optically coupled to the laser emitting device to receive the laser beam from the laser emitting device. A fault photo-detector surrounds the emission surface. The fault photo-detector is to detect a portion of the laser beam accidentally back-reflected towards the laser emitting device.
摘要:
Embodiments herein relate to forwarding an instruction based on predication criteria. A predicate state associated with a packet of data is to be compared to an instruction associated with the predication criteria. The instruction is to be forwarded to an execution unit if the predication criteria includes or matches the predicate state of the packet.
摘要:
Disclosed herein are techniques for dedicating resources of a network processor. An interface to dedicate resources of a network processor is displayed. Decisions of the network processor are preempted by the selections made via the interface.
摘要:
Embodiments herein relate to forwarding an instruction based on predication criteria. A predicate state associated with a packet of data is to be compared to an instruction associated with the predication criteria. The instruction is to be forwarded to an execution unit if the predication criteria includes or matches the predicate state of the packet.
摘要:
Data is moved through a pipeline as processing of the data unrelated to detection of pattern is performed. The detector detects the pattern within the data at a predetermined location or based on a predetermined reference as the data is moved through the pipeline, in parallel with the processing of the data as the data is moved through the pipeline. The detector detects the pattern within the data as the data is moved through the pipeline without delaying movement of the data into, through, and out of the pipeline.
摘要:
A device includes a pipeline and a detector that are both implemented at least in hardware. Data is moved through the pipeline to perform processing of the data unrelated to detection of malicious code. The detector detects the malicious code within the data as the data is moved through the pipeline, in parallel with the processing of the data as the data is moved through the pipeline. The detector detects the malicious code within the data as the data is moved through the pipeline without delaying movement of the data into, through, and out of the pipeline.
摘要:
An optical injection locking oscillator is comtemplated having a tuning device. The tuning device generates a DC voltage proportional to the resonant frequency of a modulated light used to injection lock the free running oscillator. The DC voltage is applied to a varactor capacitor within the oscillator to bring the frequency of oscillation within a close proximity to the modulating frequency of the light. This facilitates injection locking, whereas frequencies of oscillation outside a certain locking range will not facilitate injection locking. The modulated light then locks the oscillator into a desired resonant frequency. A second embodiment contemplates using a YIG oscillator regulated by a DC current generated within the tuning device.
摘要:
A device includes a pipeline and a detector that are both implemented at least in hardware. Data is moved through the pipeline to perform processing of the data unrelated to detection of malicious code. The detector detects the malicious code within the data as the data is moved through the pipeline, in parallel with the processing of the data as the data is moved through the pipeline. The detector detects the malicious code within the data as the data is moved through the pipeline without delaying movement of the data into, through, and out of the pipeline.
摘要:
A hardware pipeline has a number of rows including a first row, a last row, and an intermediate row between the first row and the last row. Each row stores a number of bytes of data as the data moves through the pipeline on a row-by-row basis from the first row towards the last row. A mechanism performs a first macro on the data beginning at the first row. The mechanism performs a second macro different than the first macro on the data beginning at the intermediate row where the first macro has been completely performed when the data has reached the intermediate row. The first and second macros each include a number of modifications of the data as the data moves through the pipeline to effect a complete transformation of the data. The complete transformation of the first macro is different than the complete transformation of the second data.
摘要:
An apparatus for coating the interior of a tube (10) with fusible particles entrained in a flow of air. A measured charge is placed in an unpacked condition within a container (18) temporarily isolated (20) from a first end of the tube. A vacuum is established in the tube and in a tank (34) connected to the second end of the tube. A quick-opening valve (20) thereafter places the container in fluid communication with the first end of the tube.