Abstract:
Technologies are described herein to manage the replacement of routing rules. Some example technologies may receive a request to replace one or more active rules in a routing device with one or more stored rules. Each of the active rules and the stored rules may specify a routing rule that specifies how to route packets within a network. The active rules may be routing rules that are actively being used by the routing device. The stored rules may be routing rules that are not currently in use by the routing device. A determination may be made as to whether a number of active rule replacements for the routing device exceeds a threshold. In response to determining that the number of the active rule replacements exceeds the threshold, the request to replace the one or more active rules in the routing device may be denied.
Abstract:
Technologies related to observer filtered activity recommendations are generally described. In some examples, a computing device may collect activity and observer information for a device user, may identify limited observer activities, and may generate observer filtered activity recommendations for the device user, the observer filtered activity recommendations corresponding to the identified limited observer activities. Observer filtered activity recommendations may optionally be restricted in the presence of current observers outside a limited observer group. In some examples, the computing device may provide automated access to observer information and/or to observer filtered activity information to enable observer filtered activity recommendations by applications accessing the observer information and/or the observer filtered activity information.
Abstract:
In some examples, one or more processors of a computing system may receive telemetry data from a plurality of devices, user identifications (IDs) of a set of users of the plurality of the devices, and information from social media indicative of user sentiments toward the devices. The computing system may predict user experience related to the devices based at least in part on the telemetry data, the user IDs, and the information from the social media.
Abstract:
Technologies are generally described to monitor roadway infrastructure based on aggregated mobile vehicle communication parameters. In some examples, a pair of vehicles with mobile communication devices passing an infrastructure, such as a bridge, may be identified, and the mobile communication devices may exchange a signal during a mobile communication as the vehicles pass the target infrastructure. During the signal exchange, channel characterization data for the target infrastructure may be collected. The channel characterization data may represent propagation conditions of signal waves through the target infrastructure. The channel characterization data may be received at a mobile communication network, where a tomographic model of the target infrastructure may be generated based on extraction and analysis of the channel characterization data. Physical and structural characteristics of the target infrastructure may be determined based on the generated tomographic image of the target infrastructure to facilitate monitoring for degradation and flaws in the target infrastructures.
Abstract:
Examples are disclosed for executing vertical handovers of wireless devices configured to couple with heterogeneous wireless networks. In some examples, wireless devices on separate heterogeneous networks may be swapped between the heterogeneous networks.
Abstract:
Technologies are generally provided to integrate hardware accelerators in datacenters. In some examples, a datacenter customer may provide a hardware accelerator configuration to be implemented at a datacenter. The hardware accelerator configuration may include, for example, one or more customer accelerator blocks and one or more accelerator blocks. The datacenter may retrieve the accelerator block(s), integrate the accelerator block(s) with the customer accelerator block(s) to form the hardware accelerator, and then implement the hardware accelerator. In other examples, the datacenter may charge the customer for use of the accelerator block(s), but refrain from providing the accelerator block(s) to the customer.
Abstract:
In one example, a system includes an authentication server that is configured to receive an authentication request for a primary application, provide time-based authentication credentials for the primary application, receive an updated authentication request for the primary application, wherein the updated authentication request includes a client device identifier (ID) corresponding to a client device from which the authentication request is received, and transmit the client device ID; the system may further include a push server that is configured to receive the transmitted client device ID, and push an update to the client device having the client device ID.
Abstract:
In some examples, a computing system may gathering, from a machine learning unit associated with the computing system, data as a training data, label the data to identify the labeled data as the training data, which may be then recirculated for each of one or more analytics modules of the machine learning unit.
Abstract:
The present technology provides an illustrative apparatus for recycle electric arc furnace (EAF) dust and method of use related to the same. The apparatus has a heat controlling region coupled to a separation volume and includes at least one magnet and a cooling region. The heating controlling region operates at a temperature sufficient to transform at least some of the EAF dust into a mixture of gaseous zinc and one or more additional metals. The magnet separates the iron-rich material from the mixture of gaseous zinc and one or more additional metals and the cooling region condenses the gaseous zinc.
Abstract:
Systems and methods to wirelessly transmit power are provided. A coil assembly is provided. In some examples, the coil assembly is configured to generate a signal in response to an ambient field, and to magnetically couple with a device to deliver power to the device.