摘要:
Various aspects of methods, systems, and use cases include coordinate operations based on event occurrence. A method may include processing a captured image to determine whether an event has occurred. The method may include detecting that the event has occurred by comparing an attribute of the image with a selected criterion, and sending, in response to detecting the event, an activation function to a network interface component (NIC). The NIC may be at a remote device, such as in an edge appliance, in a remote image capture device, or the like. The activation function may activate a bit-stream corresponding to the event, such as to activate an accelerator.
摘要:
System and techniques for infrastructure managed workload distribution are described herein. An infrastructure processing unit (IPU) receives a workload that includes a workload definition. The workload definition includes stages of the workload and a performance expectation. The IPU provides the workload, for execution, to a processing unit of a compute node to which the IPU belongs. The IPU monitors execution of the workload to determine that a stage of the workload is performing outside of the performance expectation from the workload definition. In response, the IPU modifies the execution of the workload.
摘要:
Various systems and methods for customizing training data for an artificial intelligence (AI) or machine-learning (ML) model are disclosed. A set of data is identified from a plurality of sets of data used to train the AI or ML model. The set of data is identified based on a set of metadata associated with the set of data indicating an association between the set of data and a jurisdiction of a digital services tax (DST). Based on the identifying, the plurality of sets of data is modified by removing or reducing reliance upon the set of data. The AI or ML model is retrained based on the modified plurality of sets of data. The retrained AI or ML model is provided for deployment in an individual autonomous agent.
摘要:
In some embodiments, the disclosed subject matter involves a system and method to identify objects in an environment or scene to assist in locating objects and individuals. In at least one embodiment, users register with a service to help locate and/or track objects and individuals. The service may provide recommendations on how to locate, reach, or avoid the target object or individual. Identifying and tracking an object may be used to locate an individual when the object is correlated with the individual. Individuals may register with the service for purposes of user authentication and for defining privacy authorizations for data related to the identifying the user and user's location to other parties. The service may execute in a trusted execution environment to help preserve privacy. Embodiments may be used for games, geo-caching, finding groups and individuals for meeting up, avoiding objects or individuals, etc. Other embodiments are described and claimed.
摘要:
Described herein are systems and methods for managing and distributing device and/or software settings. In some embodiments, the systems and methods permit a first device to upload settings information and/or user information to a network server. The network server may store such settings information and post it for download by at least one second device. Mechanisms for establishing a trust rating for such settings information are also described.
摘要:
Embodiments of apparatus and methods for providing recommendations based on environmental data and associated contextual information are described. In embodiments, an apparatus may include a data collector to receive environmental data and an analysis module to identify a behavioral model of the first user based at least in part on the environmental data associated contextual information of the first user. The apparatus may further include a recommendation module to provide a recommendation to the first user based at least in part on the behavioral model of the first user and/or environmental data for a second user. Other embodiments may be described and/or claimed.
摘要:
Embodiments for providing personal broadcast are generally described herein. A computing device to display a personal bulletin board may comprise a transceiver configured to data at the computing device from a second computing device; a rear-facing screen configured to present an indication of the data to a user of the first computing device; an input module configured to receive a command from the user to display a representation of the data on the front-facing screen; and a front-facing screen configured to display the representation of the data in response to receiving the command from the user.
摘要:
Systems and methods may provide for implementing a dynamic navigation service. In one example, the method may include generating user behavior data for a user, generating community user behavior data, generating a user suggested route, and generating a community user suggested route.
摘要:
Methods, systems and computer program products that allow for the determination of human presence in a room where content is being presented. The audio that is associated with the content may be captured, along with the audio that is being generated collectively by whatever sources may be in the room including the presentation of the content. Features may be extracted from both the content audio and the room audio. These features may then be compared, and the differences may be quantified. If the differences are significant, then human presence may be inferred.
摘要:
Technologies for dynamically implementing an image protection policy include a camera device with a camera to capture an image of at least one person. The camera device determines a location in the image of at least one person in the image, determines a location of at least one personal computing device, and maps the personal computing devices to the persons captured in the image based on the determined device and image locations. The camera device may broadcast an announcement of the creation of the image to the personal computing devices, negotiate an image protection policy with each of the personal computing devices, and implement the negotiated image protection policy.