-
公开(公告)号:US20230075828A1
公开(公告)日:2023-03-09
申请号:US17801203
申请日:2020-02-19
发明人: Irwin Halim , Trey Elliott , Tom Flynn
IPC分类号: G06F9/50
摘要: In one example, a neural network model may be generated for a computing network having a plurality of computing resources. Performance metrics and historical usage patterns are the basis for learning current utilization patterns of the computing resources. A workload capacity for each one of the computing resources may be determined, and a neural path may be generated for execution of a specified workload.
-
公开(公告)号:US20220129589A1
公开(公告)日:2022-04-28
申请号:US17419067
申请日:2019-07-10
发明人: Srivatsan Mani , Thomas Flynn , Trey Elliott
摘要: Example wood panel assemblies that are disposed on electronic devices are disclosed. In an example, an electronic device includes a palm rest, and a trackpad disposed on the palm rest. In addition, the electronic device includes a wood panel assembly mounted on top of the palm rest and the trackpad. The wood panel assembly includes a wood veneer panel including a top surface and a bottom surface. The bottom surface covers the palm rest and the trackpad. In addition, the wood panel assembly includes a fabric material secured along the bottom surface.
-
公开(公告)号:US20220078026A1
公开(公告)日:2022-03-10
申请号:US17419248
申请日:2019-04-30
发明人: Thomas Flynn , Srivatsan Mani , Trey Elliott
摘要: A network interface connector may receive a workload via a network. A security chip may verify a signature of the workload based on a public-private key pair, the private key corresponding to the security chip. A processor may execute the workload in response to the verification of the signature.
-
公开(公告)号:US12026286B2
公开(公告)日:2024-07-02
申请号:US17419067
申请日:2019-07-10
发明人: Srivatsan Mani , Thomas Flynn , Trey Elliott
CPC分类号: G06F21/64 , G06F9/45558 , G06F21/44 , G06F2009/45575 , G06F2009/45579 , G06F2009/45587 , G06F2009/45595
摘要: In some examples, non-transitory computer-readable storage stores machine-readable instructions that, when executed by a processor, cause the processor to identify an idle state of a computing device; evaluate a root of trust between a security chip and a container system to verify that the container system is a trusted container system; enable the trusted container system; receive a container during the idle state; and execute the container during the idle state using the trusted container system.
-
公开(公告)号:US20220413936A1
公开(公告)日:2022-12-29
申请号:US17774186
申请日:2019-11-19
发明人: Trey Elliott , Thomas Flynn , Srivatsan Mani
摘要: An example system may include a processor and a non-transitory machine-readable storage medium storing instructions executable by the processor to validate a software container, stored on a hardware controller embedded in a computing device, utilizing an encryption mechanism specific to the computing device; insert an instance of the software container, responsive to a successful validation of the software container, from the hardware controller into an operating system of the computing device.
-
-
-
-