Abstract:
One or more systems, devices, and/or methods provided herein relate to a process for in-process radio frequency (RF) signal quality analysis and amplitude adjustment of one or more RF devices. In one or more embodiments, the RF device can comprise a portion of a quantum computing system, such as of readout electronics thereof, and thus amplitude adjustment can be at a waveform generator that generates pulses to affect one or more qubits of a quantum logic circuit of the quantum computing system. Generally, an electronic device can comprise an RF tap connected to an RF signal component of a first RF signal chain, and an analysis component connected to the RF tap, the analysis component configured to convert an RF signal from the RF signal component and to compare a conversion result thereof to an expected power output that is based on historical data for a second RF signal chain.
Abstract:
Systems, devices, computer-implemented methods, and/or computer program products that facilitate low power, wideband multitone generation. In one example, a multitone generator device can comprise a controller operatively coupled to first and second digital-to-analog converters (DACs). The controller can apply different delays of a sampling signal to the first and second DACs to facilitate sideband suppression of signals output by the first and second DACs. One aspect of such a multitone generator device is that the multitone generator device can facilitate low power, wideband multitone generation.
Abstract:
Authentication includes determining that a cardholder payment account is associated with a mobile device. Authentication includes receiving an indication of physical possession of a payment card. Authentication includes receiving a purchase request for an authorization of an exchange of funds from the cardholder account to the merchant. Authentication includes receiving a randomized transaction identifier to the request for the authorization of the exchange. Authentication includes transmitting to the mobile device, information associated with the request. Authentication includes transmitting to the mobile device, a request for confirmation of the authorization from the cardholder from the account of the cardholder to the merchant. Authentication includes receiving an indication, facilitated by the cardholder, that the exchange is authorized. Authentication includes authorizing the exchange of from the payment account of the cardholder to the merchant.
Abstract:
Authentication includes receiving an indication of physical possession of a payment card by a merchant and receiving a purchase request for an authorization of an exchange from the payment account of the cardholder to the merchant. Authentication includes assigning a randomized transaction identifier to the request for the authorization of the exchange. The method also includes transmitting the request for the authorization of the exchange from the payment account of the cardholder to the merchant and receiving the assigned randomized transaction identifier and a randomized authentication identifier associated with the randomized transaction identifier from a payment association, the payment association determining whether the request for the authorization of the exchange is valid. Authentication includes transmitting a copy of the randomized authentication identifier to the mobile device and receiving validation that the transmitted copy of the randomized authentication identifier from the mobile device matches the randomized authentication identifier.
Abstract:
A tool is provided for document or design code completion. The tool includes a storage element in which common and user-specific unfinished work indicators are stored in first and second databases, respectively, a search element and a processor. The search element is disposed to identify unfinished work in documents by searching for matches of first text within the documents with second text of the common and user-specific work indicators in the first and second databases. The processor is configured to create a third database including the second text and pertinent sections of the documents. The pertinent sections are respectively associated with the second text and verifiably marked as unfinished by natural language processing of the first and second text by the processor. The processor is further configured to update the first and second databases based on results of the natural language processing.
Abstract:
Authentication includes receiving an indication of physical possession of a payment card by a merchant and receiving a purchase request for an authorization of an exchange from the payment account of the cardholder to the merchant. Authentication includes assigning a randomized transaction identifier to the request for the authorization of the exchange. The method also includes transmitting the request for the authorization of the exchange from the payment account of the cardholder to the merchant and receiving the assigned randomized transaction identifier and a randomized authentication identifier associated with the randomized transaction identifier from a payment association, the payment association determining whether the request for the authorization of the exchange is valid. Authentication includes transmitting a copy of the randomized authentication identifier to the mobile device and receiving validation that the transmitted copy of the randomized authentication identifier from the mobile device matches the randomized authentication identifier.
Abstract:
A tool is provided for document or design code completion. The tool includes a storage element in which common and user-specific unfinished work indicators are stored in first and second databases, respectively, a search element and a processor. The search element is disposed to identify unfinished work in documents by searching for matches of first text within the documents with second text of the common and user-specific work indicators in the first and second databases. The processor is configured to create a third database including the second text and pertinent sections of the documents. The pertinent sections are respectively associated with the second text and verifiably marked as unfinished by natural language processing of the first and second text by the processor. The processor is further configured to update the first and second databases based on results of the natural language processing.
Abstract:
Authentication for payment transaction includes receiving, by a point-of-sale (POS) terminal, an indication that a payment account of a cardholder is associated with a mobile device and receiving a second indication of physical possession of a payment card by a merchant. The authentication includes receiving a purchase request for an authorization of exchange from the payment account of the cardholder to the merchant and assigning a transaction identifier to the request for the authorization of the exchange. The authentication includes transmitting the request for authorization of the exchange from the cardholder payment account to the merchant and the transaction identifier. The authentication includes receiving an indication that an authentication identifier is associated with the transaction identifier. The authentication includes receiving a copy of the authentication identifier, facilitated by the cardholder. The authentication includes receiving validation that the copy of the authentication identifier matches the authentication identifier.
Abstract:
A computer-implemented method includes storing commands and maintaining an order of receipt of the commands in a command processing unit. The commands include address translation cache miss commands that are organized as one or more linked lists and stored in a content-addressable memory (CAM). All nodes within a single linked list include commands having addresses that map to the same hash value. Based on receiving a memory fetch completion indicator for a cache entry for a command in a head node in a linked list, all of the commands in the linked list are returned. The returning includes sending the commands in the linked list to an address translation unit in an order specified by the linked list.
Abstract:
Authentication includes determining that a cardholder payment account is associated with a mobile device. Authentication includes receiving an indication of physical possession of a payment card. Authentication includes receiving a purchase request for an authorization of an exchange of funds from the cardholder account to the merchant. Authentication includes receiving a randomized transaction identifier to the request for the authorization of the exchange. Authentication includes transmitting to the mobile device, information associated with the request. Authentication includes transmitting to the mobile device, a request for confirmation of the authorization from the cardholder from the account of the cardholder to the merchant. Authentication includes receiving an indication, facilitated by the cardholder, that the exchange is authorized. Authentication includes authorizing the exchange of from the payment account of the cardholder to the merchant.