-
公开(公告)号:US10331479B2
公开(公告)日:2019-06-25
申请号:US15406290
申请日:2017-01-13
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Ying Yan , Yanjie Gao , Yang Chen , Thomas Moscibroda , Narayanan Ganapathy , Bole Chen , Zhongxin Guo
Abstract: Aspects of the technology described herein can facilitate computing on transient resources. An exemplary computing device may use a task scheduler to access information of a computational task and instability information of a transient resource. Moreover, the task scheduler can schedule the computational task to use the transient resource based at least in part on the rate of data size reduction of the computational task. Further, a checkpointing scheduler in the exemplary computing device can determine a checkpointing plan for the computational task based at least in part on a recomputation cost associated with the instability information of the transient resource. Resultantly, the overall utilization rate of computing resources is improved by effectively utilizing transient resources.
-
公开(公告)号:US20230205851A1
公开(公告)日:2023-06-29
申请号:US17926997
申请日:2021-05-10
Applicant: Microsoft Technology Licensing, LLC
Inventor: Xian Zhang , Xiaobing Guo , Yang Chen , Shuo Chen , Zhongxin Guo , Qiufeng Yin , Mao Yang , Lidong Zhou
IPC: G06F21/10
CPC classification number: G06F21/105
Abstract: According to implementations of the subject matter described herein, a solution is provided for pirated copy tracing based on a third party. In the solution, a report on a pirated copy of a digital content is received from a third party, wherein the report comprises first secret information for characterizing a first identification, time information and tracing information of the pirated copy. Subsequently, a request for verifying the report is received to determine whether the report is valid. When the report is determined as valid, a licensee associated with the report is marked as a first status to indicate that the pirated copy might be leaked by the licensee. Therefore, the pirated copy may be effectively traced based on third parties. The tracing information in the report can be hidden, and other third parties can therefore be prevented from using the tracing information for duplicate reports.
-
公开(公告)号:US11416286B2
公开(公告)日:2022-08-16
申请号:US16450811
申请日:2019-06-24
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Ying Yan , Yanjie Gao , Yang Chen , Thomas Moscibroda , Narayanan Ganapathy , Bole Chen , Zhongxin Guo
Abstract: Aspects of the technology described herein can facilitate computing on transient resources. An exemplary computing device may use a task scheduler to access information of a computational task and instability information of a transient resource. Moreover, the task scheduler can schedule the computational task to use the transient resource based at least in part on the rate of data size reduction of the computational task. Further, a checkpointing scheduler in the exemplary computing device can determine a checkpointing plan for the computational task based at least in part on a recomputation cost associated with the instability information of the transient resource. Resultantly, the overall utilization rate of computing resources is improved by effectively utilizing transient resources.
-
-