A streaming media player includes a printed circuit board, a video processor, a wireless communications processor, and a patch antenna. The patch antenna includes dielectric material, a conductive patch, and a first antenna feed in a first position with respect to the conductive patch. The patch antenna includes a second antenna feed in a second position with respect to the conductive patch. The first position is orthogonal to the second position. In an embodiment, the second position is rotationally offset from the first position by 90 degrees around an axis through a center of the conductive patch. The streaming media player includes a connector coupled to the video processor and configured to removably couple to a connection port on a display device.
H01Q 21/24 - Combinations of antenna units polarised in different directions for transmitting or receiving circularly and elliptically polarised waves or waves linearly polarised in any direction
A network-based service for the management of cryptographic key, such as a key management service ("KMS"), provides a web service application programming interface ("API"). Cryptographic keys managed by the service may be stored in a one or more network connected cryptographic devices such as network-connected hardware security modules ("HSM"). The key management service maintains metadata associated with the cryptographic keys. When a request is received by the key management service, the key management service uses an identifier provided with the request to identify metadata associated with a cryptographic key used to fulfill the request. The key management service uses the metadata to identify a cryptographic device containing the cryptographic key. The key management service generates a set of commands for fulfilling the request such that the commands are compatible with a protocol implemented by the identified cryptographic device, and the set of commands are sent to the identified cryptographic device.
Systems, methods, and computer-readable media are disclosed for self-healing flexible electrophoretic displays and related devices. In one embodiment, an example flexible electrophoretic display may include a flexible plastic thin film transistor (TFT) backplane having a first width, an electrophoretic layer coupled to the flexible plastic TFT backplane, an electrode layer coupled to the electrophoretic layer, an integrated circuit disposed on the flexible plastic TFT backplane, and a protective sheet having a second width that is greater than or equal to the first width.
G02F 1/167 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour based on translational movement of particles in a fluid under the influence of an applied field characterised by the electro-optical or magneto-optical effect by electrophoresis
An electronic device includes a display screen, one or more internal components, and a foam outer housing coupled to the display screen and enclosing the one or more internal components. The electronic device may also include a foam midframe enclosed by the foam outer housing. The foam outer housing may be resilient so as to provide impact absorption and water resistance, while the foam midframe may be rigid to provide stiffness to the electronic device. The electronic device may have a density less than 1 gram/centimeter3 such that the electronic device is buoyant in liquid water.
An audio/video (A/V) recording and communication doorbell, including a camera, a speaker, a microphone, a power manager, a battery, an AC/DC rectifier, and a DC/DC converter. The doorbell is configured for connection to an external AC power source through the AC/DC rectifier and the DC/DC converter. The power manager is configured to draw power, up to a threshold power, from the AC power source and to draw supplemental power from the battery such that the power drawn from the AC power source never exceeds the threshold power. The present A/V recording and communication doorbell can thus be connected to an existing household AC power supply and an existing doorbell signaling device without causing inadvertent sounding of the signaling device.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 3/10 - Audible signalling systems; Audible personal calling systems using electromagnetic transmission
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
6.
SHARING VIDEO FOOTAGE FROM AUDIO/VIDEO RECORDING AND COMMUNICATION DEVICES
Sharing video footage recorded by audio/video (A/V) recording and communication devices, such as video doorbells and security cameras. When an A/V recording and communication device records video footage of suspicious activity, or even criminal activity, a user viewing the footage may alert his or her neighbors by sharing the video. In various embodiments, the user may share the video with anyone of the user's choosing, including neighbors, friends, and family.
Aerial vehicles may be equipped with propellers having clutch mechanisms that contract around a shaft when the propellers are not rotating, or are rotating at low angular velocities, and expand around the shaft when the propellers are rotating at sufficiently high angular velocities. The clutch mechanisms may receive one or more fixed posts within an opening or window defined therein. When the clutch mechanisms contract into a closed position, components of the clutch mechanisms come into contact with the posts, and the propellers are forced to remain in an alignment defined by the posts. When the clutch mechanisms expand into an open position, such components may rotate freely without contacting the posts. Thus, a clutch mechanism may cause a propeller to remain aligned in a desired orientation when the propeller is not required for operation, thereby reducing drag or adverse acoustic effects.
Disclosed herein is a method including receiving, from a user application, data to be transmitted from a source address to a destination address using a single connection through a network; and splitting the data into a plurality of packets according to a communication protocol. For each packet of the plurality of packets, a respective flowlet for the packet to be transmitted in is determined from a plurality of flowlets; a field in the packet used by a network switch of the network to route the packet is set based on the determined flowlet for the packet; and the packet is sent via the determined flowlet for transmitting through the network.
Provided are systems and methods for connection establishment over a network that does not require a user application to establish an explicit connection with a target application. In some implementations, provided is an apparatus configured to communicate with a network and a host device. The apparatus may receive a message and destination information associated with the message from the host device. The apparatus may further determine, using the destination information, a transport context from a plurality of transport contexts. The transport context may include a state of a connection with a destination on the network. The destination on the network may be associated with the destination information.
An electronic device includes a stack assembly and a cover glass. The stack assembly includes an electrophoretic display sub-assembly for rendering content, a front light sub-assembly comprising a light guide, a light FPC, and a plurality of light sources, and a capacitive touch sensing sub-assembly for detecting touch inputs. A yellow-pigmented tape is applied over the light sources and an edge of the light guide. A stiffener member is coupled to the light FPC opposite the yellow-pigmented tape.
G09F 9/30 - Indicating arrangements for variable information in which the information is built-up on a support by selection or combination of individual elements in which the desired character or characters are formed by combining individual elements
G02F 1/167 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour based on translational movement of particles in a fluid under the influence of an applied field characterised by the electro-optical or magneto-optical effect by electrophoresis
Video footage captured by A/V recording and communication devices may be readily uploaded to the cloud and shared with a requesting party, such as a law enforcement agency. When a request is received from a requesting party for video footage, a set of videos meeting the criteria specified by the requesting party may be determined. Consent requests may then be sent to users associated with each of the A/V recording and communication devices that recorded the videos meeting the criteria specified by the requesting party. When user consents to share the videos are received, the video footage may be provided to the requesting party.
Multiple propeller blades (504, 506) may be joined by tip connectors (508) to form a closed propeller apparatus. The tip connectors may create continuous structure between adjacent tips of a first propeller and a second propeller. Use of the tip connectors may reduce vortices created near the tips of the propeller blades, which cause drag and slow the rotation of the propeller blades. The tip connectors may also reduce noise caused by rotation of propeller blades. Further, the tip connectors reduce or eliminate deflection of the propeller blades by creating a support structure to counteract forces that would otherwise cause deflection of the propeller blades, thereby improving propeller blade loading. In some embodiments, the tip connectors may be formed of a malleable material and/or include one or more joints that enable at least one of the propellers to modify a pitch of blades of the propeller.
Multiple motors may drive (rotate) a single shaft coupled to a propeller. The motors may be selected such that a first motor is capable of rotating the drive shaft in an event of a failure of a second motor coupled to the drive shaft. A one-way clutch bearing, or similar device, may interface between a motor and the drive shaft to enable free rotation of the drive shaft in an event of the motor becoming inoperable, such as the motor freezing or locking in a position due to failure caused by overheating or caused by other conditions or events. Use of the second motor may secure a position of the drive shaft which may support the propeller in radial eccentric loading.
A battery module includes one or more battery cells and one or more laminated elements configured to provide passive management of heat generated by the one or more battery cells. Each laminated element includes one or more heat conducting layers and one or more intumescent layers. The one or more intumescent layers are configured to expand in response to an intumescent layer temperature exceedance to reconfigure the laminated element from a first configuration in which the laminated element transfers heat emitted by the one or more battery cells to a second configuration in which the laminated element does not substantially transfer heat emit- ted by the one or more battery cells.
H01M 10/653 - Means for temperature control structurally associated with the cells characterised by electrically insulating or thermally conductive materials
H01M 10/654 - Means for temperature control structurally associated with the cells located inside the innermost case of the cells, e.g. mandrels, electrodes or electrolytes
H01M 10/6555 - Rods or plates arranged between the cells
15.
SELECTING PROPELLERS FOR PERFORMANCE AND NOISE SHAPING
A method to operate an unmanned aerial vehicle having first and second sets of propellers is provided, having operational flexibility in terms of how and when the sets of propellers are used. A computer on the unmanned aerial vehicle initiates a first and second operation of each of first and second sets of motors coupled to the first and second sets of propellers respectively at first and second times respectively. The first and second sets of propellers have different types. The first operation of the first set of motors at the first time is initiated at a first power level. The second operation of the second set of motors at the second time is initiated at a second power level. The computer initiates a third operation of the first set of motors at a third power level, different from the first power level, at the second time.
B64U 40/10 - On-board mechanical arrangements for adjusting control surfaces or rotors; On-board mechanical arrangements for in-flight adjustment of the base configuration for adjusting control surfaces or rotors
B64U 10/14 - Flying platforms with four distinct rotor axes, e.g. quadcopters
B64U 20/20 - Constructional aspects of UAVs for noise reduction
Sounds are generated by an aerial vehicle (101) during operation. For example, the motors and propellers (102) of an aerial vehicle (101) generate sounds during operation. Disclosed are systems, methods, and apparatus for actively adjusting the position of one or more propeller blade treatments (202) of a propeller blade (200) of an aerial vehicle (101) during operation of the aerial vehicle (101). For example, the propeller blade (200) may have one or more propeller blade treatments (202) that may be adjusted between two or more positions. Based on the position of the propeller blade treatments (202), the airflow over the propeller (102) is altered, thereby altering the sound generated by the propeller (102) when rotating. By altering the propeller blade treatments (202) on multiple propeller blades (200) of the aerial vehicle (101), the different sounds generated by the different propeller blades (200) may effectively cancel, reduce, and/or otherwise alter the total sound generated by the aerial vehicle (101).
In a battery-powered audio/video recording and communication device having a camera, the length of a preset interval (the interval between instances of the device sending a request to a network to check whether any user requests to access the camera have been received) may be adjusted upward or downward in order to balance the competing interests of reducing latency (e.g. reducing the delay that the user may experience when trying to access the camera) and conserving batter life. The present embodiments advantageously balance these competing interests by initially setting the length of the preset interval to be relatively short to reduce latency, but automatically increasing the length of the preset interval as the battery charge is depleted, thereby extending battery life. The present embodiments also advantageously enable the length of the preset interval to be increased after the battery is recharged, thereby reducing latency.
H04N 23/65 - Control of camera operation in relation to power supply
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04L 67/025 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
A tiered credentialing approach provides assurance to customers having virtual machines running in a remote environment that the virtual images for these machines are in a pristine state and running in a trusted execution environment. The environment can be divided into multiple subsystems, each having its own cryptographic boundary, secure storage, and trusted computing capabilities. A trusted, limited subsystem can handle the administrative tasks for virtual machines running on the main system of a host computing device. The limited system can receive a certificate from a certificate authority, and can act as a certificate authority to provide credentials to the main system. Upon an attestation request, the subsystems can provide attestation information using the respective credentials as well as the certificate chain. An entity having the appropriate credentials can determine the state of the system from the response and verify the state is as expected.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
19.
KEY EXCHANGE THROUGH PARTIALLY TRUSTED THIRD PARTY
Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust a cryptography service to perform some cryptographic operations and access some cryptographic resources while simultaneously not trusting the cryptography service to perform other operations and access other resources. Two or more clients may utilize a cryptography service to perform certain authentication and verification operations to establish a secure communication session, while simultaneously denying the cryptography service access to the secure communication session.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A propeller alignment device (102) is described. The propeller alignment device (102) can include a second retainer attached to a propeller (112) and a motor (104). The propeller alignment device (102) can also include a first retainer (114) that does not rotate, but that is aligned with the second retainer (116). The first retainer (114) can include two or more magnets (120A,120B) oppositely orientated relative to each other. The second retainer (116) can also include two or more magnets (118A,118B) oppositely orientated relative to each other. As the second retainer (116) rotates relative to the first retainer (114), the magnets may altematingly align with each other. In the absence of a current applied to the motor (104), the magnets may magnetically bias the second retainer (116) into a predetermined orientation relative to the first retainer (114). The predetermined orientation can be predetermined to correspond to an alignment of the propeller (112) that is desirable (e.g., that minimizes aerodynamic drag on the propeller).
Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust a cryptography service to perform some cryptographic operations and access some cryptographic resources while simultaneously not trusting the cryptography service to perform other operations and access other resources. Two or more clients may utilize a cryptography service to perform certain authentication and verification operations to establish a secure communication session, while simultaneously denying the cryptography service access to the secure communication session.
Methods, systems, and computer-readable media for scaling for virtualized graphics processing are disclosed. A first virtual GPU is attached to a virtual compute instance of a provider network. The provider network comprises a plurality of computing devices configured to implement a plurality of virtual compute instances with multi-tenancy. The first virtual GPU is replaced by a second virtual GPU based at least in part on a change in GPU requirements for the virtual compute instance. The first and second virtual GPUs are implemented using physical GPU resources that are accessible to the virtual compute instance over a network. Processing for the virtual compute instance is migrated from the first virtual GPU to the second virtual GPU. An application is executed using the second virtual GPU on the virtual compute instance.
A system for monitoring incoming code execution requests and scheduling the corresponding code executions is provided. The system may be configured to maintain a plurality of virtual machine instances. The system may be further configured to determine whether at least some of the incoming code execution requests exhibit periodicity, and cause a reduced amount of idle compute capacity to be maintained on the virtual compute system. The system may be further configured to cause additional compute capacity to be added shortly before code execution requests are expected to be received.
Information for a data object can be prevented from loss for import and export operations across a trust boundary, such as may exist between environments under control of different legal entities. A set of dependencies, including information such as data tags and identifiers for applicable policies, can be embedded in a data object, such as directly in a header or in a digest or token of the data object. When the data object is transmitted across a trust boundary, such as to a destination bucket, the destination bucket can ensure that all dependencies are available and able to be enforced in the destination environment. If not, the request can be denied or the destination environment can contact the source environment to attempt to obtain and enforce the missing dependencies. At least some of the dependencies may also need to be transformed in the second environment.
A network-based discovery system and service are disclosed that provide client discovery services to a number of clients over a network. The network-based discovery system includes a database that stores discovery information of client network-based resource configurations. The discovery information may be obtained from client resources by client-side discovery components that are placed on client resources, obtain the discovery information and that send the information to the discovery system. The discovery system analyzes the discovery information to determine the client network-based resource configurations and generates client network-based resource configuration representations for the respective clients. The client network-based resource configuration representation may include a description of, and dependencies among, a plurality of computer-based resources. The discovery service may operate across a client network that spans both of a client's enterprise data networks as well as resources that are operated on behalf of the same client by a service provider network.
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
A provider network for providing continuous workflow service for an open-ended number of workflows using non-persistent threads. In some cases, the provider network includes a workflow handling service and a workflow evaluation service. The workflow handling service may receive indications of task completion events related to respective workflows, and in turn may send non-blocking requests for workflow decisions from the workflow evaluation service. In generating a workflow decision, the workflow evaluation service may determine resources for executing a workflow evaluation thread for generating the workflow decision. Further, a given workflow evaluation thread may determine a workflow decision without relying on a previously stored state for a state machine corresponding to the workflow. In this way, a given workflow decision may be determined on different allocated resources at different points in time in maintaining the workflow.
Information describing changes to a collection of items maintained by a database may be stored in a log file. The information in the log file may be converted into a stream of records describing the changes. The records may be directed to a computing node selected for performing a trigger function in response to the change, based on applying a hash function to a portion of the record, identifying a hash space associated with a value output by the hash function, and mapping from the hash space to the selected computing node.
Robotic manipulators may be used to manipulate objects. Manipulation data about manipulations performed on objects may be generated and accessed. This data may be analyzed to generate a profile indicating how an object may be manipulated. A portion of the profile may be transmitted to a particular robotic manipulator. For example, the portion may be based on a manipulation capability of the robotic manipulator. In turn, the robotic manipulator may use the portion of the profile to manipulate the object.
G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control (DNC), flexible manufacturing systems (FMS), integrated manufacturing systems (IMS), computer integrated manufacturing (CIM)
A motor mount assembly (320) is provided for coupling a propeller motor (310) to a body of an unmanned aerial vehicle (UAV). The motor mount assembly includes a floating portion (330) and acts to attenuate frequencies of vibration from the propeller motor during operation, which modifies the corresponding noise that is produced and reduces stresses on the various components. The floating portion is surrounded on all sides by isolation portions (340, 350, 360) (e.g., made of elastomers or other materials) that are held within a casing that attaches to the body of the UAV. In one implementation, the motor mount assembly is modular such that one or more of the isolation portions may be replaced with different isolation portions (e.g., having different attenuation properties), depending on the direction and nature of the vibrations from the propeller motor that are to be attenuated for a particular application.
Described are systems and methods for surveying a destination as an unmanned aerial vehicle ("UAV") descends toward the destination. To confirm that the destination is clear of objects and includes a safe landing or delivery location, such as a substantially planar surface, the UAV may capture and process images at different altitudes during the descent. Feature points of a first image captured at a first altitude may be paired with feature points of a second image captured at a second, different altitude. A homography may be computed to confirm that the paired feature points lie in the same plane and then the two images may be registered based on the paired feature points. The registered images may then be processed to determine depth information and determine if descent of the UAV is to continue or be aborted.
Noises that are to be emitted by an aerial vehicle (1210) during operations may be predicted using one or more machine learning systems, algorithms or techniques. Anti-noises having equal or similar intensities and equal but out-of-phase frequencies may be identified and generated based on the predicted noises, thereby reducing or eliminating the net effect of the noises. The machine learning systems, algorithms or techniques used to predict such noises may be trained using emitted sound pressure levels observed during prior operations of aerial vehicles, as well as environmental conditions, operational characteristics of the aerial vehicles or locations of the aerial vehicles during such prior operations. Anti-noises may be identified and generated based on an overall sound profile of the aerial vehicle, or on individual sounds emitted by the aerial vehicle by discrete sources.
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
G05D 1/10 - Simultaneous control of position or course in three dimensions
G05D 19/02 - Control of mechanical oscillations, e.g. of amplitude, of frequency, of phase characterised by the use of electric means
G05D 27/02 - Simultaneous control of variables covered by two or more of main groups characterised by the use of electric means
32.
EVENT-STREAM SEARCHING USING COMPILED RULE PATTERNS
Methods, systems, and computer-readable media for implementing event-stream searching using compiled rule patterns are disclosed. A rule base is compiled based at least in part on one or more rule patterns. The field names are sorted within the rule patterns. The rule patterns comprise one or more field names and one or more field values. The rule base represents a finite-state machine comprising a plurality of states. A plurality of events are received. The events comprise field names and field values describing events associated with resources in a provider network. The field names are sorted within the events. The rule patterns are evaluated against the events using the rule base. In determining a matched rule pattern for one of the events, the finite-state machine transitions between at least two of the states for the matched rule pattern.
H04L 12/16 - Arrangements for providing special services to substations
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
33.
EVENT-STREAM SEARCHING USING COMPILED RULE PATTERNS
Methods, systems, and computer-readable media for implementing event-stream searching using compiled rule patterns are disclosed. A rule base is compiled based at least in part on one or more rule patterns. The field names are sorted within the rule patterns. The rule patterns comprise one or more field names and one or more field values. The rule base represents a finite-state machine comprising a plurality of states. A plurality of events are received. The events comprise field names and field values describing events associated with resources in a provider network. The field names are sorted within the events. The rule patterns are evaluated against the events using the rule base. In determining a matched rule pattern for one of the events, the finite-state machine transitions between at least two of the states for the matched rule pattern.
Methods, systems, and computer-readable media for customizable event-triggered computation at edge locations are disclosed. A request for content is received at an edge server from a client device. The content is sought from a content cache at the edge server or from an origin server coupled to the edge server. Processing of the request is initiated, comprising encountering an event. The event is associated with a function specified by a customer. The function associated with the event is executed at the edge server using process isolation. The content is generated based at least in part on execution of the function. The content is sent from the edge server to the client device.
A computer system receives a request to remove an entry from a probabilistic data structure. In response to the request, the computer system queries the probabilistic data structure to determine a current iteration value for the entry within the probabilistic data structure. The current iteration value indicates a state of the entry such that a first state corresponds to the entry being a member of a set and a second state corresponds to the absence of the entry from the set. As a result of the current iteration value denoting that the entry is a member of the set, the computer system increments the current iteration value to generate a new iteration value that corresponds to the absence of the entry from the set. The computer system uses the new iteration value and the entry to generate a new output value that is then added to the probabilistic data structure.
Architectures and techniques for selecting a voice-enabled device to handle audio input that is detected by multiple voice-enabled devices are described herein. In some instances, multiple voice-enabled devices may detect audio input from a user at substantially the same time, due to the voice-enabled devices being located within proximity to the user. The architectures and techniques may analyze a variety of audio signal metric values for the voice-enabled devices to designate a voice-enabled device to handle the audio input.
Methods, systems, and computer-readable media for virtualizing graphics processing in a provider network are disclosed. A virtual compute instance is provisioned from a provider network. The provider network comprises a plurality of computing devices configured to implement a plurality of virtual compute instances with multi-tenancy. A virtual GPU is attached to the virtual compute instance. The virtual GPU is implemented using a physical GPU, and the physical GPU is accessible to the virtual compute instance over a network. An application is executed using the virtual GPU on the virtual compute instance. Executing the application generates virtual GPU output that is provided to a client device.
Techniques for virtual area generation and manipulation are described herein. The described techniques may be used, for example, for virtual areas in electronically presented content items, such as video games and other media items. In some examples, one or more interfaces may be provided that allow content developers to provide and specify a set of rules associated with the virtual area. The set of rules may include, for example, terrain rules, object rules, and other rules associated with other aspects of the virtual area. The terrain rules may include rules for generating, distributing, and/or manipulating different types of terrain, such as such as flat and/or buildable space, mountains, valleys, berms, rivers, lakes, oceans, deserts, forests, and many others. The object rules may include rules for generating, distributing, and/or manipulating different types of objects, such as trees, bushes, rocks, snow, grass, fish, birds, animals, people, vehicles, buildings, and others.
A63F 13/57 - Simulating properties, behaviour or motion of objects in the game world, e.g. computing tyre load in a car race game
A63F 13/35 - Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers - Details of game servers
A63F 13/352 - Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers - Details of game servers involving special game server arrangements, e.g. regional servers connected to a national server or a plurality of servers managing partitions of the game world
A63F 13/355 - Performing operations on behalf of clients with restricted processing capabilities, e.g. servers transform changing game scene into an MPEG-stream for transmitting to a mobile phone or a thin client
A63F 13/52 - Controlling the output signals based on the game progress involving aspects of the displayed game scene
G06T 15/00 - 3D [Three Dimensional] image rendering
39.
PROVIDING MULTI-FACTOR AUTHENTICATION CREDENTIALS VIA DEVICE NOTIFICATIONS
Disclosed are various embodiments for providing multi-factor authentication credentials. In one embodiment, in response to a request from an application, a notification is generated in a notification area of a display. Entry of a user approval is facilitated via the notification. In response to receiving the approval, a security credential is transferred to the application. In another embodiment, the security credential may be shown in the notification area so that a user may enter it in a form field of the application.
Techniques for preserving the state of virtual machine instances during a migration from a source location to a target location are described herein. A set of credentials configured to provide access to a storage device by a virtual machine instance at the source location is provided to the virtual machine instance. When the migration from the source location to the target location starts, a second set of credentials configured to provide access to a storage device by a virtual machine instance at the source location is provided to the virtual machine instance. During the migration, a response to an input-output request is provided to one or more of the locations using the set of credentials and based at least in part on the state of the migration.
A network-attachable data transfer device housed within a shippable enclosure that incorporates an updateable electronic display for displaying shipping destination information is disclosed. The device may be initialized (e.g., prepared to receive data, and the updateable electronic shipping display set to the shipping destination) by a service provider and shipped, in accordance with the displayed destination address, as a self-contained shipping unit. The device may be installed onto a network at the destination and loaded with data. The display may also be updated with the next destination address such that the device is shipped to the updated destination address (e.g., back to the service provider, or onto other destinations before being send back to the service provider). When the device is received back at the service provider, the data is transferred from the device to a service provider storage facility, wiped of data, and prepared to be sent out again.
Techniques are described for providing users with access to perform commands on network-accessible computing resources. In some situations, permissions are established for user(s) to execute command(s) on computing node(s) provided by an online service, such as by maintaining various permission information externally to those provided computing nodes for use in controlling users' ability to access, use, and/or modify the provided computing nodes. An interface component may use such external permissions information to determine if a particular user is authorized to execute one or more particular commands on one or more particular computing nodes, and to initiate simultaneous and independent execution of the command(s) on the computing node(s) when authorized. The interface component may further aggregate results from each computing node that executed the command(s), prior to providing the results to the user.
Concepts of an omnidirectional pinion wheel are described. In one embodiment, the wheel includes a hub, first and second annular rims each including inner and outer rim surfaces, spokes that extend from the hub to the first and second annular rims, a pinion ring including pinion rods that extend between the inner surfaces of the first and second annular rims, and first and second annular rings of rollers affixed on the outer surfaces of the first and second annular rims. Using an axis of freedom of the rollers, the wheel can move sideways in addition to forward and backward. Further, when used with a vertical rack gear, the wheel can provide vertical displacement by engagement between teeth of the gear and the pinion ring. Additionally, various racks and tracks with teeth for pinion ring engagement are described along with an example vehicle capable of vertical displacement using the wheels.
A computing resource monitoring service receives a request to store a measurement for a metric associated with a computing resource. The request includes the measurement itself and metadata for the measurement, which specifies attributes of the measurement. Based at least in part on the metadata, the computing resource monitoring service generates a fully qualified metric identifier and, using the identifier, selects a logical partition for placement of the measurement. From the logical partition, the computing resource monitoring service transmits the measurement to an aggregator sub-system comprising one or more in-memory datastores. The computing resource monitoring service stores the measurement in an in-memory datastore within the aggregator sub-system.
G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
Techniques for content testing during image production are described herein. Information associated with a content item may be loaded onto a first virtual machine instance and a second virtual machine instance. On the second virtual machine instance, production of a virtual machine image including the information associated with the content item may be initiated. On the first virtual machine instance, a first instance of the content item may be executed. At least part of a time during which the first instance of the content item is executed may occur during the production of the virtual machine image. Upon completion of production of the virtual machine image and approval of its use, the virtual machine image may be replicated onto other content item instances, and the first virtual machine instance may be terminated or repurposed.
An application deployment service (ADS) component receives a request to establish a communication channel for clients to submit deployment artifacts associated with an application. A set of endpoints are created for the channel. In response to receiving a message via one of the endpoints, the ADS determines that additional security verification operations are to be performed before a deployment task indicated in the message can be performed. After the security verification operations are completed, the task is implemented.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
47.
CONTENT DELIVERY NETWORK VIDEO CONTENT INVALIDATION THROUGH ADAPTIVE BITRATE MANIFEST MANIPULATION
A method for invalidating content segments of a bitstream. The method comprises a step of delivering a manifest file from an origin server to a content delivery network. The manifest file may have a time-to-live value and may be redelivered based on the time-to-live value. The method comprises a step of delivering one or more content segments from the origin server to the content delivery network. The manifest file may contain pointers to the content segments. The method comprises a step of modifying the manifest file at the origin server to include invalidation information based on an input signal. The method comprises a step of invalidating the content segments throughout the content delivery network based on the invalidation information.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
H04L 47/28 - Flow control; Congestion control in relation to timing considerations
A service provider may apply customer-selected or customer-defined auto-scaling policies to a cluster of resources (e.g., virtualized computing resource instances or storage resource instances in a MapReduce cluster). Different policies may be applied to different subsets of cluster resources (e.g., different instance groups containing nodes of different types or having different roles). Each policy may define an expression to be evaluated during execution of a distributed application, a scaling action to take if the expression evaluates true, and an amount by which capacity should be increased or decreased. The expression may be dependent on metrics emitted by the application, cluster, or resource instances by default, metrics defined by the client and emitted by the application, or metrics created through aggregation. Metric collection, aggregation and rules evaluation may be performed by a separate service or by cluster components. An API may support auto-scaling policy definition.
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
49.
MANAGING LOAD BALANCERS ASSOCIATED WITH AUTO-SCALING GROUPS
A computing resource service provider may provide computing instances organized into logical groups, such as auto-scale groups. Computing instances assigned to an auto-scale group may be associated with one or more load balancers configured to direct traffic to the computing instances. Furthermore, customers of the computing resource service provider may add or remove load balancer from the auto-scale groups.
Methods and apparatus for controlling the movement of portable receptacles within a materials handling facility are described. The materials handling facility utilizes at least one linear induction motor (LEVI) to move the portable receptacles having conductive elements from a first location to a second location within the facility. The LEVIs may be configured such that most, if not all, of the movement of the receptacles is controlled by the application of energy from the LEVIs to the conductive elements of the receptacles. This energy may cause the receptacles to move from one LEVI to another LEVI, where each LIM in sequence can apply force to the receptacle to pass it to the next LIM in the sequence. In some implementations, the portable receptacles are configured such that at least a base portion of the receptacle includes a conductive element to interact with the LIMs, while maintaining an overall light-weight configuration.
An endpoint management and proxy system is described, by which users can manage and enable exposure of application programming interfaces ("APIs") usable to cause execution of program code on a remote or third party system. Systems and methods are disclosed which facilitate the handling of user requests to perform certain tasks on remote systems. The endpoint management system allows the application developer to define and specify a first proxy API which maps to a second API associated with the remote system. The endpoint proxy system receives requests to execute the proxy API, determines the API mapping, and sends one or more backend API requests to execute program codes by the associated remote systems. Responses from the remote systems are received by the endpoint proxy system which parses and/or transforms the results associated with the response and generates an output result for response back to the user computing systems.
Computing resource service providers may provide computing resources to customers in a multi-tenant environment. These computing resources may be behind a firewall or other security device such that certain information does not reach the computing resources provided to the customer. A logging entity may be implemented on computer server operated by the computing resource service provider. The logging entity may obtain log information from the firewall or other security device and store the log information such that it is accessible to the customer. Additionally, the log information may be provided to other services such as a metrics service or intrusion detection service.
A computer system performs cryptographic operations as a service. The computer system is configured to allow users of the service to maintain control of their respective cryptographic material. The computer system uses inaccessible cryptographic material to encrypt a user's cryptographic material in a token that is then provided to the user. The user is unable to access a plaintext copy of the cryptographic material in the token, but can provide the token back to the service to cause the service to decrypt and use the cryptographic material.
H04L 9/16 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
An unmanned vehicle communicates with other unmanned vehicles. When the unmanned vehicle receives a message from another unmanned vehicle, the unmanned vehicle verifies authenticity of the message. For at least some types of messages, if determined that the message is authentic, the unmanned vehicle updates a set of operations the unmanned vehicle will perform in accordance with information in the message.
H04L 9/28 - Arrangements for secret or secure communications; Network security protocols using particular encryption algorithm
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
A computer system performs cryptographic operations as a service. The computer system is configured to allow users of the service to maintain control of their respective cryptographic material. The computer system uses inaccessible cryptographic material to encrypt a user's cryptographic material in a token that is then provided to the user. The user is unable to access a plaintext copy of the cryptographic material in the token, but can provide the token back to the service to cause the service to decrypt and use the cryptographic material.
A modular LIDAR system may be formed of multiple LIDAR components. Each LIDAR component may include a laser emitter and a laser detector configured in a frame. Multiple LIDAR components may be arranged on a rotatable swivel housing. The rotatable housing may rotate about a first axis that is perpendicular to a plane defined by a mounting base. The multiple LIDAR components may be aimed outward from the swivel housing at different directions, which may range up to 90 degrees or up to 180 degrees in separation in some embodiments. When the rotatable housing is rotated completely around the first axis, the multiple LIDAR components may scan a first field of view of 360 degrees around the first axis and may scan a second field of view of substantially 180 degrees about a second axis. The modular LIDAR system may be implemented with an aircraft for navigational purposes.
Technologies are disclosed herein for executing commands within virtual machine ("VM") instances. A public web service application programming interface ("API") is exposed within a service provider network that includes methods relating to the execution of commands within VM instances. For example, the API might include a method for obtaining a list of the commands that can be executed within a VM instance. The API might also include a method for requesting the execution of a command within a VM instance. The API might also include a method for requesting data describing the status of the execution of a command within a VM instance. The API might also expose other methods. A software agent executing on a VM instance may be utilized to provide a list of commands that can be executed in the VM, to execute requested commands, and to provide data describing the status of execution of a command.
A storage system may implement dynamic configuration of data volumes. Client utilization of a data volume in a storage system may be tracked or monitored. Based on the utilization of the data volume, configuration recommendations to reconfigure the data volume according to data volume offerings may be determined. The data volume may be configured according to an authorized configuration recommendation. In some embodiments, these recommendations may be provided to a client and selection of the configuration recommendation to perform may be received. In some embodiments, a configuration recommendation may be automatically performed based on previously provided authorization to configure the data volume.
A method for selecting a communication protocol for a virtual desktop instance in a service provider environment may include providing to a client computing device, access to a virtual desktop instance running on a server computer using a first communication channel associated with a first communication protocol. A request for functionality from a user of the device is detected, the requested functionality being unsupported by the first communication protocol. A second communication protocol from a plurality of available communication protocols may be selecting based on the requested functionality. The second communication protocol may support the requested functionality. A user authorization for using the second communication protocol can be verified. Upon successful verification, a second communication channel is established between the server computer and the device using the second communication protocol for performing the functionality, while maintaining access to the virtual desktop instance using the first communication channel.
An error correcting location system includes a ground station with fixed reference coordinates. The ground station may receive satellite broadcast messages from a plurality of location system satellites. Further, the ground station may determine location coordinates based on the satellite broadcast messages, and compare the location coordinates to the fixed reference coordinates to determine a compensation value. In addition, the ground station may send the compensation value to location system devices. Upon receipt of the compensation value, the location system devices may utilize the compensation value to generate highly accurate location coordinates.
G01S 19/07 - Cooperating elements; Interaction or communication between different cooperating elements or between cooperating elements and receivers providing data for correcting measured positioning data, e.g. DGPS [differential GPS] or ionosphere corrections
G01S 19/40 - Correcting position, velocity or attitude
61.
ADJUSTABLE LANDING GEAR ASSEMBLY FOR UNMANNED AERIAL VEHICLES
This disclosure describes a configuration of an unmanned aerial vehicle (UAV) landing gear assembly that includes adjustable landing gear extensions (251) that may be extended or contracted so that the body of the UAV is contained in a horizontal plane when the UAV is landed, even on sloping surfaces. For example, when a UAV is landing, the slope of the surface may be determined and the landing gear extensions (251) adjusted based on the slope so that the body of the UAV remains approximately horizontal when the UAV lands and is supported by the landing gear extensions.
B64C 27/26 - Compound rotorcraft, i.e. aircraft using in flight the features of both aeroplane and rotorcraft characterised by provision of fixed wings
Techniques for content deployment, scaling and telemetry are described herein. Once a content item is made accessible for deployment, one or more instances of the content item may be installed as an image on a virtual machine instance. Additional instances of the content item may then be launched on the same virtual machine instance and/or by copying the image onto any number of additional virtual machine instances. One or more instances of a content item may be configurable to execute with multiple simultaneously assigned users sessions. Information associated with content item instances may be collected, such as a number of occupied user sessions, a number of unoccupied user sessions, content item instance duration, memory usage, and the like. This information may, in some cases, be used to match and assign authorized users to appropriate content item instances.
A distributed system may implement opportunistic resource migration to optimize resource placement. Resources may be placed amongst different resource hosts of a distributed system. An evaluation of the current placement may be performed according placement criteria that improve placement of the resources at the distributed system. Based on the evaluation, the prospective migration of resources that exceed an improvement threshold may be identified as candidate resources to migrate. Migration for the candidate resources may be opportunistically performed. In some embodiments, a priority may be assigned to the candidate resources according to which the candidate resources are selected for performing migration.
A certificate authority service receives a request to issue a long-duration digital certificate from an entity for validation purposes between the entity and the service. Upon issuance of the long-duration digital certificate, the entity submits a request to the service for issuance of a short-duration digital certificate that includes a shorter validity period than the long-duration digital certificate. The service may utilize the long-duration digital certificate to validate the entity and, upon validating the entity, issues the short-duration digital certificate to the entity. The entity may subsequently utilize the short-duration digital certificate to enable a user client to authenticate the entity and securely communicate with the entity.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
65.
UNMANNED AERIAL VEHICLE WITH EXTERNAL FRAME CARRYING THRUST PROPELLERS AND INTERNAL FRAME CARRYING LIFT PROPELLERS
This disclosure describes a configuration of an unmanned aerial vehicle (UAV) that includes a substantially polygonal perimeter frame (104) and a central frame (107). The perimeter frame includes a front wing (120), a lower rear wing (124), and an upper rear wing (122). The wings provide lift to the UAV when the UAV is moving in a direction that includes a horizontal component. The UAV may have any number of lifting motors (106). For example, the UAV may include four lifting motors (also known as a quad-copter), eight lifting motors (octo-copter), etc. Likewise, to improve the efficiency of horizontal flight, the UAV may also include one or more thrusting motors (110) and corresponding thrusting propellers (112). When the UAV is moving horizontally, the thrusting motor(s) may be engaged and the thrusting propeller(s) will aid in the horizontal propulsion of the UAV.
B64C 27/26 - Compound rotorcraft, i.e. aircraft using in flight the features of both aeroplane and rotorcraft characterised by provision of fixed wings
B64C 39/08 - Aircraft not otherwise provided for having multiple wings
66.
LANDING OF UNMANNED AERIAL VEHICLES ON MOVING TRANSPORTATION VEHICLES FOR TRANSPORT
Unmanned aerial vehicles ("UAVs") (400) which fly to destinations (e.g., for delivering items) may land on transportation vehicles (e.g., delivery trucks, etc.) (201) for temporary transport. An agreement with the owner of the transportation vehicles (e.g., a shipping carrier) may be made for obtaining consent and determining compensation for landings, and the associated transportation vehicles that are available for landings may be identified by markers on the roof or other identification techniques. The routes of the transportation vehicles (201) may be known and utilized to determine locations where UAVs (400) will land on and take off from the transportation vehicles (201), and in cases of emergencies (e.g., due to low batteries, mechanical issues, etc.) the UAVs (400) may land on the transportation vehicles (201) for later retrieval.
Functionality is disclosed herein for using a context sensitive framework to identify relevant applications to a current context and to provide data received from the relevant applications to a user. Instead of a user having to manually locate and launch an application, relevant applications determined by a contextual service may provide data in response to receiving the context data. The applications that are identified as relevant to the context determine the application data to provide to the contextual service. The contextual service selects at least a portion of the application data to provide for display within a user interface. In some configurations, the selected application data is displayed within a user interface that maintains a same look and feel regardless of the application data that is displayed.
This disclosure describes a configuration of an unmanned aerial vehicle ("UAV") (100) that will facilitate extended flight duration. The UAV may have any number of lifting motors (102). For example, the UAV may include four lifting motors (also known as a quad-copter), eight lifting motors (also known as an octo-copter), etc. Likewise, to improve the efficiency of horizontal flight, the UAV also includes a pivot assembly (109) that may rotate about an axis (624) from a lifting position to a thrusting position. The pivot assembly may include two or more offset motors (610) that generate a differential force that will cause the pivot assembly to rotate between the lifting position and the thrusting position without the need for any additional motors or gears.
B64C 27/28 - Compound rotorcraft, i.e. aircraft using in flight the features of both aeroplane and rotorcraft with forward-propulsion propellers pivotable to act as lifting rotors
B64C 15/12 - Attitude, flight direction or altitude control by jet reaction the jets being propulsion jets the power plant being tiltable
B64D 27/24 - Aircraft characterised by the type or position of power plant using steam, electricity, or spring force
This disclosure describes a collective UAV in which multiple UAVs may be coupled together to form the collective UAV. A collective UAV may be used to aerially transport virtually any size, weight or quantity of items, travel longer distances, etc. For example, rather than using one large UAV to carry a larger or heavier item, multiple smaller UAVs may couple together to form a collective UAV that is used to carry the larger or heavier item.
A cryptography service allows for management of cryptographic keys and for the evaluation of security expectations when processing incoming requests. In some contexts, the cryptography service, upon receiving a request to perform a cryptographic operation, evaluates a set of security expectations to determine whether the cryptographic key or keys usable to perform the cryptographic operation should be trusted. A response to the request is dependent on evaluation of the security expectations.
A system for providing security mechanisms for secure execution of program code is described. The system may be configured to maintain a plurality of virtual machine instances. The system may be further configured to receive a request to execute a program code and allocate computing resources for executing the program code on one of the virtual machine instances. One mechanism involves executing program code according to a user-specified security policy. Another mechanism involves executing program code that may be configured to communicate or interface with an auxiliary service. Another mechanism involves splitting and executing program code in a plurality of portions, where some portions of the program code are executed in association with a first level of trust and some portions of the program code are executed with different levels of trust.
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
Techniques described and suggested herein include systems and methods for storing, indexing, and retrieving original data of data archives on data storage systems using redundancy coding techniques. For example, redundancy codes, such as erasure codes, may be applied to archives (such as those received from a customer of a computing resource service provider) so as allow the storage of original data of the individual archives available on a minimum of volumes, such as those of a data storage system, while retaining availability, durability, and other guarantees imparted by the application of the redundancy code. Sparse indexing techniques may be implemented so as to reduce the footprint of indexes used to locate the original data, once stored.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
73.
COMMERCIAL AND GENERAL AIRCRAFT AVOIDANCE USING LIGHT, SOUND, AND/OR MULTI-SPECTRAL PATTERN DETECTION
This disclosure is directed to a detection and avoidance apparatus for an unmanned aerial vehicle ("UAV") and systems, devices, and techniques pertaining to automated object detection and avoidance during UAV flight. The system may detect objects within the UAV's airspace through acoustic, visual, infrared, multispectral, hyperspectral, or object detectable signal emitted or reflected from an object. The system may identify the source of the object detectable signal by comparing features of the received signal with known sources signals in a database. The features may be, for example, a light arrangement or number of lights associated with the object. Furthermore, a trajectory envelope for the object may be determined based on characteristic performance parameters for the object such as cursing speed, maneuverability, etc. The UAV may determine an optimized flight plan based on the trajectory envelopes of detected objects within the UAV's airspace to avoid the detected objects.
H04B 7/26 - Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile
G01B 11/00 - Measuring arrangements characterised by the use of optical techniques
G01N 29/14 - Investigating or analysing materials by the use of ultrasonic, sonic or infrasonic waves; Visualisation of the interior of objects by transmitting ultrasonic or sonic waves through the object using acoustic emission techniques
G01N 29/46 - Processing the detected response signal by spectral analysis, e.g. Fourier analysis
G01S 7/41 - RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES - Details of systems according to groups , , of systems according to group using analysis of echo signal for target characterisation; Target signature; Target cross-section
G01S 7/539 - RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES - Details of systems according to groups , , of systems according to group using analysis of echo signal for target characterisation; Target signature; Target cross-section
A system for providing automatic resource resizing is provided. The system may be configured to maintain a plurality of virtual machine instances. The system may be further configured to receive a request to execute a program code and allocate computing resources for executing the program code on one of the virtual machine instances. The amount of resources allocated for executing the program code may be specified by the request and adjusted as needed.
Disclosed are various embodiments for tracking and verifying the authenticity of items. Public and private unique identifiers are generated for an item, and an identifier label is printed and affixed to the item. The public identifier is visible, but the private identifier is not visible unless a tamper-evident action is performed. Events involving scans of the public identifier are recorded. The private identifier is scanned by a client, and in response, authenticity information for the item is sent to the client. The authenticity information is determined based at least in part on the events relative to the public identifier.
This disclosure describes a configuration of an unmanned aerial vehicle (UAV) that will facilitate extended flight duration. The UAV may have any number of lifting motors. For example, the UAV may include four lifting motors (also known as a quad-copter), eight lifting motors (octo-copter), etc. Likewise, to improve the efficiency of horizontal flight, the UAV also includes a pushing motor and propeller assembly that is oriented at approximately ninety degrees to one or more of the lifting motors. When the UAV is moving horizontally, the pushing motor may be engaged and the pushing propeller will aid in the horizontal propulsion of the UAV.
An unmanned aerial vehicle, comprising a monolithic uni-body frame including a hub (1120) positioned near a center of the UAV; a plurality of motor arms (1108), each motor arm having a first end and a second end, each first end coupled to the hub; and a perimeter protective barrier (1114) completely surrounding the hub and the plurality of motor arms. The frame and perimeter protective barrier are formed as a monolithic uni-body to increase the structural integrity of the UAV.
This disclosure describes a configuration of an unmanned aerial vehicle (UAV) that will facilitate extended flight duration. The UAV may have any number of lifting motors. For example, the UAV may include four lifting motors (also known as a quad-copter), eight lifting motors (octo-copter), etc. Likewise, to improve the efficiency of horizontal flight, the UAV also includes a pushing motor and propeller assembly that is oriented at approximately ninety degrees to one or more of the lifting motors. The UAV has a thermally conductive frame. A first power supply container is coupled to the frame at a first position, and a second power supply container coupled to the frame at a second position. A payload is configured to be removably positioned between the first power supply container and the second power supply container.
B64C 27/20 - Rotorcraft characterised by having shrouded rotors, e.g. flying platforms
B64C 27/26 - Compound rotorcraft, i.e. aircraft using in flight the features of both aeroplane and rotorcraft characterised by provision of fixed wings
B64C 39/02 - Aircraft not otherwise provided for characterised by special use
B64D 27/24 - Aircraft characterised by the type or position of power plant using steam, electricity, or spring force
79.
DYNAMIC SCALING OF STORAGE VOLUMES FOR STORAGE CLIENT FILE SYSTEMS
A network-based data store maintaining storage volumes for file systems at storage clients may implement dynamic storage volume scaling. A scaling event may be detected according to a specified scaling policy for a storage volume maintained at a network-based data store that is mounted at a storage client and configured for a file system. In a least some embodiments, the scaling policy for the storage volume may be received from the storage client. In response to detecting the storage event, storage maintaining the storage volume may be modified according to the scaling policy to scale the storage volume. An indication of the scaling event may be sent to the storage client in order to update the file system at the storage client so that the file system may utilize the scaled storage volume.
Disclosed are various embodiments of a multi-scale fiducial. A multi-scale fiducial may have three or more scales, where the child fiducials are nested or otherwise linked by a relative position to the parent fiducials. Multi-scale fiducials may facilitate target identification and tracking at varying distances, potentially without the aid of a scale-invariant recognition algorithm. One application of multi-scale fiducials may involve target identification for autonomously controlled aerial vehicles.
G05D 3/20 - Control of position or direction using feedback using a digital comparing device
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
H01L 23/544 - Marks applied to semiconductor devices, e.g. registration marks, test patterns
81.
RULE-BASED ACTION TRIGGERING IN A PROVIDER NETWORK
Methods, systems, and computer-readable media for implementing rule-based triggering in a provider network are disclosed. When conditions are met for one or more triggers, one or more rules that comprise the one or more triggers are determined. The conditions are determined in a provider network comprising a plurality of resources. One or more actions are determined in the one or more rules that comprise the one or more triggers. The one or more actions are performed, comprising modifying one or more of the resources in the provider network.
H04L 12/16 - Arrangements for providing special services to substations
H04L 41/0893 - Assignment of logical groups to network elements
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
H04L 41/5061 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the interaction between service providers and their network customers, e.g. customer relationship management
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
A method and apparatus for document collaboration and management are disclosed. User devices associated with a user of a document management and collaboration system are identified. Documents associated with the user are downloaded to the user devices from the document management and collaboration system. A targeted denial of access to the downloaded documents is performed.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
83.
MANAGEMENT OF APPLICATION ACCESS TO DIRECTORIES BY A HOSTED DIRECTORY SERVICE
Features are disclosed for facilitating management of network directories of multiple organizations by a centralized directory management system. Various applications can access the directories of the organizations via the directory management system according to the permissions that the applications have been granted by the respective organizations. Organizations may maintain directories on-premises or off-premises, and the applications can access the directories via the directory management system regardless of the physical location of the directories. Additionally, the applications may be hosted by a computing service provider that also hosts or otherwise manages the directory management service, or the applications can be hosted by third-party servers separate from the directory management system and the organizations.
A global endpoint may be associated with an organization name and a plurality of directories located in different geographic regions. The global endpoint may be a computing system that hosts a page used by users to access an application or service. A user may be able to access the application or service using already existing credentials. For example, the user may access the application or service using credentials stored and maintained by an entity with which the user is affiliated. Users having credentials stored in different geographic regions may be able to access the application or service via the same global endpoint.
A service manages a plurality of virtual machine instances for low latency execution of user codes. The service can provide the capability to execute user code in response to events triggered on an auxiliary service to provide implicit and automatic rate matching and scaling between events being triggered on the auxiliary service and the corresponding execution of user code on various virtual machine instances. An auxiliary service may be configured as an event triggering service to detect events and generate event messages for execution of the user codes. The service can request, receive, or poll for event messages directly from the auxiliary service or via an intermediary message service. Event messages can be rapidly converted to requests to execute user code on the service. The time from processing the event message to initiating a request to begin code execution is less than a predetermined duration, for example, 100 ms.
A system for providing dynamic code deployment and versioning is provided. The system may be configured to receive a first request to execute a newer program code on a virtual compute system, determine, based on the first request, that the newer program code is a newer version of an older program code loaded onto an existing container on a virtual machine instance on the virtual compute system, initiate a download of the newer program code onto a second container on the same virtual machine instance, and causing the first request to be processed with the older program code in the existing container.
An interaction analysis module may collect data about user interactions with video content in a real-time video exploration (RVE) system, analyze the collected data to determine correlations between users or groups of users and particular video content, and provide the analysis data to one or more systems, for example to the RVE system or to an online merchant. The RVE system may dynamically render and stream new video content targeted at particular users or groups based at least in part on the analysis data. Network-based computation resources and services may be leveraged by the RVE system to enable interactive exploration of video content by the users, as well as the real-time rendering and streaming of the new video content. Entities such as online merchants may target information such as advertising or recommendations to particular users or groups based at least in part on the analysis information.
H04N 21/2668 - Creating a channel for a dedicated end-user group, e.g. by inserting targeted commercials into a video stream based on end-user profiles
H04N 21/254 - Management at additional data server, e.g. shopping server or rights management server
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
A63F 13/30 - Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
A63F 13/52 - Controlling the output signals based on the game progress involving aspects of the displayed game scene
A service manages a plurality of virtual machine instances for low latency execution of user codes. The plurality of virtual machine instances can be configured based on a predetermined set of configurations. One or more containers may be created within the virtual machine instances. In response to a request to execute user code, the service identifies a pre-configured virtual machine instance suitable for executing the user code. The service can allocate the identified virtual machine instance to the user, create a new container within an instance already allocated to the user, or re-use a container already created for execution of the user code. When the user code has not been activated for a time-out period, the service can invalidate allocation of the virtual machine instance destroy the container. The time from receiving the request to beginning code execution is less than a predetermined duration, for example, 100 ms.
A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.
A user of a computing device selects a data file and, through an input device, transmits a command to open the selected data file. In response, the computing device launches a location determination application determines, based at least in part on a policy associated with a file type corresponding to the selected data file, that the data file is to be opened in a virtual computing environment. The computing device provides the selected data file to the virtual computing environment along with one or more executable instructions that may cause a server to launch an application within the virtual computing environment capable of opening the selected data file. The user of the computing device, through a virtual computing environment interface installed on the computing device, may access the virtual computing environment to use the selected data file.
It may be determined that a cloud desktop should be migrated from a current region. A destination region to which the cloud desktop will be migrated can be identified. A data volume of the cloud desktop may be copied from the current region to the destination region. The data volume at the current region and the data volume at the destination region may be maintained in sync during the copying. Upon completion of the copying, a current user session associated with the cloud desktop at the current region may be frozen, a current memory and processor state of the current user session may be copied to the destination region, and a second cloud desktop instance at the destination region may be started using the copied data volume and current memory and processor state. The current user session may be connected to the second cloud desktop instance.
This disclosure is directed to an automated aerial vehicle ("AAV") and systems, devices, and techniques pertaining to canceling noise, generating audible communications, and/or generating visible communications. The AAV may include one or more propellers utilized, in part, to produce sound that cancels noise generated by one or more other propellers. Additionally or alternatively, the AAV may utilize one or more propellers to generate audible and/or visible communications.
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effects; Masking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
Functionality is disclosed herein for providing an asynchronous processing service for processing storage mapping information. The asynchronous processing service is configured to receive a storage request including identification of a storage object and a description of a storage operation, perform the storage operation for the storage object in response to receiving the storage request, and asynchronously update mapping information for the performed storage operation.
A first transaction manager of a partitioned storage group stores a first conditional commit record for a first write of a multi-partition transaction based on a first conflict detection operation. A second transaction manager stores a second conditional commit record for a second write of the transaction based on a second conflict detection operation. A client-side component of the storage group determines that both writes have been conditionally committed, and stores an unconditional commit record in a commit decision repository. A write applier examines the first conditional commit record and the unconditional commit record before propagating the first write to the first partition.
A first transaction manager of a partitioned storage group stores a first conditional commit record for a first write of a multi-partition transaction based on a first conflict detection operation. A second transaction manager stores a second conditional commit record for a second write of the transaction based on a second conflict detection operation. A client-side component of the storage group determines that both writes have been conditionally committed, and stores an unconditional commit record in a commit decision repository. A write applier examines the first conditional commit record and the unconditional commit record before propagating the first write to the first partition.
The disclosure describes an automated aerial vehicle (AAV) and system for automatically detecting a contact or an imminent contact between a propeller of the AAV and an object (e.g., human, pet, or other animal). When a contact or an imminent contact is detected, a safety profile may be executed to reduce or avoid any potential harm to the object and/or the AAV. For example, if a contact with a propeller of the AAV by an object is detected, the rotation of the propeller may be stopped to avoid harming the object. Likewise, an object detection component may be used to detect an object that is nearing a propeller, stop the rotation of the propeller, and/or navigate the AAV away from the detected object.
At a machine learning service, a set of candidate variables that can be used to train a model is identified, including at least one processed variable produced by a feature processing transformation. A cost estimate indicative of an effect of implementing the feature processing transformation on a performance metric associated with a prediction goal of the model is determined. Based at least in part on the cost estimate, a feature processing proposal that excludes the feature processing transformation is implemented.
98.
INTERACTIVE INTERFACES FOR MACHINE LEARNING MODEL EVALUATIONS
A first data set corresponding to an evaluation run of a model is generated at a machine learning service for display via an interactive interface. The data set includes a prediction quality metric. A target value of an interpretation threshold associated with the model is determined based on a detection of a particular client's interaction with the interface. An indication of a change to the prediction quality metric that results from the selection of the target value may be initiated.
At a machine learning service, a set of candidate variables that can be used to train a model is identified, including at least one processed variable produced by a feature processing transformation. A cost estimate indicative of an effect of implementing the feature processing transformation on a performance metric associated with a prediction goal of the model is determined. Based at least in part on the cost estimate, a feature processing proposal that excludes the feature processing transformation is implemented.
A machine learning service implements programmatic interfaces for a variety of operations on several entity types, such as data sources, statistics, feature processing recipes, models, and aliases. A first request to perform an operation on an instance of a particular entity type is received, and a first job corresponding to the requested operation is inserted in a job queue. Prior to the completion of the first job, a second request to perform another operation is received, where the second operation depends on a result of the operation represented by the first job. A second job, indicating a dependency on the first job, is stored in the job queue. The second job is initiated when the first job completes.