This disclosure describes a verification service within a service provider network for automatically verifying and validating documents. A user may upload a document image to the verification service. A pre-processing service may pre-process the document image. The pre-processed document image may then be forwarded to a first machine learning ML model for similarity evaluation. Once the first ML model has completed its evaluation of the document image, the first ML model may forward the document image to a second ML model for symbol recognition, which may then forward the business license to an optical recognition (OCR) service for OCR validation. If the document image is validated, e.g., is an image of a purported document type, as will be discussed further herein, the publishing service may pre-populate, e.g., publish, information from the document image to an account template.
Techniques for enabling access in a multi-assistant speech processing system are described, where a first assistant system may use components of a second assistant system as data processing components. Runtime operational data and user input data related to the first assistant may be kept separate from the processing data and input data related to the second assistant by propagating a first account ID, for user inputs directed to the first assistant, through the processing pipeline, and using a second account for user inputs directed to the second assistant. A mapping between the first account ID and the second account ID may be accessible to a select number of system components. Handoffs between the two assistants are handled in a manner where data related to one assistant is not accessible by the other assistant.
An Application Programming Interface (API) allows a launching of a virtual machine where a queue count can be configured by a user. More specifically, each virtual machine can be assigned a pool of queues. Additionally, each virtual machine can have multiple virtual networking interfaces and a user can assign a number of queues from the pool to each virtual networking interface. Thus, a new metadata field is described that can be used with requests to launch a virtual machine. The metadata field includes one or more parameters that associate a number of queues with each virtual networking interface. A queue count can be dynamically configured by a user to ensure that the queues are efficiently used given that the user understands the intended application of the virtual machine being launched.
Systems and methods are provided for managing provision of—and access to—data sets among instances of function code executing in an on-demand manner. An API is provided by which functions can store data sets to be shared with other functions, and by which functions can access data sets shared by other functions.
Systems, methods, and devices are disclosed for front-lit displays having uniform brightness. In one embodiment, an example display may include an electrophoretic display, a light guide configured to direct light from one or more light emitting diodes, and a cover lens assembly. The cover lens assembly may include a cover glass layer, an anti-glare film coupled to the cover glass layer, and a hot melt adhesive disposed about lateral edge surfaces of the cover glass layer and the anti-glare film, such that the hot melt adhesive forms a perimeter of the cover lens assembly.
G02F 1/167 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour based on translational movement of particles in a fluid under the influence of an applied field characterised by the electro-optical or magneto-optical effect by electrophoresis
Techniques for customer-initiated virtual machine resource allocation sharing are described. A hardware virtualization service of a cloud provider network receives a request to launch a first virtual machine, wherein the first virtual machine is of a first virtual machine type, the first virtual machine type having a resource amount allocated to virtual machines of the first virtual machine type. The hardware virtualization service causes a launch of the first virtual machine on a host computer system of the cloud provider network. The host computer system shares an allocation of the resource amount from a corresponding resource of the host computer system between the first virtual machine and a second virtual machine, wherein the second virtual machine is of the first virtual machine type.
Systems and methods are described for implementing a distributed unit in a radio access network that executes code on behalf of mobile devices. A distributed unit may be implemented on an edge server that is in close physical proximity to a radio unit, with few or no intervening devices. The edge server may thus provide services to mobile devices, such as executing code on behalf of a mobile device in an execution environment on the edge server, at significantly lower latency than more distant cloud-based servers. The edge server may preload computing environments with code for which a mobile device is likely to request execution (e.g., because a particular application is executing on the mobile device), and may determine whether to execute code on the edge server or on a cloud provider network.
Systems and techniques are disclosed for predicting the structural status of an object. An object model, such as a machine learning model, can be trained on sample sensor data indicating vibrations, movements, and/or other reactions of objects with known desired and undesired structural statuses to a stimulus agent, such as a puff of air. A scanning device can output a corresponding stimulus agent towards an object, capture sensor data indicating the reaction of the object to the stimulus agent, and provide the sensor data to the trained object model. Based on the sensor data indicating how the object reacted to the stimulus agent, the object model can predict whether the object has a desired structural status or an undesired structural status.
Systems and methods are provided for translation of text in an image, and presentation of a version of the image in which the translated text is displayed a manner consistent with the original image. Text segments are automatically translated from their original source language to a target language. In order to provide presentation of the translated text in a manner that closely matches the source text, various display attributes of the source text are detected (e.g., font size, font color, font style, etc.).
A system and method for continual learning in a provider network. The method is configured to implement or interface with a system which implements a semi-automated or fully automated architecture of continual machine learning, the semi-automated or fully automated architecture implementing user-configurable model retraining or hyperparameter tuning, which is enabled by a provider network. This functions to adapt a model over time to new information in the training data while also providing a user-friendly, flexible, and customizable continual learning process.
Techniques are described for providing a policy refiner application to analyze and recommend modifications to identity and access management policies created by users of a cloud provider network (e.g., to move the policies toward least-privilege permissions). A policy refiner application receives as input a policy to analyze, and a log of events related to activity associated with one or more accounts of a cloud provider network. The policy refiner application can identify, from the log of events, actions that were permitted based on particular statements contained in the policy. Based on field values contained in the corresponding events, the policy refiner application generates an abstraction of the field values, where the abstraction of the field values may represent a more restrictive version of the field from a policy perspective. These abstractions can be presented to users as recommendations for modifying their policy to reduce the privileges granted by the policy.
Systems and methods for implementing record locking for transactions using a probabilistic data structure are described. This probabilistic structure enables adding of data records without growth of the data structure. The data structure includes a hash table for each of multiple hash functions, where entries in the respective hash tables store a transaction time and locking state. To lock a record, each hash function is applied to a record key to provide an index into a respective hash table and a minimum of the values stored in the hash tables is retrieved. If the retrieved value is less than a transaction time for a transaction attempting to lock the record, locking is permitted and the transaction time is recorded to each of the hash tables. To commit the transaction, the probabilistic data structure is atomically updated as part of the commit operation.
A system for providing code suggestions according to licensing criteria is described. The system comprises computing devices that implement a code suggestion service. The code suggestion service receives a request that specifies licensing criteria via an interface of the code suggestion service. The code suggestion service determines respective licenses for respective source code files according to a source code attribution database from parsing the plurality of source code files that are applicable to the plurality of source code files. The code suggestion service generates a set of candidate code suggestions based, at least in part, on the plurality of source code files. The code suggestion service determines code suggestions from the set of candidate code suggestions that satisfy the licensing criteria based on the respective licenses. The code suggestion service provides the code suggestions determined from the set of candidate source code files that satisfy the licensing criteria.
A distributed database identifies classifications of risk associated with stages of a query plan. The distributed database generates an execution plan in which incompatible risk classifications are assigned to separate stages of an execution plan that is derived from the query plan. The stages are assigned to computing nodes for execution based, at least in part, on the risk classifications. A result for the query is generated based on execution of the stages on the assigned computing nodes.
Disclosed are various embodiments for seamless insertion of modified media content. In one embodiment, a modified portion of video content is received. The modified portion has a start cue point and an end cue point that are set relative to a modification to the video content to indicate respectively when the modification approximately begins and ends compared to the video content. A video coding associated with the video content is identified. The start cue point and/or the end cue point are dynamically adjusted to align the modified portion with the video content based at least in part on the video coding.
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/242 - Synchronization processes, e.g. processing of PCR [Program Clock References]
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
H04N 21/8543 - Content authoring using a description language, e.g. MHEG [Multimedia and Hypermedia information coding Expert Group] or XML [eXtensible Markup Language]
16.
MULTI-DOMAIN CONFIGURABLE DATA COMPRESSOR/DE-COMPRESSOR
A data service implements a configurable data compressor/decompressor using a recipe generated for a particular data set type and using compression operators of a common registry (e.g., pantry) that are referenced by the recipe, wherein the recipe indicates at which nodes of a compression graph respective ones of the compression operators of the registry are to be implemented. The configurable data compressor/decompressor provides a customizable framework for compressing data sets of different types (e.g., belonging to different data domains) using a common compressor/decompressor implemented using a common set of compression operators.
A multitenant solver execution service provides managed infrastructure for defining and solving large-scale optimization problems. In embodiments, the service executes solver jobs on managed compute resources such as virtual machines or containers. The compute resources can be automatically scaled up or down based on client demand and are assigned to solver jobs in a serverless manner. Solver jobs can be initiated based on configured triggers. In embodiments, the service allows users to select from different types of solvers, mix different solvers in a solver job, and translate a model from one solver to another solver. In embodiments, the service provides developer interfaces to, for example, run solver experiments, recommend solver types or solver settings, and suggest model templates. The solver execution service relieves developers from having to manage infrastructure for running optimization solvers and allows developers to easily work with different types of solvers via a unified interface.
Disclosed are various embodiments for a distributed and synchronized core in a radio-based network. In one embodiment, a first radio access network (RAN)-enabled edge server at a first edge location is configured to perform a set of distributed unit (DU) functions for a radio-based network. The first RAN-enabled edge server is also configured to perform a set of core network functions and a set of centralized unit (CU) functions for the radio-based network. State associated with the set of core network functions and the set of CU functions is synchronized between the first RAN-enabled edge server and another server.
Techniques for generating content associated with a user input / system generated response are described. Natural language data associated with a user input may be generated. For each portion of the natural language data, ambiguous references to entities in the portion may be replaced with the corresponding entity. Entities included in the portion may be extracted, and image data representing the entity may be determined. Background image data associated with the entities and the portion may be determined, and attributes which modify the entities in the natural language sentence may be extracted. Spatial relationships between two or more of the entities may further be extracted. Image data representing the natural language data may be generated based on the background image data, the entities, the attributes, and the spatial relationships. Video data may be generated based on the image data, where the video data includes animations of the entities moving.
An integrated circuit that combines transpose and compute operations may include a transpose circuit coupled to a set of compute channels. Each compute channel may include multiple arithmetic logic unit (ALU) circuits coupled in series. The transpose circuit is operable to receive an input tensor, transpose the input tensor, and output a transposed tensor to the set of compute channels. The set of compute channels is operable to generate outputs in parallel, with each of the outputs being generated from a corresponding vector of the transposed tensor.
G06F 7/78 - Arrangements for rearranging, permuting or selecting data according to predetermined rules, independently of the content of the data for changing the order of data flow, e.g. matrix transposition or LIFO buffers; Overflow or underflow handling therefor
G06F 7/544 - Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using unspecified devices for evaluating functions by calculation
This disclosure describes, in part, systems for enabling facilities to implement techniques to determine when users are in possession of items when located within and/or exiting the facilities. For instance, a system may use one or more sensors to determine locations of a user that navigated through a facility. Additionally, the system may use one or more sensors to determine locations of an item while the item was located within the facility. The system may then determine a probability that the user was in possession of the item when in the facility and/or when exiting the facility based at least in part on the locations of the user and the locations of the item. If the system determines that the user was in possession of the item when exiting the facility, the system may charge a payment instrument of the user for a price of the item.
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Approaches presented herein relate to the management of secure secrets in a distributed environment. In particular, various embodiments provide for the management of unique digital identities across multiple regions, where each region can include its own certificate authority. While these certificate authorities may operate independently, they can be part of a multi¬ primary system where unique identities and keys are stored redundantly across environments. In the event of a failure of a certificate authority in one region, another certificate authority in another region can continue security and authentication management, without a need to issue new identities or change operation of any of the regions. Parties to secure communications, such as application containers, can each receive their own unique identity which can be shared across various regions to allow related tasks (e.g., certificate issuance or revocation) to be performed identically from any of those regions.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
23.
LOCATION-CONSTRAINED STORAGE AND ANALYSIS OF LARGE DATA SETS
A constraint on a location at which a portion of a data set can be stored is determined based on input received via a programmatic interface. The portion of the data set is stored at a location selected in accordance with the constraint. An analysis operation, whose input includes the portion of the data set, is performed at a set of computing resources selected from a plurality of resources based at least in part on their location.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Systems, methods, and computer-readable media are disclosed for improved wireless battery charging. The device may include a battery, and may be configured to determine that the battery is de-coupled from a wireless charger at a first time, determine that the battery is coupled to the wireless charger at a second time, determine that a first elapsed time between the first time and the second time is equal to or less than a first threshold, and cause charging of the battery to be disabled for a first time duration.
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H02J 50/80 - Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices
25.
INTERFACE DEVICE FOR INTERCOM ACCESS CONTROL SYSTEMS
This disclosure describes an electronic device that can be installed within an access control system in parallel with a legacy interface device. The electronic device may perform steps of determining a set of configuration settings associated with an access control system to which the electronic device is electrically connected, receiving, by the electronic device, a first signal in a format associated with the access control system, configuring, based on the set of configuration settings, one or more signal pathways within the electronic device, generating, by routing the first signal through the one or more signal pathways, a second signal in a second format, and providing the second signal to at least one second electronic device.
A speech-processing system may provide access to one or more virtual assistants via an audio-controlled device. A multi-agent component of a device may be used to coordinate control of device process(es) regardless of the invoked agent and without necessarily sharing information between agents and corresponding speech-processing system(s). Device-state information may be sent from the multi-agent component to a speech-processing system to interpret a user command. If the command relates to a device process control it may be routed to a device skill and to the multi-agent component of the device. The multi-agent component may track a device state and may inform a particular speech-processing system if a process related to the particular speech-processing system has been controlled.
Disclosed herein are methods for classifying a cell present in a sample, such as a tumor, of a subject, comprising: sequencing bulk DNA from first and second (e.g., tumor and healthy) a subject's tissue samples; classifying somatic variants as first or second sample alleles; sequencing RNA from the cell; aligning each RNA sequence with the bulk DNA; classifying each RNA sequence as a first, a second, or an unknown allele sequence, depending on whether it substantially aligns with the first, the second sample allele, or cannot be determined; and identifying the cell as a first, a second, or an unknown cell, based on the classifying of each of the plurality of RNA sequences. Methods can comprise validating identification by allelic frequency of germ-line variants in the RNA sequences. The methods provide improved characterization of heterogenous cell populations, such as cell populations contaminated with cells from different sources, or tumor populations.
C12Q 1/6886 - Nucleic acid products used in the analysis of nucleic acids, e.g. primers or probes for diseases caused by alterations of genetic material for cancer
G01N 33/574 - Immunoassay; Biospecific binding assay; Materials therefor for cancer
28.
PERSONALIZED LONGITUDINAL ANALYSIS OF CIRCULATING MATERIAL TO MONITOR AND ADAPT NEOANTIGEN CANCER VACCINES
Disclosed herein is a method, comprising administering to a subject in need thereof an initial immunogenic composition comprising a plurality of tumor-specific neoantigens, each corresponding to a member of a first set of tumor-associated mutations in a subject, and none corresponding to a member of a second set of tumor-associated mutations in the subject; and quantifying each member of the first set of tumor-associated mutations and each member of the second set of tumor-associated mutations in circulating material comprising tumor-associated mutations isolated from the subject at each of multiple time points.
Systems and methods described herein provide for novel boundary' generation features for interleaving additional content into media content. Media content may be received which includes a video and audio portion. An unencrypted encode of the video portion may be generated. A first set of time stamps for the video portion may be generated using a computer vision algorithm. A second set of time stamps for the video portion may be generated for identifying IDR frames using a first algorithm. A third set of time stamps may be generated to serve as boundaries for interleaving additional content into the media content based on a priority algorithm that uses the first set of time stamps and the second set of time stamps. The video portion may be encoded using the third set of time stamps to determine the IDR frames for the media content.
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
Techniques for providing execution verification at an integrated circuit device are described. The integrated circuit device may include a processor core configured to execute instructions. The integrated circuit device may also include a trace block configured to extract an execution trace from the processor core, the execution trace indicating the instructions that have been executed by the processor core. The integrated circuit device may further include a verification core configured to receive the execution trace from the trace block, extract an address from a control transfer instruction in the execution trace, perform one or more checks on the address, and generate an alarm signal based on the one or more checks.
G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Techniques are generally described for user-customized computer vision event detection. A camera device may capture a first frame of image data. A first machine learning model may generate first embedding data for the first frame of image data. The first embedding data may be input into a second machine learning model associated with the camera device. The second machine learning model and the first embedding data may be used to determine that an area-of-interest represented by the first frame of image data is in a first state. State data stored in memory may be determined. The state data may indicate that the area-of-interest was previously in a second state. An alert may be sent to a device associated with the camera device indicating that the area-of-interest has changed from the second state to the first state.
An instance secrets management isolated runtime environment is launched at a virtualization server, and utilizes a subset of memory assigned to a compute instance. The subset of memory is inaccessible from entities external to the runtime environment. A secrets manager of the runtime environment provides a security artifact to an application, running at the compute instance, which has requested access to a resource. The artifact is generated by the secrets manager using a security secret associated with the compute instance; the secret is not accessible to programs external to the runtime environment. In response to a determination that the artifact is valid, the application obtains access to the resource.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
Systems and methods are described for implementing a distributed unit in a radio access network that synchronizes its clock with a radio unit. A distributed unit may be deployed in a location where it cannot receive timing information from a satellite or may lack the equipment to obtain and process satellite signals. The clock of the distributed unit may thus drift relative to the clocks of the radio units, which may cause the distributed unit to mistime its transmissions of data to radio units for delivery to user devices. The distributed unit may prevent clock drift by obtaining timing information from the radio units, determining an amount of clock drift that is occurring, and applying a correction factor to keep the distributed unit clock synchronized with the radio unit clock. The distributed unit may determine how often to synchronize based on the severity and variability of the clock drift.
Described are systems and methods directed to the processing of two-dimensional ("2D") images of a body to determine a physical activity performed by the body, repetitions of the physical activity, whether the body is performing the physical activity with proper form, and providing physical activity feedback. In addition, the disclosed implementations are able to determine the physical activity, repetitions, and/or form through the processing of 2D partial body images that include less than all of the body of the user.
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
G06V 10/26 - Segmentation of patterns in the image field; Cutting or merging of image elements to establish the pattern region, e.g. clustering-based techniques; Detection of occlusion
A system for utilizing media content reference point information to perform media content encoding, and supplemental content stitching and/or insertion. Media content can be encoded and packaged based on boundaries of the media content. The boundaries can be received from a third-party and/or generated via an automated process. Target boundaries can be selected based on accuracy levels associated with the received and/or generated boundaries. Supplemental content can be stitched and/or inserted into packaged media content based on audio and video content of the packaged media content being aligned.
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs
G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
G06V 10/70 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning
H04N 19/136 - Incoming video signal characteristics or properties
H04N 19/179 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being a scene or a shot
H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
H04N 21/8547 - Content authoring involving timestamps for synchronizing content
36.
MEDIA CONTENT BOUNDARY-AWARE SUPPLEMENTAL CONTENT MANAGEMENT
A system for utilizing media content reference point information to perform media content encoding, and supplemental content stitching and/or insertion. Media content can be encoded and packaged based on boundaries of the media content. The boundaries can be received from a third-party and/or generated via an automated process. Target boundaries can be selected based on accuracy levels associated with the received and/or generated boundaries. Supplemental content can be stitched and/or inserted into packaged media content based on audio and video content of the packaged media content being aligned.
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
Methods for replicating transactional tables of a transactional database to an analytical database and maintaining updates to those transactional table representations are disclosed. Snapshots of the transactional tables are provided to the analytical database via a transport mechanism, such as a data storage service or a data streaming service, and stored at the analytical database. Then, checkpoints comprising portions of a change-data-capture log that has recorded transactional changes to the transactional tables of the transactional database are provided to the analytical database via the same or different transport mechanism and used to commit those transactional changes to the snapshot representations. The snapshot representations may be used to respond to incoming analytical queries in order to provide real-time querying results.
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
A multimedia streaming device can include a first circuit board configured to provide user controls and a second circuit board electrically coupled with the first circuit board and configured to provide content processing. The multimedia streaming device can also include a heat sink positioned between the first circuit board and the second circuit board and defining a speaker enclosure that includes a first portion in contact with the first circuit board, a second portion in contact with the second circuit board, and a third portion. The multimedia streaming device can additionally include a speaker installed in the third portion of the speaker enclosure.
F21V 33/00 - Structural combinations of lighting devices with other articles, not otherwise provided for
H04R 1/04 - Structural association of microphone with electric circuitry therefor
H04R 1/40 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by combining a number of identical transducers
Techniques for providing remote attestation at an integrated circuit device are described. The integrated circuit device may include a memory. The integrated circuit device may also include a write bitmap comprising a bitmap that tracks the write addresses of detected memory write operations to the memory. The integrated circuit device may further include a security subsystem configured to send one or more address ranges of interest to the write bitmap and obtain a bitmap status from the write bitmap indicating that a write address within the one or more address ranges of interest was detected.
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
40.
MULTI-TALKER AUDIO STREAM SEPARATION, TRANSCRIPTION AND DIARAIZATION
A plurality of talker embedding vectors may be derived that correspond to a plurality of talkers in an input audio stream. Each talker embedding vector may represent respective voice characteristics of a respective talker. The talker embedding vectors may be generated based on, for example, a pre-enrollment process or a cluster-based embedding vector derivation process. A plurality of instances of a personalized noise suppression model may be executed on the input audio stream. Each instance of the personalized noise suppression model may employ a respective talker embedding vector. A plurality of single-talker audio streams may be generated by the plurality of instances of the personalized noise suppression model. A plurality of single-talker transcriptions may be generated based on the plurality of single-talker audio streams. The plurality of single-talker transcriptions may be merged into a multi-talker output transcription.
Systems and methods are described for implementing a distributed unit in an open radio access network that manages its workload to reduce the risk of missing a radio unit timeslot. A distributed unit may receive data from a centralized unit and transmit the data to a radio unit, which may transmit the data to user devices during fixed timeslots. The distributed unit must therefore transmit data to the radio unit for delivery during each timeslot to prevent "dead air" and potential connectivity issues. The distributed unit thus monitors its workload, determines whether its risk of missing a window for transmitting data to the radio unit satisfies a criterion, and then if necessary reduces its workload until the criterion is no longer satisfied. The distributed unit may communicate with an access and mobility management function or other network component to facilitate workload management.
A network interface adapter can select between a first transport protocol and a second transport protocol to transmit a network packet based on a state of a connection to a destination address for the second transport protocol. The second transport protocol encapsulates the network packet formatted in the first transport protocol. The network interface adapter can automatically use the second transport protocol when the state of the connection is in an active state, and the first transport protocol when the state of the connection is not in the active state.
H04L 69/165 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP] selection criteria therefor
H04L 69/18 - Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
H04L 69/326 - Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the transport layer [OSI layer 4]
H04L 69/321 - Interlayer communication protocols or service data unit [SDU] definitions; Interfaces between layers
H04L 69/168 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP] specially adapted for link layer protocols, e.g. asynchronous transfer mode [ATM], synchronous optical network [SONET] or point-to-point protocol [PPP]
43.
REAL-TIME LOW-COMPLEXITY STEREO SPEECH ENHANCEMENT WITH SPATIAL CUE PRESERVATION
Real-time low-complexity stereo speech enhancement with spatial cue preservation may be performed. A stereo speech enhancement system receives a stereo input signal (e.g., a left and right input signal). The stereo speech enhancement system estimates spatial cues for a target speaker and downmixes the stereo input signal into a monaural signal. A low-complexity model may then process the monaural signal to generate an enhanced monaural signal. The stereo speech enhancement system upmixes the enhanced monaural signal based on the estimated spatial cues for the target speaker, to generate an enhanced stereo output signal.
Automatic onboarding, management, and control across heterogeneous edge devices of a client network using device abstractions may be performed (e.g., different types of edge devices manufactured by different vendors). A device onboarding and integration service may emulate, by a first device abstraction, an edge device of a client network, where the edge device is a first type of device. The service emulates, by a second device abstraction, the edge device as a second type of edge device (e.g., from a different vendor/uses a different API). The service updates a state of the first device abstraction based on a state of the edge device. The service then updates a state of the emulating, by a second device abstraction, the edge device as a second type of edge device. The second device abstraction sends its updated state to an application at the client network.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/08 - Configuration management of networks or network elements
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
H04L 41/046 - Network management architectures or arrangements comprising network management agents or mobile agents therefor
45.
VALIDATING AND PROVIDING PROACTIVELY GENERATED CODE SUGGESTIONS
Code completion suggestions may be proactively obtained and validated. An event that triggers obtaining a code completion suggestion for inclusion in a code file being edited using an integrated development environment may be detected. The code completion suggestion may be obtained. The characters of the code completion suggestion may be compared with characters added to the code file after the detection of the event that triggered obtaining the code completion suggestion to determine whether the code completion suggestion is valid. A valid code completion suggestion may then be displayed.
G06F 3/023 - Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
46.
MANAGING NETWORK FUNCTION ACCELERATORS FOR RADIO-BASED APPLICATIONS FROM VIRTUALIZED COMPUTING SERVICE CONTROL PLANE
Respective network addresses are assigned to a networking hardware device and a network function accelerator incorporated within an offloading card of a virtualization server by a control plane server of a virtualized computing service. A compute instance is launched at the virtualization server using a virtualization controller of the offloading card. The compute instance executes a network function of a radio-based application in response to a request received using the network address assigned to the hardware device, and requests execution of a second network function at the accelerator. The result of the second network function is sent to a radio unit of the application using the address assigned to the accelerator.
H04L 67/04 - Protocols specially adapted for terminal portability
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
47.
SYSTEM FOR ESTABLISHING INITIAL COMMUNICATION WITH SATELLITE SYSTEM
A satellite constellation provides communication between user terminals (UTs) and ground stations that connect to other networks, such as the Internet. Satellites transmit beacon transmissions to particular areas on Earth at particular times. The beacon transmissions include information used by a UT to use a random access channel (RACH) uplink to request communication. Responsive to the request, encryption is established between the satellite and the UT. The satellite may then allocate uplink resources, send data to the UT on a downlink, and so forth. The UT receives additional data about future handovers to other satellites. Based on previously received data the UT may quickly re-establish communication with a satellite after an interruption, such as due to a power outage at the UT. If the previously received data has expired, the UT may again use a beacon transmission.
Various embodiments of apparatuses and methods for multi-cast, multiple unicast, and unicast distribution of messages with time synchronized delivery are described. In some embodiments, the disclosed system and methods include a reference timekeeper providing a reference clock to one or more host computing devices. The one or more host computing devices host compute instances, and also contain respective isolated timing hardware outside the control of the compute instances. The isolated timing hardware of the one or more host computing devices then receive respective packets, and obtain the same time to deliver the respective packets. Each isolated timing hardware provides either the packet, or information to access the packet, to its respective destination compute instance subsequent to determining that the same specified time to deliver the packet has occurred. Thus, the respective packets are delivered near simultaneously to the one or more destination compute instances.
A vehicle data streaming service provides a curated catalog of vehicle attributes and allows a vehicle data stream source to register to the vehicle data streaming system and associate its data stream to a vehicle attribute of the attribute catalog. The vehicle data streaming service also allows vehicle data stream destinations to subscribe to the vehicle attribute in the vehicle catalog, receives streamed vehicle data from the data stream source, and sends streamed vehicle data conforming to registration requirements to the data stream destinations. Additionally, the vehicle data streaming service may allow management of the vehicle attribute catalog and may further manage the registration one or more sources and the subscriptions of one or more destinations.
Techniques for granting, for a device, access to additional functionality requested by user inputs received by the device are described. A system may receive, from a device, a first user input requesting content of a content type requiring additional functionality access in order for the content to be sent to the device. The system may exchange data with an access control system in order to determine the device is capable of performing the additional functionality. The system may prompt the user as to whether the additional functionality access should be granted. In response to receiving a confirmatory user input, the system may cause the access control system to grant the additional functionality access for the device.
Systems, devices, and methods are provided for package delivery guidance and assistance. A vehicle may comprise one or more sensors. A processing unit of the vehicle may determine, based on vehicle data obtained from the one or more sensors, that the vehicle is in a first state, determine that the first state corresponds to a first sub-task of the plurality of sub-tasks, determine a first graphical interface for performance of the first sub-task, present the first graphical interface on a first display screen of the at vehicle, responsive to additional vehicle data obtained from the one or more sensors indicating that the vehicle is in a second state: determine that the second state corresponds to a second sub-task of the plurality of sub-tasks, and update the first display screen with a second graphical interface that is for performance of the second sub-task.
A data guard circuit can be used to verify encryption of the data traffic on a bus between two integrated circuit (IC) devices. The data guard circuit can monitor the data traffic on the bus to analyze the data traffic based on a configuration. The analysis can be performed by sampling the data traffic, and a statistical data pattern can be identified in the sampled data traffic. The statistical data pattern can be compared with a threshold to determine whether the data traffic is encrypted. The data guard circuit can generate a notification if the data traffic is not encrypted as expected so that an appropriate action can be taken to protect the data.
Systems and methods are disclosed for implementing a vehicle shadow service configured to construct and maintain up-to-date vehicle shadows using asynchronously received disaggregated vehicle data. For example, different sensors of a vehicle may provide sensor data into a data stream at different times in a disaggregated manner. A vehicle shadow may be constructed using partial sensor data from a sub-set of sensors of the vehicle, and may be updated or augmented using asynchronously received sensor data from other sensors of the vehicle.
Techniques for generating synthetic data are described. An exemplary approach includes receiving one or more requests to generate synthetic data based on a first dataset; generating the synthetic dataset is generated according to the request by choosing a set of synthetic datapoints between pairs of datapoints of the first dataset along a line connecting them while sampling a likely value of a local probability distribution; and providing the synthetic dataset as configured by the request.
A request to deploy an application is received at a network function management service of a cloud computing environment. Based on an expected geographical distribution of the application, a premise is selected from a set of premises at which computing resource are managed from the cloud computing environment. A virtualized network function of the application is executed at a resource located at the premise.
A plurality of identities may be added to a new policy identity pool associated with new policy generation. Each identity of the plurality of identities may have respective selected permissions associated with permission usage by the identity. A new policy may be generated, based on a set of new policy constraints, that corresponds to a largest group of identities within the new policy identity pool for which the set of new policy constraints is satisfied. The set of new policy constraints may include a first constraint that the new policy includes the respective selected permissions for each identity within the largest group of identities and a second constraint that the new policy does not exceed one or more maximum additional permission thresholds. One or more indications may be provided, to a user, to attach the new policy to each identity within the largest group of identities.
A vehicle data management system and data jurisdiction system manage vehicle data between multiple jurisdictions and enables a set of jurisdiction rules involving rules of various jurisdictions to be applied consistently. The vehicle data jurisdiction system can detect changes in jurisdiction of a vehicle based on various pieces of received vehicle information and applies appropriate jurisdiction rules from a set of jurisdiction rules. Various jurisdictions may have conflicting jurisdiction rules and, in such circumstances, the data jurisdiction system resolves potential conflicts between the rules using a jurisdiction rules resolution workflow. Based on the resolution of the conflict, the data jurisdiction system can migrate data of the vehicle to one or more other jurisdictions, or otherwise implement the correct rules determined by resolving the conflict.
A network change verification (NCV) system is disclosed for checking whether a proposed configuration change on a network alters the way that the network controls recently observed network flows. In embodiments, the system builds an observed flow control model (OFCM) from logs of recent flows observed in the network. The OFCM, which may be periodically updated based on newly observed flows, provides a compact representation of how individual network flows were ostensibly controlled by the network. When a proposed configuration change is received, the system analyzes the change against the OFCM to check whether the change will alter how the network controls recently observed flows. If so, the proposed change is blocked, and an alert is generated identifying flows that are affected by the change. The NCV system thus prevents network operators from accidentally making changes on the network that will materially alter the behavior of the network.
Systems and methods are described for executing tightly coupled parallel applications on a serverless computing system. A serverless computing system executes user-submitted code in sandboxed environments such as virtual machines or containers. To support execution of parallel applications that require data transfer between instances of the application, the serverless computing system implements an ephemeral mesh network that allows instances of the parallel application to communicate with each other while executing in their respective sandboxes. In some embodiments, a controller or parent application may also connect to the ephemeral mesh network to coordinate execution of the parallel applications. In other embodiments, the parent application may be external to the serverless computing system. The serverless computing system may connect and disconnect sandboxed environments from the ephemeral mesh network as parallel applications start and stop executing, and may remove the network and terminate the parallel applications when the parent application stops executing.
A queue or media queue of music is generated by multiple listeners for playing by one or more devices. Listeners may select music using user interfaces rendered by their respective devices, and rank or vote to determine an order in which the music is played in accordance with the queue or media queue. Where a song or another media entity is accessible at a premium or only with a subscription, and one of the multiple listeners is not authorized to access the song, an unauthorized listener may be invited to purchase a subscription, or a substitute song may be selected for the unauthorized listener. Once a queue or media queue has been generated, music may be played in accordance with the queue or media queue by a single device in the presence of the multiple listeners, or by multiple devices each having any number of listeners within a vicinity.
H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
H04N 21/25 - Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
Execution status of managed time series processing tasks may be tracked. Status of a time series processing task that operations on different portions of a time series may be respectively captured. A request for the status of one of the portions of the time series with respect to the time series processing task may be received. The status may be identified and returned. For failed tasks, a failure reason may be generated by the time series processing system and included in a response with a failure status.
A quantum computing service includes a quality of service (QoS) and out-of-band prioritization module. The QoS and out-of-band prioritization module enforces QoS guarantees for quantum tasks and quantum jobs submitted to the quantum computing service while allowing for processing of the quantum jobs and quantum tasks based on QoS guarantees and not necessarily in an order in which the quantum jobs or quantum tasks are received. Also, the QoS and out-of-band prioritization module determines updated priorities out-of-band based on quantum resource usage information for previously executed quantum tasks such that submittal of pending quantum tasks is not delayed in while update priorities are being determined.
Techniques for certificate authority (CA) selection are described. A certificate management service of a cloud provider network receives a first request to generate a certificate from an electronic device, the first request including an indication of an identity of a user and an identification of a domain name to associate with the certificate. A CA selection policy applicable to the first request is identified, the CA selection policy including a CA selection rule. A CA to generate the certificate is identified by evaluating the CA selection rule, the CA selection rule associates at least a portion of the domain name with the CA. A second request to generate the certificate is sent to the identified CA. The certificate or an identification of the certificate from the CA is returned to the electronic device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Systems and methods are provided for improved 3D garment draping simulation. A garment pattern may be obtained that includes a number of flat, 2D garment panels designated to be connected at seam lines. Triangulated versions of each of the 2D garment panels may then be positioned in 3D virtual space relative to a 3D model of a human body, such that one or more annotated points on each triangulated garment panel are aligned with a corresponding labelled point or region on the 3D body. A warped 3D garment mesh may then be generated by repeatedly applying geometric manipulations to the triangulated garment panels to connect their corresponding seam lines without causing collisions between the triangulated garment panels and the 3D body. This warped 3D garment may then be provided as input to a physics-based draping simulator.
A container management service of a provider network causes a container of an application to be run using resources identified for the application at a premise external to the provider network. A condition under which a container of the application is to be run at a resource at a data center of the provider network is determined. In response to detecting that the condition has been satisfied, a container is run at a resource at a data center of the provider network
Various embodiments of apparatuses and methods for trusted and/or attested packet timestamping are described. In some embodiments, the disclosed system and methods include a reference timekeeper providing a reference clock to host computing devices. The host computing devices host compute instances using a first set of computing resources, and also contain isolated timing hardware utilizing a different set of computing resources. The isolated timing hardware sets a hardware clock based on a signal corresponding to the reference clock from the reference timekeeper. The isolated timing hardware then receives a packet from a particular compute instance, creates a timestamp for the packet based at least in part on the hardware clock, where the timestamp is outside the control of the compute instances, and sends the packet and the timestamp through a data network to transmit to a packet destination.
Disclosed are systems and methods to deliver location restricted content to devices that do not have a location component, such as a Global Positioning System component. A location aware device may send to a content delivery service, location information determined by a location component of the location aware device and receive, from the content delivery service, an encrypted access token. The location aware device may then send the access token to a non-location aware device that is on a same local area network as the location aware device. The non-location aware device may provide the access token to the content delivery service along with a request for location restricted content. The content delivery service may use the access token provided by the non-location aware device to verify that the non-location aware device is within a defined area for which the requested location restricted content is allowed for presentation.
A semiconductor package can include a capacitance die. The package can have multiple dice (e.g., logic die, memory die) mounted on a substrate. Each die can include a power domain. The dice can be distributed on the substrate such that an extra space is present on the substrate between at least some of the dice. For example, an extra space may be present between two dice, at a corner of the substrate, or other locations. The extra space can disrupt a coplanarity of the semiconductor package. The capacitance die can be located in the extra space so as to establish the coplanarity with the other dice. The capacitance die can include a capacitor array electrically coupled to multiple power domains of the plurality of dice.
H01L 23/50 - Arrangements for conducting electric current to or from the solid state body in operation, e.g. leads or terminal arrangements for integrated circuit devices
H01L 25/16 - Assemblies consisting of a plurality of individual semiconductor or other solid state devices the devices being of types provided for in two or more different main groups of groups , or in a single subclass of , , e.g. forming hybrid circuits
Systems, devices, and methods are provided for facet-based context-aware user interfaces. A system such as an online purchasing system may determine one or more intent contexts based at least in part on one or more user interactions with an online purchasing system associated with a first product. A list of substitute products may be determined based on the intent context and facets associated with the substitute products to provide for a diversity of dimensions along which a user can explore different products.
Disclosed herein are methods for evaluating the efficacy of an immunogenic composition by monitoring circulating tumor DNA. The disclosure also relates to methods for treating a subject having cancer.
Techniques for using a shared encoder and multiple different decoders for natural language understanding (NLU) tasks are described. The individual decoders are configured to perform different tasks using the output from one shared encoder. The decoders can process with respect to different domains and different languages. Using the shared encoder can reduce computation time during runtime. Using the shared encoder can reduce training costs (e.g., time and resources) when the system is updated to incorporate additional intents and entities. The system employs an attention mechanism to extract encoded representation data that can be used by the different decoders for its specific task.
Systems and methods, to efficiently prepare for live and stored file content, implement one or more warm inputs, which actively ingest and demux content, but do not actively decode the content until an input switch is commanded. Each warm input can cache a most recent instantaneous decoder refresh and subsequent reference frames (I-frames and P -frames). Upon an input switch being commanded, the subject input commences decoding of such preserved frames. The formerly-warm input then acts as a hot input (decoding every frame) until the input switch completes. The use of warm inputs, which avoid the decoding stage, reduces computational resource use, allows preparation of all inputs by default, and permits metrics, status reports, and thumbnails to be generated regarding non-active inputs.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/434 - Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams or extraction of additional data from a video stream; Remultiplexing of multiplex streams; Extraction or processing of SI; Disassembling of packetised elementary stream
H04N 21/438 - Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving MPEG packets from an IP network
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to MPEG-4 scene graphs
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
A system and method for establishing and using quantum safe enclaves is described. In some embodiments, secure shared randomness is distributed between nodes, for example using quantum key distribution. The secured shared randomness is used to generate quantum safe network keys that enable quantum safe network links to be established between any of the nodes included in the quantum safe enclave. A network manager enforces policies that restrict communications between nodes of the quantum safe enclave to transmission via quantum safe network links. Such an arrangement protects communicated data from quantum enabled attacks that may compromise other forms of encryption.
A system and method for providing quantum entanglement using a hybrid space-fiber quantum network are described. The hybrid space-fiber quantum network includes a communications hub located proximate to an optical ground station and also includes an aerial entangled particle source, such as an entangled photon source attached to a satellite, drone, aircraft, etc. An atmospheric or free-space channel is used to distribute quantum entanglement between optical ground stations that are separated by geographic distances, via the aerial entangled particle source. Also, fiber optic links are connected to the communications hub located proximate to the optical ground station. The communications hub includes optical switches that enable any of the fiber optic links connected to the communications hub to receive or send distributed quantum entanglement to a remotely located recipient endpoint via the atmospheric or free-space channel.
A text-to-speech (TTS) system may be configured to imitate characteristics of a target voice based on a limited dataset. The TTS system may include a machine learning model pre-trained using a synthetic parallel dataset and fine-tuned using examples of the target voice. A TTS component trained using a large single-speaker dataset may be used to generate the synthetic parallel dataset based on a multi-speaker dataset. The synthetic parallel dataset may include target audio data representing speech in the multi-speaker dataset and predicted audio data generated by the TTS component based on transcripts of the speech. The machine learning model may be pre-trained using the synthetic parallel dataset and fine-tuned using audio data representing target voice speech and predicted audio generated by the TTS component based on transcripts of the target voice speech. The trained model may be used to modify synthetic speech to approximate the characteristics of the target speech.
A quantum computing monitoring system may receive a request from user describing an algorithm to be executed using classical and quantum computing resources and a metric to be monitored associated with execution of the algorithm at the quantum computing resources. In execution, the quantum computing monitoring system may cause measurements to be obtained from the quantum computing resources at individual steps of the execution of the algorithm at the quantum computing resources, and the metric to be determined based on the obtained measurements. The quantum computing monitoring system may evaluate the metric with respect to a threshold, and provide an alert to the user responsive to determining that the metric fails to satisfy the threshold. The quantum computing monitoring system may further perform an operation to modify the execution of the algorithm at the quantum computing resources as needed.
G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
77.
ON-DEMAND CO-PROCESSING RESOURCES FOR QUANTUM COMPUTING
An algorithm execution management system of a provider network may receive a request from a user for executing an algorithm using different types of computing resources, including classical computing resources and quantum computing resources. The request may indicate a container that includes the algorithm code and dependencies such as libraries for executing the algorithm. The algorithm execution management system may first determine that the quantum computing resources are available to execute the algorithm, and then cause the classical computing resources to be provisioned. The algorithm execution management system may cause at least one portion of the algorithm to be executed at the classical computing resources using the container indicated by the user, and at least another portion of the algorithm to be executed at the quantum computing resources. The quantum task of the algorithm may be provided a priority during execution of the algorithm for using the quantum computing resources.
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
78.
QUANTUM COMPUTING PROGRAM COMPILATION USING CACHED COMPILED QUANTUM CIRCUIT FILES
A quantum computing service may store, in a cache, one or more compiled files of respective quantum functions included in one or more quantum computing programs received one or more customers. When the quantum computing service receives another quantum computing program, from the same or a different customer, the quantum computing service may determine whether the quantum computing program may include one or more of the quantum functions corresponding to the compiled files in the cache. If so, the quantum computing service may use the compiled files in the cache to compile the quantum computing program.
G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
79.
LIMITING USE OF ENCRYPTION KEYS IN AN INTEGRATED CIRCUIT DEVICE
A host device may include an interconnect, a host memory, and a set of processor cores. A processor core may execute a VM assigned to a cryptographic key and may send a request to access a physical address in the host memory toward the interconnect. An enforcer device may receive the request and extract a key identifier from the request. The enforcer device may determine whether to allow the request to access the physical address via the interconnect based on the key identifier and a list of allowed keys stored on the enforcer device. If the enforcer device determines to not allow the request to access, the enforcer device may modify the physical address and/or the key identifier of the request.
A device is configured to detect multiple different wakewords. A device may operate a joint encoder that operates on audio data to determine encoded audio data. The device may operate multiple different decoders which process the encoded audio data to determine if a wakeword is detected. Each decoder may correspond to a different wakeword. The decoders may use fewer computing resources than the joint encoder, allowing for the device to more easily perform multiple wakeword processing. Enabling / disabling wakeword(s) may involve the reconfiguring of a wakeword detector to add / remove data for respective decoder(s).
A system may include a first acoustic event detection (AED) component configured to detect a predetermined set of acoustic events, and include a second AED component configured to detect custom acoustic events that a user configures a device to detect. The first and second AED components are configured to perform task-specific processing, and may receive as input the same acoustic feature data corresponding to audio data that potentially represents occurrence of one or more events. Based on processing by the first and second AED components, a device may output data indicating that one or more acoustic events occurred, where the acoustic events may be a predetermined acoustic event and/or a custom acoustic event.
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
Systems and methods for contextual awareness in dynamic device groups are disclosed. For example, a dynamic device group may be generated while output of content is occurring. When a user provides user input to alter the output of the content, contextual data indicating the devices in the dynamic device group when the user input is received may be generated and utilized by an application to determine which devices are to receive a command to perform an action responsive to the user input.
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronizing decoder's clock; Client middleware
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/436 - Interfacing a local distribution network, e.g. communicating with another STB or inside the home
Systems and methods are described for a multi-tenant mode of a serverless code execution system. For instance, a method may include maintaining a set of execution environments, wherein each execution environment is associated with a serverless function, wherein the serverless function is associated with a software as a service (SaaS) provider that is a tenant of a cloud services provider, wherein the SaaS provider provides services to sub-tenants, wherein the set of execution environments are partitioned based on sub-tenants of the SaaS provider; receiving a call to execute a serverless function, wherein the call includes a serverless function identifier and a sub-tenant identifier; identifying a sub-tenant-specific execution environment of the set of execution environments that is associated with the sub-tenant; and in response to identifying the tenant-specific execution environment, invoking the serverless function on the sub-tenant-specific execution environment.
A system and method for providing quantum entanglement as a service are described. Intermediate nodes which may be located in trusted or trustless locations are used to distribute quantum entanglement to endpoints, such as endpoints of customers of a quantum entanglement distribution service. The distributed quantum entanglement provides a secure communication path that does not rely on trust placed in an infrastructure or software provider. To distribute the quantum entanglement, intermediate nodes comprising quantum memories are used. Joint measurements are performed on quantum particles of respective entangled quantum pairs received at the intermediate nodes without collapsing superposition states of the particles. This allows for the quantum entanglement to be extended across intermediate nodes while maintaining entanglement and superposition of the entangled quantum particles.
Disclosed are various embodiments for provisioning radio-based networks with locality rules. In one embodiment, at least one locality rule associated with an organization is accessed. The locality rule(s) require that at least a subset of network traffic for a radio-based network remain within a particular geographic area. The radio-based network includes a radio access network and an associated core network. A topology for the radio-based network is determined based at least in part on the locality rule(s). The radio-based network is provisioned or reconfigured for the organization to have the topology complying with the at least one locality rule.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/122 - Discovery or management of network topologies of virtualised topologies e.g. software-defined networks [SDN] or network function virtualisation [NFV]
H04L 41/08 - Configuration management of networks or network elements
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
H04L 41/0897 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities by horizontal or vertical scaling of resources, or by migrating entities, e.g. virtual resources or entities
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
H04L 43/20 - Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
86.
TECHNIQUES FOR PROVIDING A SEARCH INTERFACE WITHIN A CAROUSEL
Techniques are described herein for providing search features within a carousel. A request may be received to display a network page (e.g., user profile page). The carousel may present a subset of items of a set of items (e.g., items associated with user profile). User input indicating a scrolling action within the carousel can be received. In response, a user interface (UI) element associated with conducting a search may be presented in an expanded form overlaid atop the carousel. After a predefined period of time has elapsed, the user interface element may transition to a collapsed form. If the user interface element is selected, the user may be navigated to the end of the carousel where a statically-positioned presentation of the user interface element is presented. A search may be conducted from the statically-positioned presentation. The search may be performed against the set of items associated with the user profile.
Techniques are described for enabling users of a certificate management service to create certificate issuance policies that can be applied to certificate issuance requests across both public and private certificate authorities (CAs) and other certificate-related services. According to embodiments described herein, a certificate issuance policy includes one or more certificate issuance rules to be applied to requests associated with one or more specified user accounts or roles for certificate-related resources (e.g., public certificates, private certificates, etc.). The application of a certificate issuance rule can be conditioned on a particular request context (e.g., based on a user account or role associated with a request, a type of certificate requested, a subject name identified in the request, etc.) and can specify a wide range of actions to be performed on requests matching a rule (e.g., allowing or denying a request, modifying one or more parameters of the request, etc.).
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
88.
SYSTEMS FOR ENABLING ACCESS TO A SHIPPING BENEFIT FROM SELLER CONTENT
A seller provides customers with the ability to order items using shipping benefits associated with a separate fulfillment entity, such as an online store, by providing inventory to a designated fulfilment location. When a customer accesses the webpage, identifiers for the customer device and item are used to determine an estimated delivery time the separate fulfillment entity may provide, which may be presented in a widget or other type of element within the webpage. In response to input to the element, the customer may be presented with a prompt for authentication data, and after a successful authentication, the estimated delivery time may be updated based on a location of the authenticated customer. In response to input confirming the transaction, an order for the item is generated by the separate fulfillment entity and the customer may continue navigating the seller website.
Systems and methods are provided for management of network segments that cross geographic regions and/or other types of network divisions in a cloud-based network environment. A cloud-based network provider's geographically-dispersed network infrastructure may serve as the core of a client's private wide area network, and the client may define isolated segments to which other networks (virtual private clouds, virtual private networks, etc.) may be attached. The various segments may remain logically isolated from each other even when implemented across some or all of the same regions—and using the same physical and/or virtual routing components—as other segments of the same client and/or other clients.
A networking manager of an extension server of a virtualized computing service detects that a data link layer frame has been obtained at the extension server. The networking manager delivers at least a portion of contents of the frame to a compute instance running at the extension server in response to determining that a destination media access control (MAC) address of the frame matches a MAC address of a local-premise-access virtual network interface attached to the compute instance. The local-premise-access virtual network interface is not assigned an Internet Protocol (IP) address from a range of IP addresses managed by the virtualized computing service.
A system comprising one or more computing devices implements a vehicle information extraction service. The vehicle information extraction service enables customers to maintain a model of a fleet of vehicles and collect vehicle information from heterogenous vehicles included in the fleet, wherein the vehicles are configured with different in-vehicle communication configurations. The vehicle information extraction service automatically generates scheme packets for data collection to be sent to the heterogenous vehicles, wherein are formatted in accordance with the different respective in-vehicle communication configurations of the heterogenous vehicles, without the customer of the vehicle information extraction service having to account for these differences.
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
G08G 1/123 - Traffic control systems for road vehicles indicating the position of vehicles, e.g. scheduled vehicles
G08G 1/00 - Traffic control systems for road vehicles
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04W 4/029 - Location-based management or tracking services
G08G 1/01 - Detecting movement of traffic to be counted or controlled
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
92.
MACHINE LEARNING USING SERVERLESS COMPUTE ARCHITECTURE
A serverless computing system is configured to provide access to a machine learning model by at least associating an endpoint, comprising code that accesses the machine learning model, with an extension that interfaces between a serverless compute architecture and the endpoint. A request to perform an inference is received by the system and processed by using the serverless compute architecture to execute a compute function. The compute function cases the extension to interface with the endpoint to cause the machine learning model to perform the inference.
Idle periods may be for management actions at processing clusters for managed databases. A leader node of a processing cluster for a managed database may monitor a network endpoint at a proxy service associated with a database managed by the database service. An idle period for the database may be detected. A management action for the processing cluster may be determined to be performed during the detected idle period. The leader node may cause the determined management action to be performed.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 16/21 - Design, administration or maintenance of databases
A system comprising one or more computing devices implements a vehicle information extraction service. The vehicle information extraction service enables customers to optimize an amount of relevant vehicle sensor information extracted from vehicles by reducing instances of collection of redundant data. The vehicle information extraction service additionally, or alternatively, enables customers to maintain a model of a fleet of vehicles and determine number of the vehicles of the fleet in a certain partition to calculate a data reduction factor that will filter out sensor data. The vehicle information extraction service communicates the reduction factor to the vehicles in the geographical region using a vehicle scheme to indicate to the vehicles the probability with which the vehicle is to transmit a particular type of sensor data.
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
G08G 1/123 - Traffic control systems for road vehicles indicating the position of vehicles, e.g. scheduled vehicles
G08G 1/00 - Traffic control systems for road vehicles
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04W 4/029 - Location-based management or tracking services
G08G 1/01 - Detecting movement of traffic to be counted or controlled
95.
FAST DATABASE SCALING UTILIZING A DECOUPLED STORAGE AND COMPUTE ARCHITECTURE
Techniques for fast online scaling of a database via a split architecture including decoupled storage and compute tiers in a database service are described. A cluster of database (DB) nodes is scaled to add a new DB node. The scaling includes determining a split for data of a first volume managed by an existing DB node. A second DB node is obtained, and the first volume is cloned according to a lightweight copy technique to yield a second volume for use by the second DB node. After the cloning, a set of database modifications are applied to the second volume based on modifications caused by database traffic received by the first DB node, involving the volume, during the cloning of the first volume. Each DB node may drop the portion of the volume that it does not need according to the split.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
96.
EXTENDING CLOUD-BASED VIRTUAL PRIVATE NETWORKS TO USER EQUIPMENT ON RADIO-BASED NETWORKS
Disclosed are various embodiments for extending cloud-based virtual private networks to user equipment on radio-based networks. In one embodiment, a request is received from a client device for service from a radio-based network. The client device is provided with access to a virtual private cloud network through the radio-based network in response to receiving the request from the client device for service from the radio-based network. Encapsulated network traffic is forwarded from the client device to the virtual private cloud network via a network link between the radio-based network and a cloud provider network that hosts one or more resources on the virtual private cloud network.
Techniques for building, validating, and utilizing custom database software in a shared management environment are described. A database customization service allows users to provide database installation files as part of a configuration to generate a custom database engine version. The creation of custom database engine versions may be governed by policy, and the database customization service may provide recommendations for creating custom database engine versions according to various criteria. The custom database engine version can be built, and its functionality and correctness verified. Users may launch database instances using these custom database engine versions that can be managed under a shared management scheme where both users and the database customization service can perform host-level management.
A PCR testing module (100) that includes a housing having a PCR machine (106) disposed therein; a sample input station (104) on the housing, wherein the sample input station is configured to receive a sample collection device (SCD) comprising a biological specimen sample provided by the patient; an SCD processing mechanism configured to transfer a lysed microportion of the biological specimen sample into a PCR sample tube (308, 507, 1104, 1204, 1302) attached to the SCD; at least one mechanism configured to separate the PCR sample tube (308, 507, 1104, 1204, 1302) from the SCD and transfer the PCR sample tube to the PCR machine (106); and a controller configured to (i) use the PCR machine (106) to conduct a PCR test on contents of the PCR sample tube (308, 507, 1104, 1204, 1302), and (ii) generate results of the PCR test.
A61B 10/00 - Other methods or instruments for diagnosis, e.g. for vaccination diagnosis; Sex determination; Ovulation-period determination; Throat striking implements
G01N 1/38 - Diluting, dispersing or mixing samples
G01N 35/04 - Automatic analysis not limited to methods or materials provided for in any single one of groups ; Handling materials therefor using a plurality of sample containers moved by a conveyor system past one or more treatment or analysis stations - Details of the conveyor system
G01N 35/00 - Automatic analysis not limited to methods or materials provided for in any single one of groups ; Handling materials therefor
Light weight ophthalmic lenses include a curved back lens attached to a curved front lens assembly having a functional element. An ophthalmic lens includes a curved front lens assembly and a curved back lens. The curved front lens assembly has an essentially constant thickness, forms an external world-side convex surface of the ophthalmic lens, and includes a functional element operable to modify an image of a real world scene viewed via the ophthalmic lens. The curved back lens forms an external user-side surface of the ophthalmic lens, has a world-side convex surface that is shaped complementary to and interfaced with the front lens assembly, and provides a prescribed vision correction.
Described herein are systems and techniques for implementing a third-party item tracking and payment system that enables a user to walk out without a manual checkout process. The techniques include receiving user identifying information associated with a payment account and conveying an identifier of the account to a management system of the retailer. Items, as selected by the user, are added to a virtual cart that is checked out automatically when the user exits the store and the third party system communicates the cart contents to the retailer for cost calculation and then instructs payment using the stored payment information without disrupting existing inventory and account management systems.