AMAZON TECHNOLOGIES, INC. Patent applications |
Patent application number | Title | Published |
20160134616 | DESKTOP APPLICATION FULFILLMENT PLATFORM WITH MULTIPLE AUTHENTICATION MECHANISMS - A service provider system may include an application fulfillment platform that delivers desktop applications to desktops on physical computing devices or virtual desktop instances. A computing resource instance may be registered with the platform, which generates a unique identifier and a security token for the computing resource instance using multiple authentication mechanisms. An end user of a customer organization may be registered with the platform, which generates a unique identifier and a security token for the end user using multiple authentication mechanisms. An application delivery agent may submit service requests to the platform on behalf of itself or the given user. The identity and security credentials included in the requests may be dependent on the request type and the entities on whose behalf they are submitted. A proxy service on the platform may receive the requests and validate the credentials, then dispatch the requests to other services on the platform. | 05-12-2016 |
20160132808 | PORTFOLIOS AND PORTFOLIO SHARING IN A CATALOG SERVICE PLATFORM - A service provider system may implement an enterprise catalog service that manages catalogs and portfolios of software products (e.g., desktop applications and server products) on behalf of service provider customer organizations. Through the service, a customer organization administrator may create a portfolio (e.g., a container) and configure the portfolio for subsequent use by end users in the organization, which may include adding products, users, permissions, and constraints on the usage of the products (individually or collectively) to the portfolio for all authorized end users or particular end users. Portfolios may be shared with other administrators by publishing them or through direct notification of sharing. A recipient of a shared portfolio may, after importing it, further restrict access to the portfolio or the use of the products therein, but cannot modify the portfolio itself. Changes made by a portfolio owner may be propagated to authorized users and to portfolio importers automatically. | 05-12-2016 |
20160132806 | CATALOG SERVICE PLATFORM FOR DEPLOYING APPLICATIONS AND SERVICES - A service provider system may implement an enterprise catalog service that manages catalogs or portfolios of software products (e.g., desktop applications and server products) on behalf of service provider customer organizations. Through the enterprise catalog service, an administrator in a customer organization may discover, select, and ingest products (e.g., based on their features, pricing, and terms), and may add them to catalogs or portfolios for subsequent use by end users in the organization. The administrator may apply constraints on product use and limit product access to particular end users. The products may include third party products that are made available through the enterprise catalog service and a customer's own applications. The enterprise catalog service may monitor usage of third party products and bill the customer organization. Products managed by the enterprise catalog service may be deployed through an application fulfillment platform or resource stack management platform. | 05-12-2016 |
20160132805 | CONSTRAINTS AND CONSTRAINT SHARING IN A CATALOG SERVICE PLATFORM - A service provider system may implement an enterprise catalog service that manages software products and portfolios of software products on behalf of service provider customer organizations. Through an administrator interface of the service, a customer organization administrator may create constraints on the use of the software products, and each constraint may include one or more rules about how the products can be launched. These may include environmental constraints (specifying a region in which a product launches), restrictions on input parameter values (including the types of resource instances on which a product can be launched), quotas (controlling the number of product installations), or billing constraints. Constraints may be applied on a user-to-product arc or on a portfolio-to-product arc. Constraints may be stored as objects, and reference to those objects may be added to product or portfolio objects. Constraints may be shared across object versions, portfolios, or service provider customer accounts. | 05-12-2016 |
20160132320 | Deploying Updates to an Application During Periods of Off-Peak Demand - Update preferences might be utilized to specify that an update to an application should not be applied until the demand for the application falls below a certain threshold. Demand for the application is monitored. The update to the application is applied when the actual demand for the application falls below the specified threshold. The threshold might be set such that updates are deployed during the off-peak periods of demand encountered during a regular demand cycle, such as a diurnal, monthly, or yearly cycle. | 05-12-2016 |
20160132310 | DYNAMIC RECONSTRUCTION OF APPLICATION STATE UPON APPLICATION RE-LAUNCH - A service provider system may include an application fulfillment platform that delivers desktop applications on demand to desktops on physical computing devices or virtual desktop instances of end users. An application delivery agent installed on an end user's computing resource instance may store application state data (e.g., configuration data, runtime settings, or application templates) or scratch data that is generated by an application executing on the computing resource instance to a secure location on service provider storage resources. After a machine failure or change, or a rebuilding of a virtualized computing resource instance or virtual desktop instance, an application delivery agent installed on the new machine or instance may reinstall the application, retrieve the stored application state or scratch data from service provider resources, and restore the application to the last known persisted state. Upon request, the application delivery agent may restore the application to any earlier persisted state. | 05-12-2016 |
20160132214 | APPLICATION DELIVERY AGENTS ON VIRTUAL DESKTOP INSTANCES - A service provider system may include an application fulfillment platform that delivers desktop applications to end users (e.g., to physical computing devices or virtual desktop instances). An application delivery agent installed on an end user's device may send requests to access platform control plane services on behalf of the agent or the end user (along with security credentials) and may retrieve messages directed to the device from a queue on the platform. Messages may be placed in the queue by control plane services in response to agent requests. Messages may include instructions for the agent to perform installing, uninstalling, updating, or reinstalling a virtualized desktop application package on the device. The agent may request and retrieve (from the queue) information about the intended (or assumed) installation state of applications on the device, compare it to locally stored information about the actual state, and initiate corrective action, if needed. | 05-12-2016 |
20160127253 | ROUTING HANDLER FOR RULE-BASED ACTION TRIGGERING - Methods, systems, and computer-readable media for implementing a routing handler for rule-based action triggering are disclosed. A request is received at a routing handler from a client. The request specifies a particular operation at a particular one of a plurality of sub-services. The sub-services comprise one or more operations for defining a plurality of rules; the rules are defined to bind triggers to actions. The sub-services also comprise one or more operations for performing the actions in a provider network comprising a plurality of resources. The particular operation in the request is determined at the routing handler. The particular one of the sub-services is determined at the routing handler based on the particular operation, using a routing map. The routing map is dynamically updated when operations provided by sub-services are modified. The request is routed to the particular one of the sub-services. | 05-05-2016 |
20160127200 | DYNAMIC SCALING OF STORAGE VOLUMES FOR STORAGE CLIENT FILE SYSTEMS - A network-based data store maintaining storage volumes for file systems at storage clients may implement dynamic storage volume scaling. A scaling event may be detected according to a specified scaling policy for a storage volume maintained at a network-based data store that is mounted at a storage client and configured for a file system. In a least some embodiments, the scaling policy for the storage volume may be received from the storage client. In response to detecting the storage event, storage maintaining the storage volume may be modified according to the scaling policy to scale the storage volume. An indication of the scaling event may be sent to the storage client in order to update the file system at the storage client so that the file system may utilize the scaled storage volume. | 05-05-2016 |
20160125293 | RULE-BASED ACTION TRIGGERING IN A PROVIDER NETWORK - Methods, systems, and computer-readable media for implementing rule-based triggering in a provider network are disclosed. When conditions are met for one or more triggers, one or more rules that comprise the one or more triggers are determined. The conditions are determined in a provider network comprising a plurality of resources. One or more actions are determined in the one or more rules that comprise the one or more triggers. The one or more actions are performed, comprising modifying one or more of the resources in the provider network. | 05-05-2016 |
20160124870 | SYSTEM AND METHOD FOR LOGICAL DELETION OF STORED DATA OBJECTS - Systems and methods for providing object versioning in a storage system may support the logical deletion of stored objects. In response to a delete operation specifying both a user key and a version identifier, the storage system may permanently delete the specified version of an object having the specified key. In response to a delete operation specifying a user key, but not a version identifier, the storage system may create a delete marker object that does not contain object data, and may generate a new version identifier for the delete marker. The delete marker may be stored as the latest object version of the user key, and may be addressable in the storage system using a composite key comprising the user key and the new version identifier. Subsequent attempts to retrieve the user key without specifying a version identifier may return an error, although the object was not actually deleted. | 05-05-2016 |
20160117635 | SELECTIVE HIGH-RESOLUTION VIDEO MONITORING IN A MATERIALS HANDLING FACILITY - A video-based monitoring system may dynamically adjust the resolution or frame rate of video cameras in a materials handling facility in response to changing conditions or events. The resolution or frame rate may be increased when an agent authorized to handle high-value items (e.g., expensive items or those at high risk of being stolen) enters the field of view of a given camera in the facility. The system (or a video camera thereof) may detect the presence of the authorized agent by detecting that his clothing or equipment includes a color or pattern designating such authorization using analytics applied to a video stream captured by the camera. Other pre-defined conditions or events indicating that higher-resolution video monitoring is warranted may trigger an increase in the resolution or frame rate of a camera. The resolution or frame rate may be decreased when these conditions or events no longer apply. | 04-28-2016 |
20160112497 | ON-DEMAND DELIVERY OF APPLICATIONS TO VIRTUAL DESKTOPS - A service provider system may include an application fulfillment platform that delivers desktop applications on demand to desktops on physical computing devices or virtual desktop instances. The applications may be selected for delivery from a catalog of applications, and may be required to be installed on the destination computing resource instance, or may be assigned to a customer's end user on whose behalf the resource instance was provisioned. A workflow for deploying a selected application may invoke services implemented on the platform. The desktop application may be delivered as a virtualized application package that is subsequently executed by a runtime engine installed on the end user's resource instance, without installing the selected application itself on the computing resource instance. A customer's IT administrators may create and populate the catalog, add customer-generated or customer-licensed applications, assign applications to users, apply constraints on application use, and monitor application usage. | 04-21-2016 |
20160110408 | OPTIMIZED LOG STORAGE FOR ASYNCHRONOUS LOG UPDATES - A log-structured data store may implement optimized log storage for asynchronous log updates. In some embodiments, log records may be received indicating updates to data stored for a storage client and indicating positions in a log record sequence. The log records themselves may not be guaranteed to be received according to the log record sequence. Received log records may be stored in a hot log portion of a block-based storage device according to an order in which they are received. Log records in the hot log portion may then be identified to be moved to a cold log portion of the block-based storage device in order to complete a next portion of the log record sequence. Log records may be modified, such as compressed, or coalesced, before being stored together in a data block of the cold log portion according to the log record sequence. | 04-21-2016 |
20160110110 | SYSTEM AND METHOD FOR PROVIDING HIGH AVAILABILITY DATA - A computer-implemented data processing system and method writes a first plurality of copies of a data set at a first plurality of hosts and reads a second plurality of copies of the data set at a second plurality of hosts. The first and second pluralities of copies may be overlapping and the first and second pluralities of hosts may be overlapping. A hashing function may be used to select the first and second pluralities of hosts. Version histories for each of the first copies of the data set may also be written at the first plurality of hosts and read at the second plurality of hosts. The version histories for the second copies of the data set may be compared and causal between the second copies of the data set may be evaluated based on the version histories for the second copies of the data set. | 04-21-2016 |
20160100031 | SYSTEM AND METHOD FOR SELECTION AND SWITCHING OF CONTENT SOURCES FOR A STREAMING CONTENT SESSION - Embodiments may include the generation and use of content source rankings for improving playback quality of content streams. In embodiments, a merchant system may collect and aggregate multiple quality metrics for different content streams that various content sources provide to various clients. The merchant system may utilize the quality metrics to generate rankings of content sources for clients. In some cases, a client itself may generate a ranking of content sources for use in the selection of content sources. The merchant system may provide such rankings to clients to improve the content stream playback experience on the client. For instance, at content acquisition time, a client may request a content stream from a content resource ranked highest on a content source ranking provided by the merchant. If the content stream degrades, the client may source subsequent portions of the content stream from another highly ranked content source of the ranking. | 04-07-2016 |
20160094866 | USER INTERACTION ANALYSIS MODULE - An interaction analysis module may collect data about user interactions with video content in a real-time video exploration (RVE) system, analyze the collected data to determine correlations between users or groups of users and particular video content, and provide the analysis data to one or more systems, for example to the RVE system or to an online merchant. The RVE system may dynamically render and stream new video content targeted at particular users or groups based at least in part on the analysis data. Network-based computation resources and services may be leveraged by the RVE system to enable interactive exploration of video content by the users, as well as the real-time rendering and streaming of the new video content. Entities such as online merchants may target information such as advertising or recommendations to particular users or groups based at least in part on the analysis information. | 03-31-2016 |
20160093078 | VIRTUAL WORLD GENERATION ENGINE - A virtual world generation engine and methods for generating virtual worlds from images collected from various sources, including crowdsourced images. A virtual world generation engine may obtain images (e.g., digital photographs, digital video frames, etc.) related to a particular real-world scene, combine the images using image processing techniques such as image stitching techniques to generate composite images representing a view of the scene, and generate models from the composite images. The models may be used in rendering video content representing virtual worlds generated from the collected images of real-world scenes; the video content may be streamed to client device(s). Obtaining the images, generating models, rendering video content from the models, and streaming the video content may be performed in response to user interactions with video content on the client device(s) to allow interactive exploration of the virtual worlds in real-time or near-real time. | 03-31-2016 |
20160091710 | ELECTROWETTING DISPLAY PIXELS WITH PATTERNED ELECTRIC FIELD - An electrowetting display comprises a support plate on which individual electrowetting pixels separated from one another by pixel walls are formed. The individual electrowetting pixels include a first conductive layer and a second conductive layer on the support plate. The first conductive layer and the second conductive layer are separated by a dielectric layer in first portions of the individual electrowetting pixels. The first conductive layer and the second conductive layer are in electrical contact with one another in second portions of the individual electrowetting pixels, wherein the second portions of the individual electrowetting pixels may be U-shaped. | 03-31-2016 |
20160087940 | PRIVATE ALIAS ENDPOINTS FOR ISOLATED VIRTUAL NETWORKS - In accordance with a designation of a private alias endpoint as a routing target for traffic directed to a service from within an isolated virtual network of a provider network, a tunneling intermediary receives a baseline packet generated at a compute instance. The baseline packet indicates a public IP (Internet Protocol) address of the service as the destination, and a private IP address of the compute instance as the source. In accordance with a tunneling protocol, the tunneling intermediary generates an encapsulation packet comprising at least a portion of the baseline packet and a header indicating the isolated virtual network. The encapsulation packet is transmitted to a node of the service. | 03-24-2016 |
20160086260 | LIFECYCLE TRANSITIONS IN LOG-COORDINATED DATA STORES - Based at least in part on an optimization goal determined for a storage group comprising a plurality of data stores for which writes requests are coordinated by a log-based transaction manager, one or more lifecycle transitions are identified for data objects stored in a first data store. In accordance with a first lifecycle transition, a data object is to be transferred from the first data store to a second data store based at least in part on a duration for which the data object has been resident at the first data store. A transition agent is assigned by a configuration manager to implement the first lifecycle transition. | 03-24-2016 |
20160085772 | AUTOMATED CONFIGURATION OF LOG-COORDINATED STORAGE GROUPS - A configuration manager of a storage service receives a set of service requirements, comprising one or more of: a performance requirement for one or more types of storage operations, or an access interface type requirement Based on the service requirements, a candidate storage configuration that includes one or more data store instances and a first log-based transaction manager is generated. Subsequent to an approval of the first storage configuration by a client, the establishment of the data store instances and the log-based transaction manager is initiated. | 03-24-2016 |
20160081229 | STALL CONTAINMENT OF RACK IN A DATA CENTER - A system for managing air flow computing devices in a rack includes a stall and filler elements. The stall includes a stall top panel and two side panels spaced apart from one another. The stall accommodates a rack computing system. The filler elements fill gaps between the computing devices of the rack computing systems and the panels of the stalls. An air moving system moves air from the cold aisle through cold-aisle facing air inlets of the computing devices. The filler elements inhibit air moving toward the cold aisle-facing inlets from leaking through gaps between the computing devices of the rack computing systems and the stall panels such that the filler elements inhibit air moving toward inlets in the computing devices from leaking through the gaps between the computing devices in the rack and the stall panels. | 03-17-2016 |
20160080484 | DYNAMIC VIRTUAL RESOURCE REQUEST RATE CONTROL FOR UTILIZING PHYSICAL RESOURCES - A virtualization host may implement dynamic virtual resource request rate controls for physical resources. Individual virtual resource request queues may be maintained for different virtual compute instances implemented at a virtualization host for a particular physical computer resource. After placing a work request from one of the individual virtual resource request queues into a physical resource request queue to be performed at the physical computer resource, a delay may be dynamically determined based, at least in part, on the workload of the physical resource request queue. After imposing the delay, a next work request from the individual virtual resource request queue may be placed into the physical resource request queue. In at least some embodiments, the dynamically determined delay may include a randomly added delay. | 03-17-2016 |
20160078361 | OPTIMIZED TRAINING OF LINEAR MACHINE LEARNING MODELS - An indication of a data source to be used to train a linear prediction model is obtained. The model is to generate predictions using respective parameters assigned to a plurality of features derived from observation records of the data source. The parameter values are stored in a parameter vector. During a particular learning iteration of the training phase of the model, one or more features for which parameters are to be added to the parameter vector are identified. In response to a triggering condition, parameters for one or more features are removed from the parameter vector based on an analysis of relative contributions of the features represented in the parameter vector to the model's predictions. After the parameters are removed, at least one parameter is added to the parameter vector. | 03-17-2016 |
20160077929 | ROTATING INCREMENTAL DATA BACKUP - A method for backing up a database includes identifying n portions of a database wherein each of the n portions is greater than 0% and less than 100% of the database. The method also includes performing a complete backup of a first 1/n portion of the database and performing an incremental backup on the remaining (n−1)/n portion of the database, and for each subsequent backup, performing a complete backup of a next 1/n portion of the database and performing an incremental backup on the remaining (n−1)/n portion of the database. | 03-17-2016 |
20160077846 | RESOURCE CREDIT POOLS FOR REPLENISHING INSTANCE RESOURCE CREDIT BALANCES OF VIRTUAL COMPUTE INSTANCES - A provider network may implement resource credit pools to replenish resource credit balances for virtual compute instances. A resource credit pool may be maintained that makes resource credits available to virtual compute instances authorized to obtain resource credits from the resource credit pool. Resource credits from the resource credit pool may be applicable to increase utilization of physical computer resource for a virtual compute instance. In response to a resource credit request for an authorized virtual compute instance, a number of resource credits to add to an individual resource credit balance for the authorized virtual compute instance may be determined. A response may be sent indicating the number of resource credits to add to the individual resource credit balance and the resource credit pool may be updated to remove the number of resource credits from the resource credit pool. | 03-17-2016 |
20160077845 | VARIABLE TIMESLICES FOR PROCESSING LATENCY-DEPENDENT WORKLOADS - A virtualization host may implement variable timeslices for processing latency dependent workloads. Multiple virtual compute instances on a virtualization host may utilize virtual central processing units (vCPUs) to obtain physical processing resources, such as one or more central processing units (CPUs). A vCPU currently utilizing a CPU to performing processing work according to a scheduled timeslice may be preempted by a latency dependent vCPU before completion of the scheduled timeslice. The latency-dependent vCPU may complete processing work, and utilization of the CPU may be returned to the vCPU. A preemption compensation may be determined for the scheduled timeslice to increase the scheduled timeslice for the vCPU such that utilization for the vCPU is performed according to the increased scheduled timeslice. | 03-17-2016 |
20160072920 | PROVISIONING MULTIPLE NETWORK RESOURCES - A resource provisioning service allows users to provision multiple, different network resources in an atomic manner and with a single call to a resource provisioning service. In some instances, the multiple, different network resources comprise individual types of resources that form a portion of one or more cloud-computing platforms. For instance, one or more entities may host and operate a cloud-computing platform that includes different types of network resources, such a storage service, a load balancing service, a compute service, a security service, or any other similar or different type of network-accessible service. | 03-10-2016 |
20160072286 | METHOD AND SYSTEM FOR ESTABLISHING A POWER FEED TO SYSTEMS DURING OPERATION - A method of adding a power feed to electrical systems includes coupling a set of input lines to a power source such that the input lines are connected to at least one phase of AC power from the power source, and coupling a set of backfeed lines to an output receptacle in a power distribution unit. The output receptacle may be connected in parallel with at least one other output receptacle that is supplying primary power to systems in the data center. The set of backfeed lines and the set of input lines may be tested to determine a match between a pair of lines in the set of backfeed lines and a pair of lines in the set of input lines. Determining the match may include matching the phase of the pair of backfeed lines with the phase of the pair of input lines. | 03-10-2016 |
20160070771 | READ DESCRIPTORS AT HETEROGENEOUS STORAGE SYSTEMS - In response to a read request directed to a first data store of a storage group, a state transition indicator is identified, corresponding to a modification that has been applied at the data store before a response to the read is prepared. A read descriptor that includes the state transition indicator and read repeatability verification metadata is prepared. The metadata can be used to check whether the read request is a repeatable read. The read descriptor is transmitted to a client-side component of the storage group. | 03-10-2016 |
20160070740 | STATELESS DATASTORE-INDEPENDENT TRANSACTIONS - At a client-side component of a storage group, a read descriptor generated in response to a read request directed to a first data store is received. The read descriptor includes a state transition indicator corresponding to a write that has been applied at the first data store. A write descriptor indicative of a write that depends on a result of the read request is generated at the client-side component. The read descriptor and the write descriptor are included in a commit request for a candidate transaction at the client-side component, and transmitted to a transaction manager. | 03-10-2016 |
20160070589 | SCALABLE LOG-BASED TRANSACTION MANAGEMENT - A first transaction manager of a partitioned storage group stores a first conditional commit record for a first write of a multi-partition transaction based on a first conflict detection operation. A second transaction manager stores a second conditional commit record for a second write of the transaction based on a second conflict detection operation. A client-side component of the storage group determines that both writes have been conditionally committed, and stores an unconditional commit record in a commit decision repository. A write applier examines the first conditional commit record and the unconditional commit record before propagating the first write to the first partition. | 03-10-2016 |
20160055465 | ELECTRONIC BOOK RENTALS - Architectures and techniques are described to rent electronic books. In particular, a content provider can rent electronic books to individuals for a specified rental term. The individuals may have the option to modify the rental term for an electronic book. The rental term for a particular electronic book may be modified by extending the rental term of the particular electronic book or decreasing the rental term of the particular electronic book. Individuals may also convert the rental of an electronic book to a purchase and a purchase of an electronic book to a rental. In order to rent the electronic books to individuals, the content provider may acquire permission from the publishers of the electronic books. In some cases, the content provider may acquire a pool of time-bound rentable licenses from the publishers to allocate to individuals renting electronic books from the content provider. | 02-25-2016 |
20160055229 | METHOD AND APPARATUS FOR STRESS MANAGEMENT IN A SEARCHABLE DATA SERVICE - Method and apparatus for stress management in a searchable data service. The searchable data service may provide a searchable index to a backend data store, and an interface to build and query the searchable index, that enables client applications to search for and retrieve locators for stored entities in the backend data store. Embodiments of the searchable data service may implement a distributed stress management mechanism that may provide functionality including, but not limited to, the automated monitoring of critical resources, analysis of resource usage, and decisions on and performance of actions to keep resource usage within comfort zones. In one embodiment, in response to usage of a particular resource being detected as out of the comfort zone on a node, an action may be performed to transfer at least part of the resource usage for the local resource to another node that provides a similar resource. | 02-25-2016 |
20160004731 | SELF-SERVICE CONFIGURATION FOR DATA ENVIRONMENT - The values of various operating and/or configuration parameters of a data environment are managed using a set of self-service Web services and interfaces of a separate control environment. A customer can submit a Web services call into an externally-facing application programming interface (API) or other such externally-facing interface of the control environment. The API receiving the call, as well as information extracted from the call, can be used to determine appropriate adjustments to be performed in the data environment. A workflow can be instantiated that includes tasks used to validate and/or apply the adjustments to the target resources, such as databases, data instances, data stores, instance classes, etc. Various real-time functions such as monitoring and auto-scaling also can be performed via the control plane. | 01-07-2016 |
20150381709 | INPUT/OUTPUT MANAGEMENT IN A DISTRIBUTED STRICT QUEUE - Methods and systems for implementing input/output management in a distributed strict queue are disclosed. A plurality of messages are distributed to a plurality of queue servers based on strict order parameters for the messages. Messages that share a value for the strict order parameter are distributed to the same queue server. The messages are enqueued at the queue servers. Messages that share a value for the strict order parameter are enqueued in a strict order based on the time of receipt at the queue server. One or more queue clients are configured to attempt message processing for the enqueued messages. Network interactions between the queue clients and one or more external components are configured to be routed through a network proxy. | 12-31-2015 |
20150381708 | FAILURE MANAGEMENT IN A DISTRIBUTED STRICT QUEUE - Methods and systems for implementing failure management in a distributed strict queue are disclosed. A plurality of messages are distributed to a plurality of queue servers based on strict order parameters for the messages. Messages that share a value for the strict order parameter are distributed to the same queue server. The messages are enqueued at the queue servers. Messages that share a value for the strict order parameter are enqueued in a strict order based on the time of receipt at the queue server. One or more queue clients are configured to attempt message processing for the enqueued messages. Log data is received from the one or more queue clients at the queue servers. The log data is descriptive of the attempted message processing. | 12-31-2015 |
20150381549 | MESSAGE BATCHING IN A DISTRIBUTED STRICT QUEUE - Methods and systems for implementing message batching in a distributed strict queue are disclosed. A plurality of messages are distributed to a plurality of queue servers based on strict order parameters for the messages. Messages that share a value for the strict order parameter are distributed to the same queue server. The messages are enqueued at the queue servers. Messages that share a value for the strict order parameter are enqueued in a strict order based on the time of receipt at the queue server. A batch comprising individual messages is sent to a queue client. The messages that share a value for the strict order parameter are batched in the strict order. | 12-31-2015 |
20150381514 | MULTI-TIERED PROCESSING USING A DISTRIBUTED STRICT QUEUE - Methods and systems for implementing multi-tiered processing in a distributed strict queue are disclosed. Original messages are dequeued from a first set of queues using a first layer of queue clients, each of which transforms a subset of the original messages into a transformed message and enqueues the transformed message into a second set of queues. The transformed messages are dequeued from the second set of queues using a second layer of queue clients, each of which summarizes a subset of the transformed messages into a summarized message and enqueues the summarized message into a third set of queues. The summarized messages are dequeued from the third set of queues using a third layer of queue clients, each of which aggregates a subset of the transformed messages into an aggregated message. A final result is generated based on the aggregated messages. | 12-31-2015 |
20150381511 | CLIENT SELECTION IN A DISTRIBUTED STRICT QUEUE - Methods and systems for implementing client selection in a distributed strict queue are disclosed. A plurality of messages are distributed to a plurality of queue servers based on strict order parameters for the messages. Messages that share a value for the strict order parameter are distributed to the same queue server. The messages are enqueued at the queue servers. Messages that share a value for the strict order parameter are enqueued in a strict order based on the time of receipt at the queue server. One or more queue clients are selected to process the enqueued messages. The queue clients are selected based on their message processing capability along with the message processing throughput for values for the strict order parameter. | 12-31-2015 |
20150381413 | GEOGRAPHIC AWARENESS IN A DISTRIBUTED STRICT QUEUE - Methods and systems for implementing geographic awareness in a distributed strict queue are disclosed. A plurality of queue servers are selected to receive a plurality of messages from a plurality of queue producers. The queue servers are selected from a pool of available queue servers to optimize the performance of a distributed strict queue system. The plurality of messages are distributed to the queue servers based on strict order parameters for the messages. Messages that share a value for the strict order parameter are distributed to the same queue server. The messages are enqueued at the queue servers. Messages that share a value for the strict order parameter are enqueued in a strict order based on the time of receipt at the queue server. | 12-31-2015 |
20150380917 | POWER BUSWAY INTERPOSER - A power busway interposer enables a power busway assembly of energized busway segments to be extended, via coupling additional busway segments to the assembly, while maintaining energization of the assembly. As a result, a power busway assembly providing power support to electrical loads can be extended while maintaining power support to the electrical loads. The interposer includes separate sets of connectors that couple with separate busway segments and a switching device which selectively electrically couples the connectors, so that a power busway connector can be de-energized while another separate power busway connector is coupled to an energized busway segment and then subsequently energized. Extending the power busway assembly can include coupling separate sets of connectors to separate busway segments, where the separate sets of connectors are electrically isolated, and adjusting the switching device to electrically couple the separate sets of connectors, so that power is distributed between coupled busway segments. | 12-31-2015 |
20150379430 | EFFICIENT DUPLICATE DETECTION FOR MACHINE LEARNING DATA SETS - At a machine learning service, a determination is made that an analysis to detect whether at least a portion of contents of one or more observation records of a first data set are duplicated in a second set of observation records is to be performed. A duplication metric is obtained, indicative of a non-zero probability that one or more observation records of the second set are duplicates of respective observation records of the first set. In response to determining that the duplication metric meets a threshold criterion, one or more responsive actions are initiated, such as the transmission of a notification to a client of the service. | 12-31-2015 |
20150379429 | INTERACTIVE INTERFACES FOR MACHINE LEARNING MODEL EVALUATIONS - A first data set corresponding to an evaluation run of a model is generated at a machine learning service for display via an interactive interface. The data set includes a prediction quality metric. A target value of an interpretation threshold associated with the model is determined based on a detection of a particular client's interaction with the interface. An indication of a change to the prediction quality metric that results from the selection of the target value may be initiated. | 12-31-2015 |
20150379428 | CONCURRENT BINNING OF MACHINE LEARNING DATA - Variables of observation records to be used to generate a machine learning model are identified as candidates for quantile binning transformations. In accordance with a particular concurrent binning plan generated for a particular variable, a plurality of quantile binning transformations are applied to the particular variable, including a first transformation with a first bin count and a second transformation with a different bin count. The first and second transformations result in the inclusion of respective parameters or weights for binned features in a parameter vector of the model. In a post-training phase run of the model, at least one parameter corresponding to a binned feature is used to generate a prediction. | 12-31-2015 |
20150379427 | FEATURE PROCESSING TRADEOFF MANAGEMENT - At a machine learning service, a set of candidate variables that can be used to train a model is identified, including at least one processed variable produced by a feature processing transformation. A cost estimate indicative of an effect of implementing the feature processing transformation on a performance metric associated with a prediction goal of the model is determined. Based at least in part on the cost estimate, a feature processing proposal that excludes the feature processing transformation is implemented. | 12-31-2015 |
20150379426 | OPTIMIZED DECISION TREE BASED MODELS - During a training phase of a machine learning model, representations of at least some nodes of a decision tree are generated and stored on persistent storage in depth-first order. A respective predictive utility metric (PUM) value is determined for one or more nodes, indicating expected contributions of the nodes to a prediction of the model. A particular node is selected for removal from the tree based at least partly on its PUM value. A modified version of the tree, with the particular node removed, is stored for obtaining a prediction. | 12-31-2015 |
20150379425 | CONSISTENT FILTERING OF MACHINE LEARNING DATA - Consistency metadata, including a parameter for a pseudo-random number source, are determined for training-and-evaluation iterations of a machine learning model. Using the metadata, a first training set comprising records of at least a first chunk is identified from a plurality of chunks of a data set. The first training set is used to train a machine learning model during a first training-and-evaluation iteration. A first test set comprising records of at least a second chunk is identified using the metadata, and is used to evaluate the model during the first training-and-evaluation iteration. | 12-31-2015 |
20150379424 | MACHINE LEARNING SERVICE - A machine learning service implements programmatic interfaces for a variety of operations on several entity types, such as data sources, statistics, feature processing recipes, models, and aliases. A first request to perform an operation on an instance of a particular entity type is received, and a first job corresponding to the requested operation is inserted in a job queue. Prior to the completion of the first job, a second request to perform another operation is received, where the second operation depends on a result of the operation represented by the first job. A second job, indicating a dependency on the first job, is stored in the job queue. The second job is initiated when the first job completes. | 12-31-2015 |
20150379423 | FEATURE PROCESSING RECIPES FOR MACHINE LEARNING - A first representation of a feature processing recipe is received at a machine learning service. The recipe includes a section in which groups of variables on which common transformations are to be applied are defined, and a section in which a set of transformation operations are specified. The first representation of the recipe is validated based at least in part on a library of function definitions supported by the service, and an executable version of the recipe is generated. In response to a determination that the recipe is to be executed on a particular data set, a set of provider network resources is used to implement a transformation operation indicated in the recipe. | 12-31-2015 |
20150379117 | METHOD AND SYSTEM FOR DETERMINING SETS OF VARIANT ITEMS - Various embodiments of a method and system for determining sets of variant items are described. Various embodiments may include a system configured to generate multiple item pairs each corresponding to a particular item and another item determined to be similar to the particular item. For the particular item and the other item, each item pair may include a respective sequence of text strings (e.g., a title). For each item pair, the system may perform a corresponding text alignment and determine one or more misalignments of the item pair. The system may also assign a similarity score to each item pair; the similarity score may be dependent on the misalignment(s) determined for the particular item pair. Based on each aligned item pair and the similarity score assigned to that aligned item pair, the system may generate an indication specifying that each of a set of items are variants of each other. | 12-31-2015 |
20150379100 | COORDINATED SUSPENSION OF REPLICATION GROUPS - A target commit sequence number (CSN) to be used to synchronize state information pertaining to an application among nodes of a state replication group (SRG) prior to a suspension of the SRG's operations is identified. Each node stores a respective commit record set of the application. Some number of SRG nodes suspend operations after synchronizing their local commit records up to the CSN. A configuration manager of the SRG verifies that, subsequent to a suspension of operations at the nodes, at least a threshold number of the nodes are available for service and have updated their commit record sets. The configuration manager then re-activates the SRG. | 12-31-2015 |
20150379099 | DISTRIBUTED STATE MANAGEMENT USING DYNAMIC REPLICATION GRAPHS - A sequence of configuration-delta messages from a configuration manager of a replication graph established for replicating state information of an application is received at a particular node of the graph. Representations of the messages are stored in a local configuration change repository. Using the repository, the node identifies neighbor source nodes and destination nodes of the graph. Subsequent to receiving a particular configuration-delta message indicating that a neighbor source node has been removed from the graph, a different source node is identified by the particular node, and a request is sent to the different source node to transmit a set of state transition messages pertaining to the application. | 12-31-2015 |
20150379072 | INPUT PROCESSING FOR MACHINE LEARNING - A record extraction request for a data set is received at a machine learning service. A plan to perform one or more chunk-level operations (such as sampling, shuffling, splitting or partitioning for parallel computation) on chunks of the data set is generated. A set of data transfers that results in a particular chunk being stored in a particular server's memory is initiated to implement the first chunk-level operation of the sequence. A second operation such as another filtering operation or a feature processing operation is performed on a result set of the first chunk-level operation. | 12-31-2015 |
20150379062 | MULTI-DATABASE LOG WITH MULTI-ITEM TRANSACTION SUPPORT - At a logging service, a representation of a transaction requested by a client is received. The transaction includes at least a first write operation directed to a data object at a first data store. Based at least in part on the contents of the representation and contents of a persistent log of the logging service, a determination is made that the requested transaction is to be committed. A log record corresponding to the first write operation is inserted into the persistent log. The first write is propagated to the first data store after the record has been inserted in the persistent log. | 12-31-2015 |
20150379006 | AUTOMATIC IMAGE-BASED RECOMMENDATIONS USING A COLOR PALETTE - Systems and methods are described that recommend images, items, and/or metadata based at least in part on a reference color palette or reference color name. A color name can be converted into a representation of the color name in a color space. The reference color can be used to identify images that contain the reference color. The identified images and associated metadata can be analyzed, sorted and provided as an ordered list of items. Systems and methods are also described that identify items that contain colors affiliated with the reference color. Systems and methods are also described that validate color identifier information in metadata associated with an image. Systems and methods are also described that identify non-color specific keywords associated with the reference color. | 12-31-2015 |
20150378796 | CLIENT CONTROL IN A DISTRIBUTED STRICT QUEUE - Methods and systems for implementing client control in a distributed strict queue are disclosed. A plurality of messages are distributed to a plurality of queue servers based on strict order parameters for the messages. Messages that share a value for the strict order parameter are distributed to the same queue server. The messages are enqueued at the queue servers. Messages that share a value for the strict order parameter are enqueued in a strict order based on the time of receipt at the queue server. A control message is sent from the queue servers to one or more queue clients. The control message causes modification of a configuration at the queue clients. The queue clients are configured to process the messages based on the configurations. | 12-31-2015 |
20150378775 | LOG-BASED TRANSACTION CONSTRAINT MANAGEMENT - A transaction request is received at a log-based transaction manager, indicating a logical constraint to be satisfied before the corresponding transaction is committed. The transaction manager identifies a subset of transaction records stored in a persistent change log that are to be examined to evaluate the logical constraint. Based at least in part on the result of a comparison of one or more constraint-related data signatures included in the transaction request with corresponding data signatures in the subset of transaction records, a decision is made to commit the requested transaction. | 12-31-2015 |
20150378774 | LOG-BASED CONCURRENCY CONTROL USING SIGNATURES - A transaction request is received at a log-based transaction manager, indicating a conflict check delimiter and a read set descriptor indicative of one or more locations from which data is read during the requested transaction. Using the conflict check delimiter, a subset of transaction records stored in a particular persistent log to be examined for conflicts prior to committing the requested transaction is identified. In response to determining that none of the read locations of the requested transaction correspond to a write location indicated in the subset of transaction records, a new transaction record is stored in the particular persistent log indicating that the requested transaction has been committed. | 12-31-2015 |
20150378753 | ROLLING RESOURCE CREDITS FOR SCHEDULING OF VIRTUAL COMPUTER RESOURCES - A network-based virtual computing resource provider may offer virtual compute instances that implement rolling resource credits for scheduling virtual computing resources. Work requests for a virtual compute instance may be received at a virtualization manager. A resource credit balance may be determined for the virtual compute instance. The resource credit balance may accumulate resource credits in rolling fashion, carrying over unused credits from previous time periods. Resource credits may then be applied when generating scheduling instructions to provide to a physical resource to perform the work requests, such as a physical CPU in order to increase the utilization of the resource according to the number of credits applied. Applied resource credits may then be deducted from the credit balance. | 12-31-2015 |
20150378408 | REDUNDANT SECONDARY POWER SUPPORT SYSTEM - A concurrently maintainable secondary power distribution system enables redundant secondary power support to electrical loads, which receive independent primary power support from separate primary power systems, via a secondary power busway. Separate bus ducts, each carrying power from a secondary power system, are coupled to opposite ends of the busway. Each bus duct can carry power from a separate secondary power system, and switching devices bridging the connections between the bus ducts and the power busway can selectively switch the power busway from one of the bus ducts to the other bus duct, thereby switching between one of the secondary power systems. The separate secondary power systems can be coupled together at various points in the respective power systems, so that one or more portions of one of the secondary power systems can distribute power received from an upstream portion of another one of the secondary power systems. | 12-31-2015 |
20150375103 | GAME SESSION SHARING - A game system in which game sessions involving player(s) may be recorded and saved as game records. A player or other entity may offer or market the game records to other players via one or more channels such as websites. The game records may be offered in exchange for virtual or real currency, or for free. Player profiles for the player(s) that recorded the original game session may be provided with the game records. A player that obtains a game record may replay the recorded game session to watch the game play, or alternatively may choose to participate in the replay by assuming control of a character in the game to play with the original player's character as simulated according to the player's profile. If a player steps into a game session being replayed, a new universe/timeline may be spawned and saved as a new game record. | 12-31-2015 |
20150375102 | SPAWNING NEW TIMELINES DURING GAME SESSION REPLAY - A game system in which game sessions involving one or more players may be recorded and saved as game records. A previously recorded game session may be selected and replayed. However, in addition to providing a static replay of the game session, the game system may allow one or more players to step into and assume control of respective game characters at any point during the replay of the game session. When a player steps into and takes control of game a character during the playback, a new timeline is spawned from the original timeline with potentially different outcomes, and a new game record corresponding to the new timeline is generated and stored. | 12-31-2015 |
20150375101 | CHARACTER SIMULATION AND PLAYBACK NOTIFICATION IN GAME SESSION REPLAY - A game system in which game sessions may be recorded and saved as game records. A previously recorded game session may be selected and replayed, and players may step into and assume control of respective game characters during the replay. When a player steps into and takes control of game a character during replay of a game session, a new timeline is spawned from the original timeline, and a new game record corresponding to the new timeline is generated and stored. Players that were involved in a previously recorded game session that is being replayed may be manually or automatically notified that the game session is being replayed. The notification may occur upon initiation of the replay and/or when a new timeline is spawned. Notified players may view the game session without participating, or may take control their respective characters to participate. | 12-31-2015 |
20150372535 | POWER SYSTEM RECONFIGURATION WITH AUTOMATIC TRANSFER SWITCH - Reconfiguring a power system for an electrical load includes establishing a secondary feed to an electrical load that is receiving power from a primary power source. A set of secondary feed lines is coupled between a donor power source and a power input to the electrical load such that the set of secondary feed lines is configured to supply power from the donor power source to the electrical load. An automatic transfer switch is coupled in parallel with the set of secondary feed lines. The electrical load is transferred by the automatic transfer switch from the donor power source to the primary power source for the reconfiguration. | 12-24-2015 |
20150370795 | METHOD AND APPARATUS FOR STRESS MANAGEMENT IN A SEARCHABLE DATA SERVICE - Method and apparatus for stress management in a searchable data service. The searchable data service may provide a searchable index to a backend data store, and an interface to build and query the searchable index, that enables client applications to search for and retrieve locators for stored entities in the backend data store. Embodiments of the searchable data service may implement a distributed stress management mechanism that may provide functionality including, but not limited to, the automated monitoring of critical resources, analysis of resource usage, and decisions on and performance of actions to keep resource usage within comfort zones. In one embodiment, in response to usage of a particular resource being detected as out of the comfort zone on a node, an action may be performed to transfer at least part of the resource usage for the local resource to another node that provides a similar resource. | 12-24-2015 |
20150369500 | INVERTED EXHAUST PLENUM MODULE - An inverted exhaust plenum module exhausts air from an enclosure into an ambient environment while mitigating airflow restrictions caused by ambient wind conditions, particularly headwinds impinging on exhaust vents. The plenum module includes wall elements that extend downwards from separate edges of two separate roof elements of the enclosure, forming a plenum between the wall elements that is open at the top. Exhaust vents in the wall elements exhaust air from the enclosure into the plenum to circulate into the ambient environment via the top of the plenum. By exhausting air into a plenum that extends beneath roof elements, the vents are at least partially obscured from ambient winds that might otherwise impinge on the vents. A wing element can be installed to induce exhaust airflow via lowering air pressure at the top of the plenum. The plenum module can be a separate module that is coupled to a structure. | 12-24-2015 |
20150365345 | REDUCED BANDWIDTH DATA UPLOADING IN DATA SYSTEMS - Methods and apparatus for uploading data from a sender to a receiver. A data deduplication technique is described that may reduce the bandwidth used in uploading data from the sender to the receiver. In the technique, the receiver, rather than the sender, maintains a fingerprint dictionary for previously uploaded data. When a sender has additional data to be uploaded, the sender extracts fingerprints for units of the data and sends the fingerprints to the receiver. The receiver checks its fingerprint dictionary to determine the data units to be uploaded and notifies the sender of the identified units, which then sends the identified units of data to the receiver. The technique may, for example, be applied in virtualized data store systems to reduce bandwidth usage in uploading data. | 12-17-2015 |
20150363124 | SYSTEM AND METHOD FOR DATA REPLICATION USING A SINGLE MASTER FAILOVER PROTOCOL - A system that implements a data storage service may store data on behalf of storage service clients. The system may maintain data in multiple replicas of various partitions that are stored on respective computing nodes in the system. The system may employ a single master failover protocol, usable when a replica attempts to become the master replica for a replica group of which it is a member. Attempting to become the master replica may include acquiring a lock associated with the replica group, and gathering state information from the other replicas in the group. The state information may indicate whether another replica supports the attempt (in which case it is included in a failover quorum) or stores more recent data or metadata than the replica attempting to become the master (in which case synchronization may be required). If the failover quorum includes enough replicas, the replica may become the master. | 12-17-2015 |
20150358379 | SYSTEM AND METHOD FOR ASSIGNMENT AND SWITCHING OF CONTENT SOURCES FOR A STREAMING CONTENT SESSION - Various embodiments of a system and method for assignment and switching of content sources for a streaming content session are described. Embodiments may include the generation and use of content source rankings for improving playback quality of content streams. In embodiments, a merchant system may collect and aggregate multiple quality metrics for different content streams that various content sources provide to various clients. The merchant system may utilize the quality metrics to generate rankings of content sources for clients. The merchant system may provide such rankings to clients to improve the content stream playback experience on the client. For instance, at content acquisition time, a client may request a content stream from a content resource ranked highest on a content source ranking provided by the merchant. If the content stream degrades, the client may source subsequent portions of the content stream from another highly ranked content source of the ranking. | 12-10-2015 |
20150355921 | AVOIDING OR DEFERRING DATA COPIES - Methods and systems for avoiding or deferring data copies are disclosed. Using a virtual machine, it is determined whether a set of program code comprises references to a data object after an operation to generate a copy of the data object. If not, a set of optimized program code is generated in which the operation to copy the data object is replaced with an operation to update a reference. Using the virtual machine, it is determined whether the set of program code comprises an operation to generate a copy of a buffer object. If so, a set of further optimized program code is generated, comprising an allocation of one or more memory pages to store the buffer object with a copy-on-write parameter instead of the operation to generate the copy of the buffer object. | 12-10-2015 |
20150350314 | INTERFACES TO MANAGE LAST-MILE CONNECTIVITY FOR DIRECT NETWORK PEERINGS - Methods and apparatus for interfaces to manage last-mile connectivity and dynamic reconfiguration for direct network peerings. A system may include a data center, endpoint routers and a connectivity coordinator. The coordinator implements an interface defining connectivity operations. The coordinator receives a request for dedicated connectivity to data center resources, formatted according to the interface. The coordinator determines a connectivity provider to provide last-mile connectivity to the requester, and transmits a notification identifying the selected connectivity provider. | 12-03-2015 |
20150347183 | IDENTIFYING CANDIDATE WORKLOADS FOR MIGRATION - Techniques for identifying a candidate workload which may be a suitable candidate for migration from a first location to a second location are described herein. A set of suitability measurements associated with a computer system resource operating in the first location is received, the set of suitability measurements including, for example, resource usage values for one or more resources associated with the workload. Based at least in part on one or more statistical calculations on the set of suitability measurements exceeding one or more thresholds, recommendations are made about whether to migrate the workload from the first location to the second location. | 12-03-2015 |
20150342096 | MODULAR SYSTEM FOR DATA CENTER - A modular computing system for a data center includes one or more data center modules including rack-mounted computer systems. An electrical module is coupled to the data center modules and provides electrical power to computer systems in the data center modules. One or more air handling modules are coupled to the data center modules. The data center module may include two pre-fabricated portions, each portion including a row of racks of computer systems. The two computing module portions of the data center module may combine to form a computing space when coupled to one another. | 11-26-2015 |
20150342094 | MODULAR DATA CENTER ROW INFRASTRUCTURE - A data center row infrastructure module enables rapid deployment of a computing room enclosure for computer systems that provides intake air circulation to, and exhaust air removal from, the computer systems in the enclosure. The data center row infrastructure module includes free-standing exhaust plenum structures encompassing opposite sides of the enclosure and a plenum module spanning a top end of the enclosure between the free-standing exhaust plenum structures. Each free-standing exhaust plenum structure includes an internal exhaust air plenum that directs exhaust air received from the enclosure through an exhaust air outlet on a top end of the free-standing exhaust plenum structure. The plenum module establishes a bottom end of a cooling air plenum above and separate from the enclosure and between the free-standing exhaust plenum structures. Some plenum modules can direct cooling air directly to the enclosure as intake air. Some plenum modules can mix cooling air with recirculated exhaust to provide the intake air. | 11-26-2015 |
20150340033 | CONTEXT INTERPRETATION IN NATURAL LANGUAGE PROCESSING USING PREVIOUS DIALOG ACTS - Features are disclosed for processing and interpreting natural language, such as interpretations of user utterances, in multi-turn dialog interactions. Context information regarding interpretations of user utterances and system responses to the user utterances can be maintained. Subsequent user utterances can be interpreted using the context information, rather than being interpreted without context. In some cases, interpretations of subsequent user utterances can be merged with interpretations of prior user utterances using a rule-based framework. Rules may be defined to determine which interpretations may be merged and under what circumstances they may be merged. | 11-26-2015 |
20150339136 | LOW LATENCY CONNECTIONS TO WORKSPACES IN A CLOUD COMPUTING ENVIRONMENT - A computing system providing virtual computing services may generate and manage remote computing sessions between client devices and virtual desktop instances (workspaces) hosted on the service provider's network. The system may implement a virtual private cloud for a workspaces service that extends out to gateway components in multiple, geographically distributed point of presence (POP) locations. In response to a client request for a virtual desktop session, the service may configure a virtual computing resource instance for the session and establish a secure, reliable, low latency communication channel (over a virtual private network) between the resource instance and a gateway component at a POP location near the client for communication of a two-way interactive video stream for the session. The availability zone containing the POP location may be different than one hosting the resource instance for the session. Client devices may connect to the gateway component over a public network. | 11-26-2015 |
20150338281 | VIRTUAL DATA CENTER ENVIRONMENTAL MONITORING SYSTEM - A virtual temperature monitoring system in a data center communicates with servers mounted in racks to receive internal temperature data generated by internal temperature sensors of the servers. The system derives a virtual sensor measurement of external temperatures external to the server, including a portion of a cold aisle that extends proximate to a rack in which the server is mounted, based upon a relationship between the received internal temperature sensors and the external environment. Sensor data from other sensors can be received via a building management system, and building management signals to the building management system can be generated based at least partially on the virtual sensor data. The virtual sensor data can be used to generate a graphical representation of the servers that highlights relative thermal characteristics of the servers based on the virtual external sensor measurements, including heat indices, excursions beyond thresholds, historical excursion histories, etc. | 11-26-2015 |
20150331467 | FLEXIBLE POWER SUPPORT REDUNDANCY BUSWAY SYSTEM - A busway system enables multiple interchangeable power support redundancies to be provided to electrical loads. The busway system includes multiple busways extending through an aisle space, where some busways carry power from separate primary power sources, and one or more busways carry power from a secondary power source. Busways are coupled to loads to provide power support directly to the loads, indirectly via devices that distribute power to the loads via branch circuits, etc. The power support redundancy provided to a load is established based at least in part upon which busways are coupled to the load, and power support redundancies can be changed by changing the couplings of particular busways with the loads. The busways can extend through the aisle space in a staggered configuration to enable load balancing between busways by restricting loads in certain regions of the aisle space to coupling with certain busways and not others. | 11-19-2015 |
20150331459 | PARTIAL-WIDTH RACK-MOUNTED COMPUTING DEVICES - A computing system includes a rack having standard slots for computing devices and computing devices coupled to the rack. One or more of the computing devices includes a chassis, a circuit board assembly in a primarily horizontal orientation, and one or more processors coupled to the circuit board assembly. One or more stacks of hard disk drives are coupled to the chassis. The chassis has a width that is equal to or less than half of the width of one of the standard slots of the rack. | 11-19-2015 |
20150324215 | MIGRATION OF APPLICATIONS BETWEEN AN ENTERPRISE-BASED NETWORK AND A MULTI-TENANT NETWORK - A method of migrating applications from an enterprise-based network to a multi-tenant network of a compute service provider may include receiving a request to migrate an application running on a first virtual machine instance within the enterprise-based network. Dependencies of the application may be determined by identifying at least a second virtual machine instance within the enterprise-based network, where the at least second virtual machine instance associated with the application. Resource monitoring metrics associated with hardware resources used by the first virtual machine instance and the at least second virtual machine instance may be received. The first and at least second virtual machine instances may be migrated from the enterprise-based network to at least one virtual machine at a server within the multi-tenant network based on the monitoring metrics, thereby migrating the application from the enterprise-based network to the multi-tenant network. | 11-12-2015 |
20150319878 | FLEXIBLE DATA CENTER INFRASTRUCTURE DISTRIBUTION - A data center includes various sets of infrastructure modules which each provide a particular type of infrastructure support to support computing operations in the data center. Separate sets of infrastructure modules can be installed incrementally based on incrementally changing support capacity for the corresponding type of infrastructure support in the data center. Such incrementally changing support capacity can be based upon support requirements of electrical loads, including rack computer systems, which are inbound to the data center. Where support capacity for a particular type of infrastructure support drops below a threshold, a quantity of additional infrastructure modules which provide the particular type of infrastructure support can be selected and installed to increase the support capacity. Separate sets of infrastructure modules can be selected and installed independently of each other, to independently adjust support capacity for separate types of infrastructure support, which can minimize excess support capacity at any given time. | 11-05-2015 |
20150319189 | PROTECTING WEBSITES FROM CROSS-SITE SCRIPTING - Methods and systems for protecting websites from cross-site scripting are disclosed. A request for a web page comprising a web page element is received from a client. It is determined if the web page comprises a data integrity token for the web page element. It is also determined if a value of the data integrity token matches an expected value. If the web page comprises the data integrity token and if the value matches the expected value, the web page comprising the web page element is sent to the client. If the web page does not comprise the data integrity token or if the value does not match the expected value, a protective operation is performed. | 11-05-2015 |
20150312356 | ACCOUNT STATE SIMULATION SERVICE FOR CLOUD COMPUTING ENVIRONMENTS - Methods and apparatus for an account state simulation service for cloud computing environments are disclosed. A system includes a plurality of service managers coordinating respective distributed network-accessible services, and a metadata manager. The metadata manager receives an account state change simulation request, indicating (a) an initial account state of a client account and (b) a collection of operations to be simulated. The metadata manager generates a response to the account change state simulation request, comprising at least one of (a) a representation of an expected end state of the client account reachable as a result of performing the collection of operations (b) an indication of an expected failure of a particular operation of the collection of operations or (c) an estimate of an expected billing amount associated with an implementation of the collection of operations. | 10-29-2015 |
20150310002 | Selective Display of Comprehension Guides - Techniques are provided for selectively and dynamically determining one or more words of an electronic book to present with comprehension guides. For instance, an electronic device rendering an electronic book may determine whether to display some, all, or no words of the book with comprehension guides for words within the electronic book based on word difficulty, contextual importance or aspects of the user. Techniques are also provided for determining the content of comprehension guides to be presented with the words. | 10-29-2015 |
20150304407 | SYSTEM AND METHOD FOR DISTRIBUTED LOAD BALANCING WITH LOAD BALANCER CLIENTS FOR HOSTS - Embodiments may include a load balancer configured to, for a given packet received from a remote client, select a host computer of a plurality of host computers according to a load balancing protocol, the selection based on load information updates received from the plurality of host computers. Each load information update may indicate a measure of the respective host computer's capacity to service additional connections with remote clients. The load balancer may provide the given packet to the selected host computer for processing by an application component on the selected host computer, and subsequent to determining that a specific application component on one of the plurality of host computers does not have capacity for additional connections based on the load information updates, continue to send packets for existing connections serviced by the specific application component to the respective host computer without sending packets for new connections to that host computer. | 10-22-2015 |
20150301901 | SYSTEM AND METHOD FOR ADJUSTING MEMBERSHIP OF A DATA REPLICATION GROUP - A system that implements a data storage service may store data on behalf of storage service clients. The system may maintain data in multiple replicas of partitions that are stored on respective computing nodes in the system. A master replica for a replica group may increment a membership version indicator for the group, and may propagate metadata (including the membership version indicator) indicating a membership change for the group to other members of the group. Propagating the metadata may include sending a log record containing the metadata to the other replicas to be appended to their respective logs. Once the membership change becomes durable, it may be committed. A replica attempting to become the master of a replica group may determine that another replica in the group has observed a more recent membership version, in which case logs may be synchronized or snipped, or the attempt may be abandoned. | 10-22-2015 |
20150288618 | CUSTOM RESOURCES IN A RESOURCE STACK - A resource stack managed by a resource stack provider is created based on a resource stack template that integrates a custom resource from a second provider into the resource stack using a notification system with the second provider. For example, a customer may create a template that defines a resource stack that comprises resources available from the resource stack provider and one or more custom resources provided by a second provider. When a resource stack is created, resources available from the resource stack provider may be provisioned. Custom resources may be initialized by notifying the provider of the custom resource of the requested integration of the custom resource with the resource stack and requested configuration details. The custom resource provider may respond with an indication of successful integration when the custom resource has been successfully initialized. After initializing the resources, the resource stack may be enabled for use. | 10-08-2015 |
20150281111 | IMPLEMENTATION OF A SERVICE THAT COORDINATES THE PLACEMENT AND EXECUTION OF CONTAINERS - Organizations are constantly looking for faster and less expensive computer systems to manage businesses; however, the current standard in virtualization techniques includes using virtual machines, which require a long period of time to be instantiated before handling requests and are resource intensive. Using Domain Name System (DNS) queries to a DNS server as an indicator to initiate a virtual resource, such as containers, enables the system to instantiate the container prior to an end user transmitting their first request for a resource stored in that container. Containers can be initialized upon indication of a request, terminated at the end of the request process and initialized again for a next request as they can be activated at very fast speeds as needed. Additionally, using DNS queries as indicators to warm a cache of a network component enables the system components to be imminently used, to be pre-loaded with requested resources. | 10-01-2015 |
20150280959 | SESSION MANAGEMENT IN DISTRIBUTED STORAGE SYSTEMS - A request for a session identifier for a particular client is transmitted from an access subsystem of a storage service to a metadata subsystem of the service. A session identifier based on a persistent session storage location at which metadata of the client session are stored is received at the access subsystem. The session identifier is cached at the access subsystem prior to its transmission to the client. A lock state indicator generated by the metadata subsystem in response to a particular request from the client during the client session may also be cached at the access subsystem. Subsequent storage requests from the client during the session may be handled by the access subsystem using the cached session identifier and lock state indicator. | 10-01-2015 |
20150278534 | ELECTRONIC COMMUNICATION WITH SECURE SCREEN SHARING OF SENSITIVE INFORMATION - A customer support application provides screen sharing of the user's computing device with a remote customer support agent, thereby enabling the customer support agent to view the content displayed on the user's device. Sensitive information that is displayed on a user's computing device is obfuscated from the computing device of the remote customer support agent, and a notification of that obfuscation is displayed on the user's computing device. Information can be determined to be sensitive based on a sensitive indicator tag or a heuristic. | 10-01-2015 |
20150278397 | NAMESPACE MANAGEMENT IN DISTRIBUTED STORAGE SYSTEMS - A directed acyclic graph (DAG) is generated to represent a namespace of a directory. In response to a request to create a new object with a specified name, a hash value bit sequence is computed for the name. A plurality of levels of the DAG are navigated using successive subsequences of the bit sequence to identify a candidate node for storing a new entry corresponding to the specified name. If the candidate node meets a split criterion, the new entry and at least a selected subset of entries of the candidate node's list of entries are distributed among a plurality of DAG nodes, including at least one new DAG node, using respective bit sequences obtained by applying the hash function for each distributed entry. | 10-01-2015 |
20150278243 | SCALABLE FILE STORAGE SERVICE - A client request, formatted in accordance with a file system interface, is received at an access subsystem of a distributed multi-tenant storage service. After the request is authenticated at the access subsystem, an atomic metadata operation comprising a group of file system metadata modifications is initiated, including a first metadata modification at a first node of a metadata subsystem of the storage service and a second metadata modification at a second node of the metadata subsystem. A plurality of replicas of at least one data modification corresponding to the request are saved at respective storage nodes of the service. | 10-01-2015 |
20150277969 | ATOMIC WRITES FOR MULTIPLE-EXTENT OPERATIONS - A node of a storage service is selected as a coordinator of a distributed transaction involving multiple page-level modifications. The coordinator identifies other nodes as members of a node chain collectively storing physical data pages at which proposed modifications are to be performed, including a decider node responsible for a decision to commit the transaction. The coordinator generates a transaction preparation message comprising a representation of an order of respective commit decisions associated with the proposed modifications, and transmits the message to a selected node of the chain for a sequential propagation along the chain. Each chain node performs a local commit analysis for its changes and stores a record of its intent to commit. If a decision to commit is reached at the decider, the proposed modifications are completed. | 10-01-2015 |
20150277802 | FILE STORAGE USING VARIABLE STRIPE SIZES - A write request directed to a storage object is received at a distributed file storage service. Based on a variable stripe size selection policy, a size of a particular stripe of storage space to be allocated for the storage object is determined, which differs from the size of another stripe allocated earlier for the same storage object. Allocation of storage for the particular stripe at a particular storage device is requested, and if the allocation succeeds, the contents of the storage device are modified in accordance with the write request. | 10-01-2015 |
20150277440 | SENSE AND AVOID FOR AUTOMATED MOBILE VEHICLES - This disclosure describes an automated mobile vehicle that includes one or more distance determining elements configured to detect the presence of objects and to cause the automated mobile vehicle to alter its path to avoid the object. For example, a distance determining element may be incorporated into one or more of the motors of the automated mobile vehicle and configured to determine a distance to an object. Based on the determined distance, a path of the automated mobile vehicle may be altered. | 10-01-2015 |
20150277101 | ELECTRODE OF AN ELECTROWETTING DEVICE - An electrowetting display device including an electrowetting element with a first support plate, a second support plate, a first fluid and a second fluid immiscible with the first fluid. A voltage may be applied between a first electrode and a second electrode. At least one of the first electrode and the second electrode comprises a semiconducting material. | 10-01-2015 |
20150277100 | Electrowetting Display Pixel Architecture - The subject matter disclosed herein relates to reduction of effective voltage drops within pixels in active matrix displays such as electrowetting display devices. The electrowetting display device comprises a plurality of pixel areas, wherein each pixel area comprises a hydrophobic surface, a first fluid and a second fluid on the hydrophobic surface, wherein the first fluid is immiscible with the second fluid, and a pixel electrode under the hydrophobic surface, wherein the pixel electrode has a substantially U-shape. A thin film transistor is coupled to the pixel electrode and a voltage source. Voltage via the thin film transistor and the voltage source applied to the hydrophobic surface via the pixel electrode causes the hydrophobic surface to become more hydrophobilic to thereby move the second fluid onto the hydrophobic surface to thereby substantially displace the first fluid on the hydrophobic surface. | 10-01-2015 |
20150271944 | SHELF-MOUNTED MODULAR COMPUTING UNIT - A system for performing computing operations includes a rack, one or more shelves coupled to the rack, and two or more computing modules. Each computing module may include a chassis, one or more circuit board assemblies in a primarily vertical orientation, and one or more hard disk drives in a primarily vertical orientation. The circuit board assemblies and the hard disk drives are coupled to the chassis of the computing module. | 09-24-2015 |
20150271092 | FLEXIBLE-LOCATION RESERVATIONS AND PRICING FOR NETWORK-ACCESSIBLE RESOURCE CAPACITY - Methods and apparatus for flexible-location reservations and pricing for network-accessible resources are disclosed. A system includes a plurality of resources of a provider network distributed across multiple locations, and a resource manager. The resource manager implements a programmatic interface to allow a client to specify a flexible location option for a resource reservation request, indicating that the resource manager is to select one or more locations at which to reserve resource capacity. When a reservation request with the flexible location option specified is received, the resource manager selects a particular location based at least in part on heuristics using resource utilization data. In response to a resource activation request for the reservation, the resource manager activates a resource at a launch location selected from the multiple locations. | 09-24-2015 |
20150269521 | ROUTE SCHEDULING OF MULTI-CLASS TRANSPORT VEHICLES - Techniques for managing different types of transport vehicles are provided. In some embodiments, a transient warehouse can be established that allows a wide variety of transport vehicles to access items from a more convenient location than a brick-and-mortar location. The transient warehouse can be established in a parking lot or on the side of the road, so that other transport vehicles can access the transient warehouse quickly and deliver items to item requesters more efficiently from a centralized location. The transport vehicles can also pick up items from item providers to replenish items for the transient warehouse, the transient warehouse can access items from a brick-and-mortar location, and/or the transport vehicles can travel to multiple item requesters through optimized transport routes. The meeting location of the transient warehouse may also be optimized based on various constraints (e.g., time of day, seasonality concerns, etc.). | 09-24-2015 |
20150269520 | ESTABLISHMENT OF A TRANSIENT WAREHOUSE - Techniques for managing different types of transportation vehicles are provided. In some embodiments, a transient warehouse can be established that allows a wide variety of transport vehicles to access items from a more convenient location than a brick-and-mortar location. The transient warehouse can be established in a parking lot or on the side of the road, so that other transport vehicles can access the transient warehouse quickly and deliver items to item requesters more efficiently from a centralized location. The transport vehicles can also pick up items from item providers to replenish items for the transient warehouse, the transient warehouse can access items from a brick-and-mortar location, and/or the transport vehicles can travel to multiple item requesters through optimized transport routes. The meeting location of the transient warehouse may also be optimized based on various constraints (e.g., time of day, seasonality concerns, etc.). | 09-24-2015 |
20150269496 | AUTOMATED TUNING OF A SERVICE CONFIGURATION - Methods and systems for automated tuning of a service configuration are disclosed. An optimal configuration for a test computer is selected by performing one or more load tests using the test computer for each of a plurality of test configurations. The performance of a plurality of additional test computers configured with the optimal configuration is automatically determined by performing additional load tests using the additional test computers. A plurality of production computers are automatically configured with the optimal configuration if the performance of the additional test computers is improved with the optimal configuration. | 09-24-2015 |
20150269239 | STORAGE DEVICE SELECTION FOR DATABASE PARTITION REPLICAS - A system that implements a data storage service may store data in multiple replicated partitions on respective storage nodes. The selection of the storage nodes (or storage devices thereof) on which to store the partition replicas may be performed by administrative components that are responsible for partition management and resource allocation for respective groups of storage nodes (e.g., based on a global view of resource capacity or usage), or the selection of particular storage devices of a storage node may be determined by the storage node itself (e.g., based on a local view of resource capacity or usage). Placement policies applied at the administrative layer or storage layer may be based on the percentage or amount of provisioned, reserved, or available storage or IOPS capacity on each storage device, and particular placements (or subsequent operations to move partition replicas) may result in an overall resource utilization that is well balanced. | 09-24-2015 |
20150269199 | SYSTEM AND METHOD FOR FETCHING THE LATEST VERSIONS OF STORED DATA OBJECTS - A distributed storage system may store data object instances in persistent storage and may cache keymap information for those data object instances. The system may cache a latest symbolic key entry for some user keys of the data object instances. When a request is made for the latest version of stored data object instances having a specified user key, the latest version may be determined dependent on whether a latest symbolic key entry exists for the specified user key, and keymap information for the latest version may be returned. When storing keymap information, a flag may be set to indicate that a corresponding latest symbolic key entry should be updated. The system may delete a latest symbolic key entry for a particular user key from the cache in response to determining that no other requests involving the keymap information for data object instances having the particular user key are pending. | 09-24-2015 |
20150268890 | SYSTEM AND METHOD FOR PERFORMING LIVE PARTITIONING IN A DATA STORE - A system that implements a scalable data storage service may maintain tables in a data store on behalf of storage service clients. The service may maintain table data in multiple replicas of partitions that are stored on respective computing nodes in the system. In response to detecting an anomaly in the system, detecting a change in data volume on a partition or service request traffic directed to a partition, or receiving a service request from a client to split a partition, the data storage service may create additional copies of a partition replica using a physical copy mechanism. The data storage service may issue a split command defined in an API for the data store to divide the original and additional replicas into multiple replica groups, and to configure each replica group to maintain a respective portion of the table data that was stored in the partition before the split. | 09-24-2015 |
20150268824 | ADAPTIVE INFORMATION REGIONS DISPLAYING CONTENT ASSOCIATED WITH AN ELECTRONIC COMMERCE SYSTEM - Disclosed are various embodiments for displaying content. A display area includes multiple information regions presenting content. Visual characteristics associated with the information regions adjust according to values corresponding to the to the information regions. For example, the sizes or positions of the information regions may adjust according to the values. | 09-24-2015 |
20150268822 | OBJECT TRACKING IN ZOOMED VIDEO - A user can select an object represented in video content in order to set a magnification level with respect to that object. A portion of the video frames containing a representation of the object is selected to maintain a presentation size of the representation corresponding to the magnification level. The selection provides for a “smart zoom” feature enabling an object of interest, such as a face of an actor, to be used in selecting an appropriate portion of each frame to magnify, such that the magnification results in a portion of the frame being selected that includes the one or more objects of interest to the user. Pre-generated tracking data can be provided for some objects, which can enable a user to select an object and then have predetermined portion selections and magnifications applied that can provide for a smoother user experience than for dynamically-determined data. | 09-24-2015 |
20150264441 | GENERATING NEW VIDEO CONTENT FROM PRE-RECORDED VIDEO - A real-time video exploration (RVE) system that allows users to pause a pre-recorded video (e.g., a movie) and change viewing positions and angles of one or more scenes. The RVE system may also allow users to select, manipulate, and modify objects within one or more scenes. The RVE system may render new video of the scenes and stream the new video to the user's client device. Using the RVE system, a user may create modified versions of one or more scenes to replace original scenes in a video to thus create a modified version of the video. The RVE system may allow the user to record the modified version of the video, and may allow the user to share the modified version of the video with other viewers. | 09-17-2015 |
20150264425 | OBJECT DISCOVERY AND EXPLORATION IN VIDEO CONTENT - A real-time video exploration (RVE) system that allows users to pause, step into, move through, and explore 2D or 3D modeled worlds of scenes in a video. The RVE system may allow users to discover, select, explore, and manipulate objects within the modeled worlds used to generate video content. The RVE system may implement methods that allow users to view and explore in more detail the features, components, and/or accessories of selected objects that are being manipulated and explored. The RVE system may also implement methods that allow users to interact with interfaces of selected objects or interfaces of components of selected objects. | 09-17-2015 |
20150264416 | REAL-TIME RENDERING OF TARGETED VIDEO CONTENT - A real-time video targeting (RVT) system may leverage network-based computation resources and services, available 2D or 3D model data, and available viewer information to dynamically personalize content of, or add personalized content to, video for particular viewers or viewer groups. When playing back pre-recorded video to viewers, at least some objects or other content in at least some of the scenes of the video may be replaced with objects or content targeted at particular viewers or groups according to profiles or preferences of the viewers or groups. Since the video is being rendered and streamed to different viewers or groups in real-time by the network-based computation resources and services, any given scene of a video may be modified and viewed in many different ways by different viewers or groups based on the particular viewers' or groups' profiles. | 09-17-2015 |
20150263987 | CLIENT-ALLOCATABLE BANDWIDTH POOLS - Methods and apparatus for client-allocatable bandwidth pools are disclosed. A system includes a plurality of resources of a provider network and a resource manager. In response to a determination to accept a bandwidth pool creation request from a client for a resource group, where the resource group comprises a plurality of resources allocated to the client, the resource manager stores an indication of a total network traffic rate limit of the resource group. In response to a bandwidth allocation request from the client to allocate a specified portion of the total network traffic rate limit to a particular resource of the resource group, the resource manager initiates one or more configuration changes to allow network transmissions within one or more network links of the provider network accessible from the particular resource at a rate up to the specified portion. | 09-17-2015 |
20150263978 | COORDINATED ADMISSION CONTROL FOR NETWORK-ACCESSIBLE BLOCK STORAGE - The estimated rate of work requests expected during a time period at a first block storage device, implemented at a particular server of a storage service, exceeds a provisioned rate of the first device. At a client-side component of the storage service, a different storage server is identified, at which the rate of work requests directed during the time period to a second block storage device is anticipated to be less than the provisioned rate of the second device. At least one admission control parameter of the first device is modified to enable the first storage server to accept work requests at a rate that exceeds the provisioned rate of the first device. | 09-17-2015 |
20150263977 | PROFILE-BASED CACHE MANAGEMENT - A system and method for profile-based cache management is disclosed. A cache management service can obtain a plurality of requests for network resource and corresponding responses, group the requests based, at least in part, on various criterion or technique, determine and cache content parts of the responses corresponding to each group of requests. Cache profiles corresponding to each group of requests and identifying corresponding cached content parts can be built, maintained or updated by the cache management service. A subsequent request for network resource can be matched to one or more cache profiles for retrieval of applicable cached content and for generation of a partial response to the request therefrom. Non-cached content or updates to cached content can be further retrieved for generation of updating data to the partial response, and thus completing a full response to the request for network resource. | 09-17-2015 |
20150263840 | DEVICE-TO-DEVICE COMMUNICATION MODE - Systems and methods for a device-to-device communications mode are described. When two user equipment are within proximity of each other and other requirements are met, the user equipment are configured by their associated nodes to enter a device-to-device communication mode. In that mode, the user equipment receives messages from the other user equipment without the messages traversing the core network between their associated nodes. | 09-17-2015 |
20150262423 | REAL-TIME EXPLORATION OF VIDEO CONTENT - A real-time video exploration (RVE) system that allows users to pause, step into, and explore 2D or 3D modeled worlds of scenes in a video. The system may leverage network-based computation resources to render and stream new video content from the models to clients with low latency. A user may pause a video, step into a scene, and interactively change viewing positions and angles in the model to move through or explore the scene. The user may resume playback of the recorded video when done exploring the scene. Thus, rather than just viewing a pre-rendered scene in a movie from a pre-determined perspective, a user may step into and explore the scene from different angles, and may wander around the scene at will within the scope of the model to discover parts of the scene that are not visible in the original video. | 09-17-2015 |
20150262402 | OBJECT CUSTOMIZATION AND ACCESSORIZATION IN VIDEO CONTENT - A real-time video exploration (RVE) system that allows users to pause, step into, move through, and explore 2D or 3D modeled worlds of scenes in a video. The RVE system may allow users to select and manipulate objects within a scene, and to modify an object by adding or removing accessories from the object or otherwise customizing the object according to the user's preferences or desires. The RVE system may also provide an interface or interfaces via which the user can obtain additional information for the object, customize the object, be given a price or price(s) for the object as customized, and purchase the object as specified if desired. | 09-17-2015 |
20150261749 | SYSTEM AND METHOD FOR DELETION OF EXTRANEOUS DELETE MARKER OBJECTS - Systems and methods for providing object versioning in a storage system may support the logical deletion of stored objects through the use of delete marker objects. In response to a delete operation specifying a key, but not a version identifier, the storage system may create a delete marker object that is stored as the latest object version of the key. In response to performing a subsequent mutating operation, or at pre-determined time intervals, the storage system may perform a local and/or a global analysis of the delete marker objects stored in the system (and/or metadata associated with those delete marker objects) to determine whether any of them are no longer needed to ensure correct operation of the system. The analysis may apply one or more reap conditions to delete marker objects and/or metadata to identify extraneous delete marker objects, removing those that meet one or more reap conditions from storage. | 09-17-2015 |
20150261674 | PAGE CACHE WRITE LOGGING AT BLOCK-BASED STORAGE - A block-based storage system may implement page cache write logging. Write requests for a data volume maintained at a storage node may be received at a storage node. A page cache for may be updated in accordance with the request. A log record describing the page cache update may be stored in a page cache write log maintained in a persistent storage device. Once the write request is performed in the page cache and recorded in a log record in the page cache write log, the write request may be acknowledged. Upon recovery from a system failure where data in the page cache is lost, log records in the page cache write log may be replayed to restore to the page cache a state of the page cache prior to the system failure. | 09-17-2015 |
20150261673 | DYNAMICALLY MODIFYING DURABILITY PROPERTIES FOR INDIVIDUAL DATA VOLUMES - A block-based storage system may implement dynamic durability adjustment for page cache write logging. A rate of incoming write requests for data volumes maintained at a storage node may be monitored. Based, at least in part, on the rate of incoming write requests, a dynamic modification to a durability property for a data volume may be made, such as enabling page cache write logging the data volume or disabling write logging for the data volume. When incoming write requests are received, a determination may be made as to whether page cache write logging for a particular data volume is enabled. For write requests with disabled page cache write logging, the page cache may be updated and the write request may be acknowledged without storing a log record describing the update in a page cache write log. | 09-17-2015 |
20150261443 | REDUCING DATA VOLUME DURABILITY STATE FOR BLOCK-BASED STORAGE - A block-based storage system may implement reducing durability state for a data volume. A determination may be made that storage node replicating write requests for a data volume is unavailable. In response, subsequent write requests may be processed according to a reduced durability state for the data volume such that replication for the data volume may be disabled for the storage node. Write requests may then be completed at a fewer number of storage nodes prior to acknowledging the write request as complete. Durability state for the data volume may be increase in various embodiments. A storage node may be identified and replication operations may be performed to synchronize the current data volume at the storage node with a replica of the data volume maintained at the identified storage node. | 09-17-2015 |
20150255069 | PREDICTING PRONUNCIATION IN SPEECH RECOGNITION - An automatic speech recognition (ASR) device may be configured to predict pronunciations of textual identifiers (for example, song names, etc.) based on predicting one or more languages of origin of the textual identifier. The one or more languages of origin may be determined based on the textual identifier. The pronunciations may include a hybrid pronunciation including a pronunciation in one language, a pronunciation in a second language and a hybrid pronunciation that combines multiple languages. The pronunciations may be added to a lexicon and matched to the content item (e.g., song) and/or textual identifier. The ASR device may receive a spoken utterance from a user requesting the ASR device to access the content item. The ASR device determines whether the spoken utterance matches one of the pronunciations of the content item in the lexicon. The ASR device then accesses the content when the spoken utterance matches one of the potential textual identifier pronunciations. | 09-10-2015 |
20150254758 | WEIGHT-BASED SHIPPING SYSTEM - Embodiments of systems and methods described herein provide users with access to a weight-based shipping service that enables the users to purchase a group of items and pay a flat shipping fee. These systems and methods can enable a user to combine certain items into a box or set of boxes based on weight for a reduced shipping cost. In addition, systems and methods described herein can recommend items to users for purchase based at least in part on the items that a user has added to a box, including based on remaining weight in the box. | 09-10-2015 |
20150254451 | AUTHENTICATION OF VIRTUAL MACHINE IMAGES USING DIGITAL CERTIFICATES - A vendor of virtual machine images accesses a virtual computer system service to upload a digitally signed virtual machine image to a data store usable by customers of the virtual computer system service to select an image for creating a virtual machine instance. If a digital certificate is uploaded along with the virtual machine image, the virtual computer system service may determine whether the digital certificate has been trusted for use. If the digital certificate has been trusted for use, the virtual computer system service may use a public cryptographic key to decrypt a hash signature included with the image to obtain a first hash value. The service may additionally apply a hash function to the image itself to obtain a second hash value. If the two hash values match, then the virtual machine image may be deemed to be authentic. | 09-10-2015 |
20150248487 | TOPOLOGY SERVICE USING CLOSURE TABLES AND METAGRAPHS - Methods and systems for a topology service providing an interface for specifying a topology and answering queries regarding the topology. Further, the topology service may create, from a specified topology, a directed acyclic graph and corresponding closure table. The topology service may also provide an interface for receiving metadata regarding the topology. In this way, the topology service, based at least in part on connections between nodes in the entries of the closure table and based at least in part on the metadata regarding the topology, may answer queries in regard to the specified topology. | 09-03-2015 |
20150245281 | Management of handheld electronic device - In some cases, a scanner of a handheld electronic device may be used to capture a registration identifier (e.g., a registration barcode), and connection information (e.g., one or more wireless credentials) may be determined by scanning the registration barcode. In some cases, the connection information may be stored in a memory of the handheld electronic device and may be used to establish a Wi-Fi connection with a wireless access point (WAP). In some cases, the registration barcode may be translated into multiple screen frames that may be presented in a screen frame sequence via a user interface displayed via a display of an electronic device that is different from the handheld electronic device. The scanner may directly capture the individual frames in the sequence via the display of the other electronic device. | 08-27-2015 |
20150244716 | SECURING CLIENT-SPECIFIED CREDENTIALS AT CRYPTOGRAPICALLY ATTESTED RESOURCES - Methods and apparatus for securing client-specified credentials at cryptographically-attested resources are described. An indication is obtained that resources deployed for execution of a compute instance of a multi-tenant computing service at an instance host of a provider network meet a client's security criteria. An encrypted representation of credentials to be used at the compute instance to implement operations on behalf of a client is received at the instance host. The credentials are extracted from the encrypted representation using a private key unique to the instance host, used for the operations, and then removed from the instance host without being saved in persistent memory. | 08-27-2015 |
20150244707 | PROVISIONING DIGITAL CERTIFICATES IN A NETWORK ENVIRONMENT - A method for provisioning digital certificates in a compute service environment may include authorizing a customer entity for using and/or controlling a network resource in the compute service environment. Upon completing the authorization, a digital certificate may be issued to the customer entity. The digital certificate may be associated with the network resource and may be issued for a limited duration period. The use and/or control of the network resource by the customer entity may be monitored. Reissuance of the digital certificate may be conditioned on whether the customer entity is still using and/or controlling the network resource in the compute service environment. If the customer entity is still using and/or controlling the network resource in the multi-tenant environment, the digital certificate may be automatically reissued for another limited duration period. The automatically reissuing may take place without receiving a certificate reissue request from the customer entity. | 08-27-2015 |
20150242933 | Device For Delivery Service - In some cases, a handheld electronic device may operate in a voice input mode or a scanner input mode. When operating in the voice input mode, the handheld electronic device may record and store audio data in memory. In some cases, the stored audio data may be communicated from the handheld electronic device (e.g., via a Wi-Fi connection) to one or more remote computing devices (e.g., for speech processing). When operating in the scanner input mode, the handheld electronic device may record and store item identifier information (e.g., as barcode data) in the memory. In some cases, the stored item identifier data may be communicated to the one or more remote computing devices (e.g., for item identification processing). | 08-27-2015 |
20150242932 | Delivery service system - In some cases, a delivery service system may include a handheld electronic device for use with a delivery service (e.g., a grocery delivery service). When operating in a voice input mode, the handheld electronic device may record and store audio data in memory. The stored audio data may be communicated from the handheld electronic device (e.g., via a Wi-Fi connection) to the delivery service for speech processing. When operating in a scanner input mode, the handheld electronic device may record and store item identifier information (e.g., barcode data) in memory. The stored data may be communicated to the delivery service for item identification processing. In some cases, a user interface associated with the delivery service may allow the user to review and confirm an order prior to submission of the order for delivery. | 08-27-2015 |
20150242150 | METHODS AND APPARATUS FOR OPTIMIZING RESOURCE UTILIZATION IN DISTRIBUTED STORAGE SYSTEMS - Methods and apparatus for optimizing resource utilization in distributed storage systems. A data migration technique is described that may operate in the background in a distributed storage data center to migrate data among a fleet of storage units to achieve a substantially even and randomized data storage distribution among all storage units in the fleet. When new storage units are added to the fleet and coupled to the data center network, the new storage units are detected. Instead of processing and storing new data to the newly added storage units, as in conventional distributed storage systems, the new units are blocked from general client I/O to allow the data migration technique to migrate data from other, previously installed storage hardware in the data center onto the new storage hardware. Once the storage load on the new storage units is balanced with the rest of the fleet, the new storage units are released for general client I/O. | 08-27-2015 |
20150242132 | SYSTEMS AND METHODS FOR SCHEDULING WRITE REQUESTS FOR A SOLID STATE STORAGE DEVICE - An I/O scheduler can manage and schedule write requests that are sent to a storage device in order to prevent the write requests from dominating a storage buffer of the storage device. The I/O scheduler can monitor the number of I/O requests in the storage buffer and maintain a balance between write requests and read requests in the storage buffer. The I/O scheduler monitor the latency of the storage device in processing write requests and manage the write requests sent to the storage device based on the latency. The I/O scheduler can utilize one or more write thresholds. The write thresholds can define thresholds of the number of write requests in the storage buffer and thresholds for the latency of the storage device in processing write requests. The write threshold can represent acceptable levels of write request in the storage buffer and acceptable latency for write requests. | 08-27-2015 |
20150241689 | ELECTROWETTING DISPLAY STRUCTURES - The subject matter disclosed herein relates to an electrowetting display comprising: a transparent substrate including glass spacers surrounded by recessed regions corresponding to pixel regions, a layer of transparent conductive material on the glass spacers, color filter material in the recessed regions, and a transparent support plate covering the recessed regions and the glass spacers, wherein the transparent support plate includes an electrowetting oil. | 08-27-2015 |
20150234440 | POWER ROUTING ASSEMBLY FOR DATA CENTER - A power routing rack can be used to provide various power support redundancies to one or more computing racks in a data center. Power feeds are supplied to bus bars in a power bus bar array extending through the rack, and power routing assemblies positioned in the rack route power from one or more of the bus bars to a computing rack. Each assembly includes circuit breakers that couple to separate bus bars and a routing module that routes power from one or more of the circuit breakers to one or more computing racks. The routing module can include a transfer switch that selectively routes power. The routing module can include an electrical bridge that concurrently routes power. Each assembly can be positioned within the rack to couple the circuit breakers to various power bus bars to adjust the power support redundancy provided to one or more computing racks. | 08-20-2015 |
20150234430 | ELECTRONIC DEVICE DISPLAY STACK - This disclosure describes electronic devices that include displays for rendering content, touch sensors disposed beneath the displays for detecting touch inputs, and antiglare components for reducing glare caused by ambient light. In some embodiments, the displays include a single transparent substrate, a thin film transistor array connected to a bottom surface of the transparent substrate, a conductive substrate, and a front plane laminate connected to the conductive substrate. In such embodiments, the front plane laminate is connected to the thin film transistor array, and the array comprises a plurality of transparent electrodes. This disclosure also describes techniques for manufacturing displays utilized with electronic devices. | 08-20-2015 |
20150227882 | MOBILE PICKUP LOCATIONS - A mobile pickup location is provided that may be associated with a vehicle such as a public bus. A user may choose to have items delivered to a mobile pickup location on a public bus which the user takes every day travelling from the office to home, or which stops at a bus stop that is convenient for the user. Also, in regions where carriers for delivering items are rare or prohibitively expensive, a mobile pickup location may be utilized to deliver items, such as to a rural village. The coordinates of a mobile pickup location may be tracked, such as with GPS, and a user may be provided with a notification when a mobile pickup location with an ordered item is approaching, such as with a text message sent to a cell phone. | 08-13-2015 |
20150227598 | LOG DATA SERVICE IN A VIRTUAL ENVIRONMENT - A log data service in a virtual environment that allows customers of a compute service provider to access system, application and custom log files associated with virtual machine instances that are executing. In some embodiments, log data can be received that includes events or messages from virtual machines in a multi-tenant environment. The log data can be transformed into metric data, which can be used by the customer to generate statistics, view graphs, and generally monitor the customer's virtual machine instances. The log data can also be stored as a service so that the customer has a central repository for which to access the log data. | 08-13-2015 |
20150221021 | SYSTEM AND METHOD FOR VISUAL VERIFICATION OF ORDER PROCESSING - One or more images of items for an order being processed at processing station of an order fulfillment center may be captured and associated with the order. Alternatively, a short video clip may be captured of the order being packaged. An electronic notification that the order has been processed may be sent to a customer associated with the order. The electronic notification may include a reference to one or more of the captured images or video clips. The customer may use a reference included in the notification to view the captured images. The customer may view captured images to verify that the order has been correctly processed. The captured images may include images of the items being packaged for shipment and may show the shipping address on the package allowing the customer to verify that indeed it is his package in the images. | 08-06-2015 |
20150215532 | PANORAMIC IMAGE CAPTURE - The display of images, such as panoramic images, in a limited display space can be aided through the use of motion-based control, whereby a user can rotate and/or translate a computing device in order to view different portions of the image, including translating or zooming within the image. Sensors can be used to determine the motion for adjusting the display. The same or other sensors can also assist a user in capturing such an image. For example, a compass can determine the relative orientation of the device and a gyroscope can determine rotation of the device, to determine an appropriate path of motion for the capture and any deviation from that path. The user can be provided with information enabling the user to follow the path with an appropriate device orientation. | 07-30-2015 |
20150215526 | LENTICULAR IMAGE CAPTURE - The display of images, such as lenticular images, in a limited display space can be aided through the use of motion-based control, whereby a user can rotate and/or translate a computing device in order to cause different views of a lenticular image to be displayed. Sensors can be used to determine the motion in order to select the appropriate view to display. Approaches can further assist the user in creating lenticular images. The user can specify various configurations in which to display different views in a lenticular. If the user is capturing the images, one or more previously-acquired images can be used as a guide to help the user to align the images. Various processing can be performed to cause the individual views of the lenticular to match as closely as possible in factors such as alignment, brightness, and color range, among other such options. | 07-30-2015 |
20150215163 | INSTANCE HOST CONFIGURATION - Methods and apparatus for instance host configuration are disclosed. A system includes a plurality of instance hosts configurable for resource instances of a network-accessible service, and control servers to manage remote configuration of the instance hosts. In response to an instance configuration request from a client, a selected control server transmits, to a selected instance host, a sequence of one or more commands. The selected instance host instantiates a remote command executor. The remote command executor initiates configuration operations corresponding to the command sequence, and terminates. The selected control server provides a response to the instance configuration request, based at least in part on results of the operations initiated by the executor. | 07-30-2015 |
20150213784 | MOTION-BASED LENTICULAR IMAGE DISPLAY - The display of images, such as lenticular images, in a limited display space can be aided through the use of motion-based control, whereby a user can rotate and/or translate a computing device in order to cause different views of a lenticular image to be displayed. Sensors can be used to determine the motion in order to select the appropriate view to display. Approaches can further assist the user in creating lenticular images. The user can specify various configurations in which to display different views in a lenticular. If the user is capturing the images, one or more previously-acquired images can be used as a guide to help the user to align the images. Various processing can be performed to cause the individual views of the lenticular to match as closely as possible in factors such as alignment, brightness, and color range, among other such options. | 07-30-2015 |
20150207727 | PREDICTING ROUTE UTILIZATION AND NON-REDUNDANT FAILURES IN NETWORK ENVIRONMENTS - A network analysis module may obtain information including but not limited to network traffic and topology information for a network environment including multiple separate networks and physical connections between the networks. The module generates a network topology model including but not limited to extreme-case failure or break information according to the network topology information, and applies the historical network traffic information to the network topology model to predict future expected normal traffic load and extreme-case traffic load for each route over the physical connections between the networks. Output may include one or more reports for each route, each report indicating the historical and predicted traffic levels for both normal and extreme-case scenarios of a respective route. | 07-23-2015 |
20150207683 | NETWORK ENTITY REGISTRY FOR NETWORK ENTITY HANDLES INCLUDED IN NETWORK TRAFFIC POLICIES ENFORCED FOR A PROVIDER NETWORK - A provider network may implement network entity registry for network entity handles included in network traffic policies enforced for a provider network. Network entity entries may be maintained in a network entity registry that specify network address information for network entity handles included in network traffic control policies. Network traffic control policies may be enforced by a network traffic controller. When an update to an network entity entry is received, the network entity entry may be updated and network address information specified in the network entity entry may be provided to a subset of network traffic controls implemented in a provider network for those network traffic controls enforcing network traffic policies including the network entity handle for the updated network entity entry. Network entity entries may, in some embodiments, not be updated by a network entity entry owner. | 07-23-2015 |
20150205677 | SYSTEM AND METHOD FOR LOGICAL DELETION OF STORED DATA OBJECTS - Systems and methods for providing object versioning in a storage system may support the logical deletion of stored objects. In response to a delete operation specifying both a user key and a version identifier, the storage system may permanently delete the specified version of an object having the specified key. In response to a delete operation specifying a user key, but not a version identifier, the storage system may create a delete marker object that does not contain object data, and may generate a new version identifier for the delete marker. The delete marker may be stored as the latest object version of the user key, and may be addressable in the storage system using a composite key comprising the user key and the new version identifier. Subsequent attempts to retrieve the user key without specifying a version identifier may return an error, although the object was not actually deleted. | 07-23-2015 |
20150186236 | SCALABLE TESTING IN A PRODUCTION SYSTEM WITH AUTOSCALING - A network-based production service is configured to process client requests for the production service via a network, capture production request data defining the requests and store the production request data in a data store. A test system comprising one or more controllers creates test jobs according to a test plan for testing the production service. The test plan creates a test profile for using specified production request data to simulate a load on the production service. Each job created by the test plan specifies a portion of production request data. A job queue receives and queues test jobs from one or more controllers configured to add test jobs to the job queue according to the test plan. Workers access jobs from the job queue and the production request data from the data store as specified in each job and replay the production request data to the production service. | 07-02-2015 |
20150181751 | STABILIZING RACK SYSTEMS FOR SEISMIC LOADS - A system for performing computing operations includes a rack that rests on a floor and a stabilization device coupled on the top of the rack. The stabilization device includes a mounting portion coupled to the rack, a ballast member, and one or more spring devices coupled between the ballast member and the mounting portion. The ballast member reduces displacement of the rack from seismic loads transmitted from the floor to the rack to mitigate effects of the seismic loads on the rack. | 06-25-2015 |
20150179211 | VIBRATION CANCELLATION FOR DATA STORAGE - Methods and apparatus for vibration cancellation are disclosed. Vibration data from one or more vibration detectors associated with a storage device is collected. The vibration data represents vibrations experienced by the storage device. In response to the vibration data from the one or more vibration detectors, one or more movements for respective ones of one or more counter-vibration actuators to at least partially cancel of the vibrations experienced by the storage device is calculated. The one or more counter-vibration actuators perform the one or more movements. | 06-25-2015 |
20150179124 | DISPLAY DRIVING METHOD - A method of driving an electrowetting display device having at least one display element for displaying a display effect during a display period. The method determines a change in the display effect. Depending on the change, the display may be driven using a first driving scheme or a second driving scheme. The second driving scheme applies a voltage indicative of the display state a different number of times during the display period than the first driving scheme. | 06-25-2015 |
20150179123 | DISPLAY DRIVING METHOD - An electrowetting display device has at least one display element. The method of driving the display device comprises receiving data representing a display effect for display by the element. A driving scheme is selected for the display element in dependence on a characteristic of the data. The driving scheme is selected from at least an analog driving scheme and a pulse width modulation driving scheme. | 06-25-2015 |
20150179097 | DISPLAY DRIVING METHOD - A method of driving an electrowetting display device having at least one display element for displaying a display effect. The method determines a change in the display effect. Depending on the change the display element may be DC driven or AC driven. | 06-25-2015 |
20150179096 | DISPLAY DRIVING METHOD - A method of driving an electrowetting display device for displaying images. The display device has a plurality of display elements arranged in an active matrix. The matrix has rows and columns. A specific display element is addressed by applying a voltage to the display elements along the column of the specific display element and selecting the row of the specific display element. The method includes determining a first group of rows where the voltages to be applied to the display elements in a predefined column or group of columns are within a first range smaller than a range over which the voltage is controllable; and selecting the rows in the first group consecutively. | 06-25-2015 |
20150178492 | SECURE INFORMATION FLOW - Secure information flow may include a service receiving a request for data from a caller. The service may respond to the request with the requested data via a secure flow container. The secure flow container may then send the information to the caller component. Before the secure flow container receives or sends the information, a monitoring environment may permit the secure flow container to receive or send the information, respectively. | 06-25-2015 |
20150163158 | IDENTITY AND ACCESS MANAGEMENT-BASED ACCESS CONTROL IN VIRTUAL NETWORKS - Methods and apparatus for providing identity and access management-based access control for connections between entities in virtual (overlay) network environments. At the encapsulation layer of the overlay network, an out-of-band connection creation process may be leveraged to enforce access control and thus allow or deny overlay network connections between sources and targets according to policies. For example, resources may be given identities, identified resources may assume roles, and policies may be defined for the roles that include permissions regarding establishing connections to other resources. When a given resource (the source) attempts to establish a connection to another resource (the target), role(s) may be determined, policies for the role(s) may be identified, and permission(s) checked to determine if a connection from the source to the target over the overlay network is to be allowed or denied. | 06-11-2015 |
20150162801 | ENERGY RECLAMATION FROM AIR-MOVING SYSTEMS - A data center includes a computing room, computing devices in the computing room, an air handling system, and a turbine system. Air moved by the air handling system flows across heat producing components in the computing devices in the computing room. A rotor of the turbine system rotates in response to at least a portion of the air moved by the air handling system. The turbine system generates electricity from rotation of the rotor. | 06-11-2015 |
20150156280 | PERFORMANCE-BASED DETERMINATION OF REQUEST MODES - Features are disclosed for determining preferred content request modes for client computing devices when initiating content requests. The request modes may correspond to direct requests (e.g., requests made from a client device directly to a content sever hosting requested content) or to indirect requests (e.g., requests made from the client device to the content server via an intermediary system). The preferred request modes made be based on a statistical analysis of performance data (e.g., prior content load times) obtained from one or more client computing devices for a given content item, group of content items (e.g., domain), and the like. | 06-04-2015 |
20150156279 | BROWSER-BASED ANALYSIS OF CONTENT REQUEST MODE PERFORMANCE - Features are disclosed for selecting preferred content request modes on a client computing device when initiating content requests. The request modes may correspond to direct requests (e.g., requests made from a client device directly to a content sever hosting requested content) or to indirect requests (e.g., requests made from the client device to the content server via an intermediary system). The preferred request modes made be based on a statistical analysis of performance data (e.g., prior content load times) observed or recorded by the client computing device in connection with prior content requests. Randomly selected request modes may be used to provide additional data for performance analysis. | 06-04-2015 |
20150156123 | SYSTEM AND METHOD FOR THROTTLING SERVICE REQUESTS USING WORK-BASED TOKENS - A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. An admission control mechanism may manage requests based on tokens, each of which represents a fixed amount of work. The tokens may be added to a token bucket at rate that is dependent on a target work throughput rate while the number of tokens in the bucket does not exceed its maximum capacity. If at least a pre-determined minimum number of tokens is present in the bucket when a service request is received, it may be serviced. Servicing a request may include deducting an initial number of tokens from the bucket, determining that the amount of work performed in servicing the request is different than that represented by the initially deducted tokens, and deducting additional tokens from or replacing tokens in the bucket to reflect the difference. | 06-04-2015 |
20150154506 | BROWSER-BASED SELECTION OF CONTENT REQUEST MODES - Features are disclosed for generating request decision models for use by client computing devices to determine request paths or modes for content requests. The request modes may correspond to direct requests (e.g., requests made from a client device directly to a content server hosting requested content) or to indirect requests (e.g., requests made from the client device to the content server via an intermediary system). The request decision models may be trained by a machine learning algorithm using performance data (e.g., prior content load times), contextual information (e.g., state information associated with devices at times content requests are executed), and the like. | 06-04-2015 |
20150151913 | METHOD AND APPARATUS FOR MANAGING THE ALLOCATION OF ITEMS TO PROCESSING STATIONS IN AN ORDER FULFILLMENT PROCESS - Various embodiments of a method and apparatus for managing the allocation of items to processing stations in an order fulfillment process are described. The apparatus for managing the allocation of items to processing stations in an order fulfillment process may include a conveyance mechanism including at least one item inducted into the conveyance mechanism. The apparatus for managing the allocation of items to processing stations in an order fulfillment process may also include an item allocation component. The item allocation component may be configured to assign the item to a particular sorting station of a group of multiple sorting stations. The item allocation component may determine the particular sorting station to which the item is assigned based upon a determined quantity of other items located at the particular sorting station and a determined quantity of other items en route to the particular sorting station. | 06-04-2015 |
20150150081 | TEMPLATE REPRESENTATION OF SECURITY RESOURCES - Systems and methods are described for enabling users to model security resources and user access keys as resources in a template language. The template can be used to create and update a stack of resources that will provide a network-accessible service. The security resources and access keys can be referred to in the template during both stack creation process and the stack update process. The security resources can include users, groups and policies. Additionally, users can refer to access keys in the template as dynamic parameters without any need to refer to the access keys in plaintext. The system securely stores access keys within the system and allows for templates to refer to them once defined. These key references can then be passed within a template to resources that need them as well as passing them on securely to resources like server instances through the use of the user-data field. | 05-28-2015 |
20150149631 | CUSTOMER-DIRECTED NETWORKING LIMITS IN DISTRIBUTED SYSTEMS - Methods and apparatus for supporting customer-directed networking limits in distributed systems are disclosed. A client request is received via a programmatic interface, indicating a particular lower resource usage limit to be imposed on at least one category of network traffic at a particular instance of a network-accessible service. Resource usage metrics for one or more categories of network traffic at the particular instance are obtained. In response to a determination that resource usage at the particular instance has reached a threshold level, one or more responsive actions are initiated. | 05-28-2015 |
20150149611 | Centralized Resource Usage Visualization Service For Large-Scale Network Topologies - Methods and apparatus for supporting customer-directed networking limits in distributed systems are disclosed. A client request is received via a programmatic interface, indicating a particular lower resource usage limit to be imposed on at least one category of network traffic at a particular instance of a network-accessible service. Resource usage metrics for one or more categories of network traffic at the particular instance are obtained. In response to a determination that resource usage at the particular instance has reached a threshold level, one or more responsive actions are initiated. | 05-28-2015 |
20150149402 | EFFICIENT QUERY PROCESSING USING HISTOGRAMS IN A COLUMNAR DATABASE - A probabilistic data structure is generated for efficient query processing using a histogram for unsorted data in a column of a columnar database. A bucket range size is determined for multiples buckets of a histogram of a column in a columnar database table. In at least some embodiments, the histogram may be a height-balanced histogram. A probabilistic data structure is generated to indicate for which particular buckets in the histogram there is a data value stored in the data block. When an indication of a query directed to the column for select data is received, the probabilistic data structure for each of the data blocks storing data for the column may be examined to determine particular ones of the data blocks which do not need to be read in order to service the query for the select data. | 05-28-2015 |
20150149319 | PERFORMING MARKETPLACE ACTIONS BASED ON SOCIAL NETWORKING TAGS - Aspects of the present disclosure relate to managing a user account based on information received from a social networking service. In accordance with aspects of the present disclosure, a user can associate an account on a social networking service with a separate account on a marketplace system. The marketplace system can define social network tags or identifiers that can be used within the social networking service to implement functions or take actions within the user's account associated with the marketplace system. | 05-28-2015 |
20150143528 | Risk Assessment for Software Applications - Disclosed are various embodiments for assessing risk associated with a software application on a user computing device in an enterprise networked environment. An application rating is generated for the software application based at least in part on application characteristics. A risk analysis for the installation of the application is generated based at least in part on the application rating, the user computing device, and user information. | 05-21-2015 |
20150138624 | SUBSTRATE FOR AN ELECTROWETTING DISPLAY DEVICE AND METHOD OF MANUFACTURING THE SUBSTRATE - A substrate for an electrowetting display device including a pixel electrode, a partition wall pattern and a water-repellent pattern. The pixel electrode is formed on a base substrate. The partition wall pattern is disposed along an edge of the pixel electrode to expose the pixel electrode. The water-repellent pattern is disposed at a space formed by the pixel electrode and the partition wall pattern to be extended along a lower portion of side surfaces of the partition wall pattern from an area on which the pixel electrode is formed. The water-repellent pattern exposes an upper portion of the side surfaces and an upper surface of the partition wall pattern. Thus, a manufacturing reliability of a substrate for an electrowetting display device is improved to prevent a display quality from being reduced. | 05-21-2015 |
20150135272 | IDENTITY POOL BRIDGING FOR MANAGED DIRECTORY SERVICES - A customer of a computing resource service provider may utilize a set of credentials to request creation of an identity pool within a managed directory service. Accordingly, the managed directory service may create the identity pool. Instead of having the customer create a separate account within this identity pool, the managed directory service may create a shadow administrator account within the identity pool, which may be used to manage other users and resources in the identity pool within the managed directory service. The managed directory service further exposes an application programming interface command that may be used to obtain a set of credentials for accessing the shadow administrator account. The customer may use this command to receive the set of credentials and access the shadow administrator account. Accordingly, the customer can manage users and resources in the identity pool within the managed directory service. | 05-14-2015 |
20150135255 | CLIENT-CONFIGURABLE SECURITY OPTIONS FOR DATA STREAMS - A configuration request comprising a security option selected for a particular data stream is received. Nodes of a plurality of functional categories, such as a data ingestion category and a data retrieval category are to be configured for the stream. The security option indicates a security profile of a resource to be used for nodes of at least one functional category. In accordance with the configuration request, a node of a first functional category is configured at a resource with a first security profile, and configuration of a node of a second functional category is initiated at a different resource with a different security profile. | 05-14-2015 |
20150134797 | MANAGED SERVICE FOR ACQUISITION, STORAGE AND CONSUMPTION OF LARGE-SCALE DATA STREAMS - A control node of a multi-tenant stream management service receives a request to initialize a data stream to be comprised of a plurality of data records. The control node determines, based on a partitioning policy, parameters to be used to configure subsystems for ingestion, storage and retrieval of the records. The control node identifies resources to be used for a node of retrieval subsystem The retrieval node is configured to implement programmatic record retrieval interfaces, including respective interfaces to implement non-sequential and sequential access patterns. The control node configures the retrieval node using the selected resources. | 05-14-2015 |
20150134796 | DYNAMIC PARTITIONING TECHNIQUES FOR DATA STREAMS - A partitioning policy, comprising an indication of an initial mapping of data records of a stream to a plurality of partitions, is selected to distribute data records of a data stream among a plurality of nodes of a stream management service. Data ingestion nodes and storage nodes are configured according to the initial mapping. In response to a determination that a triggering criterion for dynamically repartitioning the data stream has been met, a modified mapping is generated, and a different set of ingestion and storage nodes are configured. For at least some time during which arriving data records are stored in accordance with the modified mapping, data records stored at the first set of storage nodes in accordance with the initial mapping are retained. | 05-14-2015 |
20150134795 | DATA STREAM INGESTION AND PERSISTENCE TECHNIQUES - A programmatic interface is implemented, enabling a client of a stream management service to select a data ingestion policy for a data stream. A client request selecting an at-least-once ingestion policy is received. In accordance with the at-least-once policy, a client may transmit an indication of a data record one or more times to the service until a positive acknowledgement is received. In response to receiving a plurality of transmissions indicating a particular data record, respective positive acknowledgements are sent to the client. Based on a persistence policy selected for the stream, copies of the data record are stored at one or more storage locations in response to one particular transmission of the plurality of transmissions. | 05-14-2015 |
20150134626 | PARTITION-BASED DATA STREAM PROCESSING FRAMEWORK - A control node of a multi-tenant stream processing service receives a request indicating an operation to be performed on data records of a particular data stream. Based on a stream partitioning policy, the control node determines an initial number of worker nodes to be used. The control node configures a worker node to perform the operation on received records. In response to a determination that the worker node is in an unhealthy state, the control node configures a replacement worker node. | 05-14-2015 |
20150128128 | Software Distribution Architecture for Hardware Devices - A software distribution architecture includes cloud-based services and user devices that access those services. When a user purchases a new device, the cloud-based services identifies the user, associates the new device with the user, and determines whether the user has existing devices presently registered with the service. If an existing device is found, the cloud-based service automatically distributes software to the existing device for use in configuring the new device after that new device is physically delivered to the user. When the user powers on the new device for a first time, the new device is automatically configured using the software on the existing devices so that the new device is ready for immediate operation after being powered on. Further, the existing device may be used, through execution of the software, to initiate operations being performed by the new device. | 05-07-2015 |
20150127789 | ENCODING TRAFFIC CLASSIFICATION INFORMATION FOR NETWORKING CONFIGURATION - Methods and apparatus for encoding traffic classification information for a networking configuration system are disclosed. At a networking configuration server, a hierarchy of network traffic categories and corresponding networking configuration options are generated. In addition, steps of a procedure usable to classify network traffic units into the categories are determined. Data structures to represent the hierarchy and the procedure are constructed at the networking configuration server and provided to a computing device of a distributed system to be used to schedule network transmissions. | 05-07-2015 |
20150127783 | CENTRALIZED NETWORKING CONFIGURATION IN DISTRIBUTED SYSTEMS - Methods and apparatus for centralized networking configuration in distributed systems are disclosed. Networking related metrics from a plurality of sources within a distributed system are obtained at a networking configuration server. A set of rules to be used to apply a network configuration option to a particular category of traffic associated with a node of the distributed system is determined based on the collected metrics and on networking management policies. A representation of the set of rules is transmitted to the node of the distributed system to schedule network transmissions in accordance with the networking configuration option. | 05-07-2015 |
20150127769 | STRICT QUEUE ORDERING IN A DISTRIBUTED SYSTEM - Methods and systems for implementing strict queue ordering in a distributed system are disclosed. A plurality of messages are distributed to a plurality of queue servers based on strict order parameters for the messages. Messages that share a strict order parameter are distributed to a respective one of the queue servers. Sequence identifiers are assigned to the plurality of messages at the queue servers. Each sequence identifier indicates a respective position in a message sequence for a corresponding one of the strict order parameters. The respective position is based on a time of receipt at the queue server. The plurality of messages are enqueued based on the sequence identifiers. | 05-07-2015 |
20150127620 | OBJECT LOSS REPORTING IN A DATA STORAGE SYSTEM - In response to receiving a request from a client to store an object, a key-durable storage system may assign the object to a volume in its data store, generate a key for the object (e.g., an opaque identifier that encodes information for locating the object in the data store), store the object on one disk in the assigned volume, store the key redundantly in the assigned volume (e.g., using a replication or erasure coding technique), and may return the key to the client. To retrieve the object, the client may send a request including the key, and the system may return the object to the client. If a disk fails, the system may determine which objects were lost, and may return the corresponding keys to the appropriate clients in a notification. The system may be used to back up a more expensive object-redundant storage system. | 05-07-2015 |
20150127578 | STATELESS SIMULATION SERVICE - A proxy simulation service can be used to test a complex system, such as a fulfillment network, that depends on upstream and downstream processes in order to operate. The proxy simulation service can be configured to send an event, such as an order request, so as to appear to be sent from a process upstream of the system; and can be configured to receive a request from the system, such as a request to charge payment information, so as to appear as a downstream process of the system. The proxy simulation service can then simulate a response to the received system request based on the request and on state information related to the request. The simulated response can then be sent to the system being tested. | 05-07-2015 |
20150127412 | WORKFLOW MANAGEMENT SYSTEM - A workflow management system can be implemented by one or more computing systems or services. The workflow management system may be used with a variety of different types of workflows, such as one or more fulfillment systems. The fulfillment systems can be any type of fulfillment system. For example, the fulfillment systems may fulfill orders for digital items, physical products, gifts, services, or a combination of digital products, physical products, services, and/or gifts. The orders may be electronic orders, orders placed via phone or mail, or the like. | 05-07-2015 |
20150124310 | MECHANICAL STRESS MITIGATION IN ELECTROWETTING DISPLAY STRUCTURES - The subject matter disclosed herein relates to an electrowetting display comprising: a dielectric barrier layer formed on a substrate; a hydrophobic layer formed on the dielectric barrier layer, wherein the dielectric barrier layer maintains a separation between the hydrophobic layer and the substrate; a patterned pixel grid formed on the hydrophobic layer, wherein the patterned pixel grid comprises rows and columns of pixel walls that form field pixels and border pixels; an oil film overlying the hydrophobic layer, wherein the oil film is partitioned by the patterned pixel grid; and an electrolyte overlying the oil film and the patterned pixel grid, wherein one or more of the rows or the columns of pixel walls of the patterned pixel grid includes a substantially nonlinear-shaped portion to reduce sheer stress between the patterned pixel grid and the hydrophobic layer. | 05-07-2015 |
20150120917 | METHODS AND APPARATUS FOR SCALABLE PRIVATE SERVICES - Methods and apparatus for providing scalable private services in service provider networking environments. A service provider that provides a large, public, multi-tenant implementation of a web service to multiple customers via a public API endpoint may allow a customer to request the establishment of a private implementation of the service. In response, a service private instance may be automatically and/or manually established for the customer that provides a private API endpoint to the service and that is at least in part implemented on single-tenant hardware that is not shared with other customers. The service private instance may initially be implemented as a relatively small scale and possibly limited implementation of the service when compared to the service public instance. As the needs of the customer grow, the service private instance may be automatically and/or manually scaled up from the initial implementation. | 04-30-2015 |
20150120677 | VALIDATION OF LOG FORMATS - Systems and methods for validation of log formats are described herein. Log data is stored via a logging service in a data store or other storage system. An example log or proposed log format is received by the logging service. The proposed log format is validated against validation rules provided by log consumers. | 04-30-2015 |
20150120658 | SYSTEM AND METHOD FOR SPLITTING A REPLICATED DATA PARTITION - A system that implements a data storage service may store data on behalf of storage service clients. The system may maintain data in multiple replicas of partitions that are stored on respective computing nodes in the system. The system may split a data partition into two new partitions, and may split the replica group that stored the original partitions into two new replica groups, each storing one of the new partitions. To split the replica group, the master replica may propagate membership changes to the other members of the replica group for adding members to the original replica group and for splitting the expanded replica group into two new replica groups. Subsequent to the split, replicas may attempt to become the master for the original replica group or for a new replica group. If an attempt to become master replica for the original replica group succeeds, the split may fail. | 04-30-2015 |
20150116861 | HARD DISK DRIVE ASSEMBLY WITH FIELD-SEPARABLE MECHANICAL MODULE AND DRIVE CONTROL - A system for storing data includes a rack, one or more data storage drive assemblies coupled to the rack, and a data control module coupled to the rack. The data storage drive assemblies include one or more drive mechanical modules configured to store data and one or more drive control modules coupled to the drive mechanical modules. The drive control modules control mechanical operations in the drive mechanical modules. The drive mechanical modules and the associated drive control modules are separable from one another without removing the other module from the at least one data storage drive assembly. | 04-30-2015 |
20150113022 | MANAGING MEDIA CONTENT, PLAYLIST SHARING - Electronic content items which may be associated into playlists and located throughout a plurality of sources may be managed using at least one media content manager. A compatibility hierarchy may be used to determine compatibility of certain electronic content items with other electronic content items associated with other sources in order to populate playlists. | 04-23-2015 |
20150113021 | MANAGING MEDIA CONTENT, FEDERATED PLAYER - Electronic content items may be organized into playlists and associated with a plurality of sources. These playlists may be managed using at least one media content manager. A compatibility hierarchy may be implemented to determine compatibility of certain electronic content items with other electronic content items, which may be organized into playlists. Other playlists may be populated based at least in part on the compatibility hierarchy. Playlists comprising electronic content items associated with a plurality of sources may be playable by implementing a federated media player. | 04-23-2015 |
20150100630 | SYSTEM AND METHOD FOR THROTTLING SERVICE REQUESTS HAVING NON-UNIFORM WORKLOADS - A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. The system may determine whether it is operating in an overloaded or underloaded state based on a current work throughput rate, a target work throughput rate, a maximum request rate, or an actual request rate, and may dynamically adjust the maximum request rate in response. For example, if the maximum request rate is being exceeded, the maximum request rate may be raised or lowered, dependent on the current work throughput rate. If the target or committed work throughput rate is being exceeded, but the maximum request rate is not being exceeded, a lower maximum request rate may be proposed. Adjustments to the maximum request rate may be made using multiple incremental adjustments. Service request tokens may be added to a leaky token bucket at the maximum request rate. | 04-09-2015 |
20150095191 | GLOBAL MERCHANT NETWORK - Techniques for providing a global merchant network are provided. In some embodiments, a global merchant network can be established for enabling items offered in a first geographic region by one party to be offered in a different geographic region by a different party. For example, the global merchant network may facilitate or otherwise enable two merchants associated with two different marketplaces (e.g., different electronic marketplaces that service different geographic regions) to provide items from one marketplace to another. | 04-02-2015 |
20150095026 | SPEECH RECOGNIZER WITH MULTI-DIRECTIONAL DECODING - In an automatic speech recognition (ASR) processing system, ASR processing may be configured to process speech based on multiple channels of audio received from a beamformer. The ASR processing system may include a microphone array and the beamformer to output multiple channels of audio such that each channel isolates audio in a particular direction. The multichannel audio signals may include spoken utterances/speech from one or more speakers as well as undesired audio, such as noise from a household appliance. The ASR device may simultaneously perform speech recognition on the multi-channel audio to provide more accurate speech recognition results. | 04-02-2015 |
20150093985 | PASSIVE COOLING SYSTEM WITH AMBIENT FLUID COLLECTION - A passive cooling system routes air from an enclosure to an ambient environment, via a chimney effect, through one or more indirect pathways and re-directs environmental elements received from the ambient environment. One or more vanes are arranged within an interior space, such that the vanes collectively form one or more indirect pathways to the ambient environment. The vanes preclude environmental elements, including precipitation and particulate matter, from passing through the interior space and into the enclosure. Environmental elements are re-directed by one or more of the vanes, at least in part, to an exterior of the passive exhaust system. Dampers may be adjusted to control airflow through the passive cooling system and restrict environmental elements from entering the passive cooling system. Liquids received from the ambient environment may be re-directed into a reclamation system for use in a cooling system. | 04-02-2015 |
20150091903 | SIMULATING THREE-DIMENSIONAL VIEWS USING PLANES OF CONTENT - Approaches enable image content (e.g., still or video content) to be displayed in such a way that the image content will appear, to a viewer, to include portions with different locations in physical space, with the relative positioning of those portions being determined at least in part upon a current relative position and/or orientation of the viewer with respect to the device, as well as changes in that relative position and/or orientation. For example, image content can be grouped or otherwise contained or assigned to different planes, levels, or other such groupings of content. The planes of content can enable image content included within those planes to be displayed to provide a viewer with an appearance or view of the content that appears to be positioned and/or displayed in 3D space. As that viewing angle changes, the content can be re-rendered or otherwise updated to display the image content from a perspective that reflects the change in viewing angle. | 04-02-2015 |
20150089049 | WIDE AREA NETWORK MONITORING - As exterior routing protocols generally do not provide information about the internal routing paths of an autonomous system, a particular autonomous system has limited information about the internal health of other autonomous systems. However, if a monitoring system has access to routing data and/or other network data from multiple points of an autonomous system, the monitoring system can estimate, with some accuracy, the health of the autonomous system. In turn, by monitoring at least some of autonomous systems forming a larger internetwork, such as the Internet, the monitoring system can estimate the overall health of at least portions of the internetwork. | 03-26-2015 |
20150089038 | SERVICE DISCOVERY USING A NETWORK - Described are techniques and systems for service discovery on a network. A media device on the network generates a signature indicative of a particular set of one or more services available for execution on the media device. The signature may be distributed on the network using beacon transmissions from the media device. A receiving media device compares the signature with previously stored service data which associates signatures with service sets. The stored service data may include a local signature indicative of a local service set. Determinations of a match result in the receiving media device using the previously stored data. Unmatched signatures may result in the receiving media device sending a request for service set data. The received service set data may then be used to provide service availability information. The received service set data and associated signature may be added to the stored service data. | 03-26-2015 |
20150089034 | CLIENT-PREMISE RESOURCE CONTROL VIA PROVIDER-DEFINED INTERFACES - Methods and apparatus for client-premise resource control using provider-defined interfaces are described. A set of programmatic interfaces enabling clients to submit registration requests is implemented. A registration request indicates resources located at a data center external to a provider network as candidate targets for control operation requests issued via a different set of programmatic interfaces associated with a service of the provider network. A network connection is established between a particular resource indicated in a registration request, and an administrative resource located within a data center of the provider network. In response to a particular control operation request received via a programmatic interface of the different set, a control command is transmitted from the administrative resource to the particular resource via the network connection. | 03-26-2015 |
20150088966 | SERVICE ACTIVITY USER INTERFACE - Described are techniques and systems for providing a user interface which provides information about one or more activities being performed by services available among affiliated devices. The information is based on activity data which may be obtained through a subscription-publication mechanism with the affiliated devices. The user interface may also provide activity controls to modify the one or more activities. | 03-26-2015 |
20150088767 | REUSABLE SHIPPING PACKAGES FOR ELECTRONIC MARKETPLACE SELLERS - Techniques for improving the efficiency of an electronic marketplace are disclosed herein. In particular, methods for implementing reusable packaging in fulfillment of orders by participants who are both consumers and sellers in an electronic marketplace are described. The reusable packaging may be provided on a one-to-one basis as compared to a seller's pending outgoing orders and an order placed by the seller acting as a consumer to an electronic marketplace, on a one-to-N basis as compared to the seller's selling history, or may be based on a multi-modal assessment of the seller's past and pending orders and accommodate multiple representative orders. Reusable packaging may include a wide variety of containers and additional materials to aid a seller in its use. | 03-26-2015 |
20150088731 | KIOSK MANAGEMENT SYSTEM - A kiosk management system may identify items with which to pre-stock a plurality of geographically distributed kiosks. The identified items may be delivered from a distribution center to one or more distribution agents, who then deliver the identified items to individual kiosks. When the kiosk management system receives a request for an item from a consumer who has been browsing items in, e.g., an electronic marketplace, the kiosk management system can determine whether the requested item is available at any kiosks in proximity of the consumer and provide a list of such kiosks to the consumer for selection. Following selection of a kiosk by the consumer, the kiosk management system can send the consumer a notification identifying the designated kiosk and including a generated code for use by the consumer in retrieving of the requested item from the designated kiosk. | 03-26-2015 |
20150088698 | MOBILE TRANSACTIONS WITH A KIOSK MANAGEMENT SYSTEM - A method and system of conducting a mobile transaction with a kiosk management system operating a plurality of kiosks for requested items is provided. A consumer may possess a portable device configured to communicate with the kiosk management system such that the kiosk management system may provide requested items to a selected kiosk from the plurality of kiosks. The portable device may operate a mobile application to display a list of available kiosks providing the requested items for the consumer to select a kiosk to reserve the requested items at. The consumer may then use the portable device to interact with the selected kiosk to retrieve the requested items reserved at the selected kiosk. | 03-26-2015 |