Patent application number | Description | Published |
20100217158 | SUDDEN INFANT DEATH PREVENTION CLOTHING - A health sensing device is described for placement on a user. The device may include a sensor, a filter, and a transmitter. The sensor is configured to sense one or more factors relating to an indicator of a health related condition or occurrence. The filter is configured to evaluate a signal from the sensor and determine if the indicator has been detected. The transmitter is arranged for initiating a transmission based on a signal from the filter. The sensor can include one or more microphone devices, accelerometers, and/or MEMs devices. A method of monitoring a user for a health related condition is also described. | 08-26-2010 |
20100217345 | MICROPHONE FOR REMOTE HEALTH SENSING - A health sensing device is described for placement on a user. The device may include a sensor, a filter, and a transmitter. The sensor is configured to sense one or more factors relating to an indicator of a health related condition or occurrence. The filter is configured to evaluate a signal from the sensor and determine if the indicator has been detected. The transmitter is arranged for initiating a transmission based on a signal from the filter. The sensor can include one or more microphone devices, accelerometers, and/or MEMs devices. A method of monitoring a user for a health related condition is also described. | 08-26-2010 |
20100217955 | ROUTING ACROSS MULTICORE NETWORKS USING REAL WORLD OR MODELED DATA - The present disclosure relates to a system for routing data across a multicore processing network. The system includes a multicore processing array having a plurality of processing cores, a memory for storing data relating to an object being modeled, the data being associated with coordinate information relating to the object within a coordinate system, and a controller for routing the data from the memory to one or more of the plurality of processing cores of the multicore processing array based on the coordinate information associated with the data. The present disclosure also relates to a method for routing data across a multicore processing network and a computer accessible medium having stored thereon computer executable instructions for performing a procedure for routing data across a multicore processing network. | 08-26-2010 |
20100218186 | Data Centers Task Mapping - A data center management system may include a processor coupled to a network. The network may be further coupled to a primary data center and a secondary data center located at a physical location remote from the primary data center. The processor may be adapted to execute computer implemented instructions to determine a first transition point for the primary data center with respect to a secondary data center on the basis of one or more financial indicators, transfer one or more data center tasks from the primary data center to the secondary data center at substantially the first transition point, and execute the one or more transferred data center tasks at the secondary data center. | 08-26-2010 |
20100226491 | NOISE CANCELLATION FOR PHONE CONVERSATION - The present disclosure relates to systems and methods for noise cancellation of phone conversation. Some of the systems can include a phone having a microphone and a noise cancellation device. In some examples, the noise cancellation device has a microphone for receiving an input sound wave and positioned proximate the phone microphone, a processor for generating a noise cancellation sound wave based on the input sound wave, and a speaker for outputting the noise cancellation sound wave. The phone microphone and the noise cancellation device microphone can be shared or different microphones, and can also be microphone is integral to the phone. The shared or separate microphones can be part of a phone headset. | 09-09-2010 |
20100228467 | Traffic Flow Model to Provide Traffic Flow Information - Examples of maintaining or querying a traffic database to generate a traffic flow model to provide traffic flow information and determine a per-lane route for a vehicle to travel are disclosed. | 09-09-2010 |
20100231528 | OLED DISPLAY AND SENSOR - The present disclosure relates to a display device with an OLED display including a plurality of nodes configured to emit light when drive circuitry provides a signal across the plurality of nodes at or above an illumination threshold. Measurement circuitry may be disposed proximate to the plurality of nodes and ma be configured to sense the light reflected off of an object positioned over the OLED display to provide measurement signals. The measurement signals can be evaluated to determine the location of the display proximate to the object that provides the reflected light. | 09-16-2010 |
20100231548 | TOUCH-SENSITIVE DISPLAY DEVICE AND METHOD - The present disclosure generally relates to a touch-sensitive LED display device with a number of shared circuits having measurement circuitry electrically coupled to display circuitry. A processor receives signals from the measurement circuitry and may compare the signals to determine a location of the touch on the touch screen. | 09-16-2010 |
20100262742 | Interrupt Arbitration For Multiprocessors - Technologies are generally described herein for handling interrupts within a multiprocessor computing system. Upon receiving an interrupt at the multiprocessor computing system, a priority level associated with an interrupt handler for the interrupt can be determined. Current task priority levels can be queried from one or more processors of the multiprocessor computing system. One of the processors can be assigned to execute the interrupt handler in response to the processor having a lowest current task priority level. Interrupt arbitration can schedule and communicate interrupt responses among processor cores in a multiprocessor computing system. Arbitration can query information about current task or thread priorities from a set of processor cores upon receiving an interrupt. The processor core that is currently idle or running the lowest priority task may be selected to service the interrupt. | 10-14-2010 |
20100268889 | COMPILER BASED CACHE ALLOCATION - Techniques a generally described for creating a compiler determined map for the allocation of memory space within a cache. An example computing system is disclosed having a multicore processor with a plurality of processor cores. At least one cache may be accessible to at least two of the plurality of processor cores. A compiler determined map may separately allocate a memory space to threads of execution processed by the processor cores. | 10-21-2010 |
20100268891 | Allocation of memory space to individual processor cores - Techniques are generally described for a multi-core processor with a plurality of processor cores. At least one cache is accessible to at least two of the plurality of processor cores. The multi-core processor can be configured for separately allocating a memory space within the cache to the individual processor cores accessing the cache. | 10-21-2010 |
20100268912 | THREAD MAPPING IN MULTI-CORE PROCESSORS - Techniques for thread mapping in multi-core processors are disclosed. An example computing system is disclosed having a multi-core processor with a plurality of processor cores. A performance counter may be configured to collect data relating to the performance of the multi-core processor. A core controller may be configured to map threads of execution to the processor cores based at least in part on the data collected by the performance counter. | 10-21-2010 |
20100269111 | TASK MANAGEMENT - Techniques for controlling the execution of tasks in data center are generally described. In some examples, a management system may include a processor and a memory coupled to the processor. The processor, in some examples, may be adapted to execute computer implemented instructions to retrieve one or more data center tasks, determine execution parameters for the one or more of the data center tasks on based at least in part on one or more financial indicators, and communicate the execution parameters to the data center to execute the one or more data center tasks in accordance with the execution parameters. | 10-21-2010 |
20100271325 | DIRECTION AND FORCE SENSING INPUT DEVICE - Systems, methods and devices for identifying characters for a display are generally described. An example system may include a processor, a memory coupled to the processor, and an input device coupled to the processor. The input device may include a plurality of input members, where one or more of the input members may have a plurality of characters associated therewith. The processor may be adapted to execute computer implemented instructions to identify an occurrence of a touch force being applied to an input member, determine a particular character from the plurality of characters that is associated with the applied touch force, and/or send the identified character to a display unit. The character may be determined based at least in part on the one or more properties of the applied touch force. | 10-28-2010 |
20100271994 | Energy Reservation In Power Limited Networks - Technologies are described herein for reserving energy at network nodes within a wireless network and establishing energy threshold levels within the network nodes to suspend or maintain certain operational states as supported by time varying energy levels. Energy within the network node can be reserved for processing a critical message in response to receiving a reservation request. An energy level threshold for a network node within a wireless network can be adjusted in response to receiving a reservation request. Message transmission can be enabled in response to the monitored energy level being above the energy level threshold. Message transmission may be suspended in response to the monitored energy level being below the energy level threshold. | 10-28-2010 |
20100274879 | Dynamic Scheduling Interrupt Controller For Multiprocessors - Technologies are generally described herein for handling interrupts within a multiprocessor computing system. A priority level associated with a current task for each processor of the multiprocessor computing system can be maintained. Cache state information associated with each processor can also be maintained. Upon receiving an interrupt to the multiprocessor computing system, a cache locality score for each processor can be determined based on the maintained cache state information. A value can be computed that balances, for each processor, the priority level and the cache locality score. A processor for servicing the interrupt can be determined based on the computed value. The determined processor can be signaled to service the interrupt. Tracking state information related to processor cores can support rapid allocation of an arriving interrupt to a processor core without collecting processor core state information at interrupt time. | 10-28-2010 |
20100274941 | Interrupt Optimization For Multiprocessors - Technologies are described herein for allocating interrupts within a multiprocessor computing system. Information communicated to an interrupt controller module can support allocating interrupt response resources so as to maintain processor affinity for interrupt service routines. This affinity can support caching efficiency by executing a specific interrupt handler on a processor that previously executed that interrupt handler. The caching efficiency may be balanced against the benefits of assigning execution of the interrupt hander to another processor that is currently idle or currently processing a lower priority task. | 10-28-2010 |
20100281223 | SELECTIVELY SECURING DATA AND/OR ERASING SECURE DATA CACHES RESPONSIVE TO SECURITY COMPROMISING CONDITIONS - Techniques are generally described for methods, systems, data processing devices and computer readable media configured to decrypt data to be stored in a data cache when a particular condition indicative of user authentication or data security has occurred. The described techniques may also be arranged to terminate the storage of decrypted data in the cache when a particular condition that may compromise the security of the data is detected. The describe techniques may further be arranged to erase the decrypted data stored in the cache when a particular condition that may compromise the security of the data is detected. | 11-04-2010 |
20100281247 | SECURING BACKING STORAGE DATA PASSED THROUGH A NETWORK - Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing storage device are in encrypted form before that data is transferred to another device or over a network. In some examples, the methods, data processing devices and computer readable media may be arranged to encrypt the data passed to the network when the data stored in the backing storage device is in unencrypted form. Also disclosed are methods, data processing devices and computer readable media that identify when the data stored in the backing storage device is in unencrypted form, including methods that may detect that the data may appear to be in encrypted form as a result of the data being compressed. | 11-04-2010 |
20100283618 | SNORING TREATMENT - Health-sensing and health-action devices and systems are generally described. The health-sensing device may include one or more of a sensor, a filter, and a transmitter. The sensor may be configured to sense one or more factors relating to an indicator of a health related condition or occurrence such as snoring and may include one or more microphone devices, accelerometers, and/or MEMs devices. The filter may be configured to evaluate a signal from the sensor and determine if the indicator has been detected. The transmitter may be arranged for initiating a transmission based on a signal from the filter. The health-action device may be configured for responding to an indicator of a health related condition or occurrence of a user and may include one or more of a receiver, a processor, and a responder. The health-action device may stimulate the user or may cancel the snoring sound. | 11-11-2010 |
20100286545 | ACCELEROMETER BASED HEALTH SENSING - Health-sensing and health-action devices and systems are generally described. The health-sensing device may include one or more of a sensor, a filter, and a transmitter. The sensor may be configured to sense one or more factors relating to an indicator of a health related condition or occurrence such as sleep apnea and may include one or more microphone devices, accelerometers, and/or MEMs devices. The filter may be configured to evaluate a signal from the sensor and determine when the indicator has been detected. The transmitter may be arranged for initiating a transmission based on a signal from the filter. The health-action device may be configured for responding to an indicator of a health related condition or occurrence of a user and may include one or more of a receiver, a processor, and a responder. | 11-11-2010 |
20100286567 | ELDERLY FALL DETECTION - Health-sensing and health-action devices and systems are generally described. The health-sensing device may include one or more of a sensor, a filter, and a transmitter. The sensor may be configured to sense when a user is likely to have fallen down and may include a sensor in the form of one or more microphone devices, accelerometers, and/or MEMs devices. The filter may be configured to evaluate a signal from the sensor and determine when a fall has occurred and analyze the magnitude of the fall. The transmitter may be arranged for initiating a transmission based on a signal from the filter. The health-action device may be configured for responding to a fall and may include one or more of a receiver, a processor, and a responder. A notifying element may also be included for interrupting the transmission when assistance is not needed. | 11-11-2010 |
20100287383 | TECHNIQUES FOR DETECTING ENCRYPTED DATA - Techniques are described that generally relate to methods for detecting encryption status of a data file or data stream and selectively encrypting the data file or data stream based on the encryption status of the data file or data stream are generally disclosed. Example methods may include one or more of reading the data file or data stream from a data source, calculating a value of a property of the data file or data stream, comparing the calculated value with a threshold value to determine whether the file is encrypted or unencrypted, and encrypting files that are determined to be unencrypted. | 11-11-2010 |
20100287385 | SECURING DATA CACHES THROUGH ENCRYPTION - Encryption techniques for securing data in a data cache are generally disclosed. Example methods may include one or more of reading the cache to identify data, determining whether the data is encrypted to identify previously unencrypted data and/or previously encrypted data, and encrypting selectively at least a portion of the previously unencrypted data. The present disclosure also generally relates to a computer system data processor configured to read a cache to identify data, determine whether the read data is encrypted, and encrypt selectively at least a portion of the previously unencrypted data. The present disclosure also generally relates to computer accessible mediums containing computer-executable instructions for data encryption upon execution of the instructions by a data processor. The instructions may configure the data processor to perform procedures that read the cache to identify data, determine whether the data is encrypted, and selectively encrypt data determined as unencrypted. | 11-11-2010 |
20100299481 | HIERARCHICAL READ-COMBINING LOCAL MEMORIES - The present disclosure relates to a system for hierarchical read-combining memory having a multicore processor operably coupled to a memory controller. The memory controller is configured for receiving a plurality of requests for data from one or more processing cores of the multicore processor, selectively holding a request for data from the plurality of requests for an undetermined or indefinite amount of time, and selectively combining a plurality of requests for the same data into a single read-combined data request. The present disclosure further relates to a method for hierarchical read-combining data requests of a multicore processor and a computer accessible medium having stored thereon computer executable instructions for performing a procedure for hierarchical read-combining data requests of a multicore processor. | 11-25-2010 |
20100321559 | CAMERA FLASH MITIGATION - Techniques are generally described for an image capture system that may include an image sensor, a flash for providing illumination, a data storage, and a processor operatively associated with the data storage. The processor may be adapted to execute computer implemented instructions to pre-store one or more image capture device characteristics in the data storage, acquire data in a pre-capture phase, model shadow effects based on either or both of the pre-stored data and the acquired data, modify one or more image capture device settings based on the modeled shadow effects, and record image data with the image sensor. Illumination may be provided substantially coincident with recording of the image data. | 12-23-2010 |
20110010455 | DYNAMIC COMPUTATION ALLOCATION - Techniques for dynamic computation allocation are disclosed. | 01-13-2011 |
20110013808 | TEXTURE SENSING - A device for modeling a texture is described. An example device may include a plurality of image sensors, a data storage, and a processor operatively associated with the data storage and adapted to execute computer implemented instructions to capture a set of images of a surface with one or more of the plurality of image sensors, analyze the set of captured images to determine one or more surface variables, and convert the analyzed set of captured images into a surface texture type based on the one or more surface variables. A method for modeling a surface texture using a hand-held device is also described. | 01-20-2011 |
20110040417 | Task Scheduling Based on Financial Impact - Times at which certain tasks are performed by a computer system, such as a data storage center, may be selected to reduce the cost of electrical energy in running the tasks. Tasks may be performed when the cost of electrical energy is relatively low. Alternatively, or in addition, tasks may be performed when there is a reduced call for air conditioning to cool the electronics of the computer system. | 02-17-2011 |
20110040603 | Telemetrics Based Location and Tracking - A population activity mapping method may include detecting a plurality of wireless mobile devices within a geographic region. Individual wireless mobile devices may include a processor, a user interface, a transmitter and a receiver. The detecting operation may be performed by use of a wireless access point, a GPS satellite, and/or a base station, and may be performed at at least two different points in time. Input data may be provided based upon the detecting operation. A distance and speed at which the mobile devices travel within the geographic region may be discerned dependent upon the input data. The discerning operation is performed by at least one processor of a computer network. A time and/or location at which salable output is to be made available and/or an amount of salable output to be made available may be determined dependent upon the discerning operation. | 02-17-2011 |
20110047333 | ALLOCATING PROCESSOR CORES WITH CACHE MEMORY ASSOCIATIVITY - Techniques are generally described related to a multi-core processor with a plurality of processor cores and a cache memory shared by at least some of the processor cores. The multi-core processor can be configured for separately allocating a respective level of cache memory associativity to each of the processing cores. | 02-24-2011 |
20110047351 | ROUTING IMAGE DATA ACROSS ON-CHIP NETWORKS - A network of switches may be adapted to route image data to one or more processor cores based on tags associated with data samples, where each tag includes at least one reference-space coordinate value. When image data is received by the network, the image data may be spatially transformed to a reference space, e.g., the physical space that is represented by the image data, to generate the data samples and each data sample may be tagged with a corresponding reference space coordinate value and routed through the network to one or more of the processors according to the tag. | 02-24-2011 |
20110055161 | Cloud Data Backup Storage - Techniques for cloud data backup are disclosed. Example methods may store backup data from a client computer on portions of data storage media associated with peer computers. In some example embodiments, a file may be encoded into segments using an error-tolerant encoding scheme, and the segments may be stored on peer computers. In some example embodiments, individual segments may be stored on more than one peer machine and/or an individual peer machine may not receive all of the segments associated with the file. | 03-03-2011 |
20110055603 | POWER MANAGEMENT FOR PROCESSOR - Techniques are generally described related to management of power consumption for a processor. One example method may include identifying a target operating constraint and a first operating parameter; determining a second operating parameter based on the target operating constraint and the first operating parameter; estimating an actual operating constraint; comparing the target operating constraint and the actual operating constraint; and setting up the first operating parameter and the second operating parameter of the processor based on a comparison of the target operating constraint and the actual operating constraint, wherein the target operating constraint is not a worst-case operating constraint. Other examples of methods, systems, and computer programs related to managing power consumption for a processor are also contemplated. | 03-03-2011 |
20110065354 | TACTILE INPUT INTERACTION - Interactive devices for detecting, characterizing, and acting upon tactile inputs are disclosed. An example embodiment may include a doll configured to produce audible outputs, visible outputs, and/or movement based at least in part upon its characterization of a tactile input. For example, the doll may characterize a tactile input as a slap, a tickle, a rub, a pinch, etc., and the doll may cry, smile, giggle, or move based upon its characterization of the tactile input. | 03-17-2011 |
20110066828 | MAPPING OF COMPUTER THREADS ONTO HETEROGENEOUS RESOURCES - Techniques are generally described for mapping a thread onto heterogeneous processor cores. Example techniques may include associating the thread with one or more predefined execution characteristic(s), assigning the thread to one or more heterogeneous processor core(s) based on the one or more predefined execution characteristic(s), and/or executing the thread by the respective assigned heterogeneous processor core(s). | 03-17-2011 |
20110066830 | CACHE PREFILL ON THREAD MIGRATION - Techniques for pre-filling a cache associated with a second core prior to migration of a thread from a first core to the second core are generally disclosed. The present disclosure contemplates that some computer systems may include a plurality of processor cores, and that some cores may have hardware capabilities different from other cores. In order to assign threads to appropriate cores, thread/core mapping may be utilized and, in some cases, a thread may be reassigned from one core to another core. In a probabilistic anticipation that a thread may be migrated from a first core to a second core, a cache associated with the second core may be pre-filled (e.g., may become filled with some data before the thread is rescheduled on the second core). Such a cache may be a local cache to the second core and/or an associated buffer cache, for example. | 03-17-2011 |
20110067029 | THREAD SHIFT: ALLOCATING THREADS TO CORES - Techniques are generally described for allocating a thread to heterogeneous processor cores. Example techniques may include monitoring real time computing data related to the heterogeneous processor cores processing the thread, allocating the thread to the heterogeneous processor cores based, at least in part, on the real time computing data, and/or executing the thread by the respective allocated heterogeneous processor core. | 03-17-2011 |
20110067105 | Operating System Sandbox - An operating system sandbox may include an operating system isolation module configured to restrict an operating system from transmitting machine-readable data and/or machine-readable instructions to an application, based on at least one predefined rule corresponding to abnormal operating system behavior. | 03-17-2011 |
20110138395 | THERMAL MANAGEMENT IN MULTI-CORE PROCESSOR - Techniques described herein generally relate to multi-core processors including two or more processor cores. Example embodiments may set forth devices, methods, and computer programs related to thermal management in the multi-core processor. Some example methods may include retrieving a first temperature reading for the first processor core during a scheduling interval, retrieving a second temperature reading for the second processor core also during the scheduling interval, and assigning a first task to the first processor core to be executed based on a comparison of the first temperature reading and the second temperature reading retrieved during the scheduling interval. | 06-09-2011 |
20110153984 | DYNAMIC VOLTAGE CHANGE FOR MULTI-CORE PROCESSING - Embodiments of the disclosure generally set forth techniques for supplying different voltage levels and clock signals to a processor core. One example method includes determining a first workload of a first processor core in the multi-core processor for performing a first computing task associated with a first image area and a first geometric mapping between the first computing task and the first processor core, selecting a first voltage level or a first clock signal having a first clock frequency for the first processor core based on the determined first workload, wherein the first voltage level is compatible with the selected first clock frequency, initiating a voltage change to the first processor core based on the selected first voltage level, and initiating a clock change to the first processor core based on the selected first clock signal having the first clock frequency. | 06-23-2011 |
20110154089 | PROCESSOR CORE CLOCK RATE SELECTION - Techniques described herein generally relate to multi-core processors including two or more processor cores. Example embodiments may set forth devices, methods, and computer programs related to calculating a clock rate for one or more of the processor cores in the multi-core processor. One example method may include determining a first estimated workload for a first processor core and a second estimated workload for a second processor core within a scheduling interval in a periodic scheduling environment. In addition, a first clock rate for the first processor core may be calculated based on one or more of the first estimated workload, a maximum clock rate supported by the multi-core processor and/or the scheduling interval. Similarly, a second clock rate for the second processor core may also be calculated based on one or more of the second estimated workload, the maximum clock rate, and/or the scheduling interval. | 06-23-2011 |
20110213991 | PROCESSOR CORE COMMUNICATION IN MULTI-CORE PROCESSOR - Embodiments of the disclosure generally set forth techniques for handling communication between processor cores. Some example multi-core processors include a first set of processor cores in a first region of the multi-core processor configured to dynamically receive a first supply voltage and a first clock signal, a second set of processor cores in a second region of the multi-core processor configured to dynamically receive a second supply voltage and a second clock signal, and an interface block coupled to the first set of processor cores and the second set of processor cores, wherein the interface block is configured to facilitate communications between the first set of processor cores and the second set of processor cores. | 09-01-2011 |
20120220888 | SNORING TREATMENT - Health-sensing and health-action devices and systems are generally described. The health-sensing device may include one or more of a sensor, a filter, and a transmitter. The sensor may be configured to sense one or more factors relating to an indicator of a health related condition or occurrence such as snoring and may include one or more microphone devices, accelerometers, and/or MEMs devices. The filter may be configured to evaluate a signal from the sensor and determine if the indicator has been detected. The transmitter may be arranged for initiating a transmission based on a signal from the filter. The health-action device may be configured for responding to an indicator of a health related condition or occurrence of a user and may include one or more of a receiver, a processor, and a responder. The health-action device may stimulate the user or may cancel the snoring sound. | 08-30-2012 |
20130151474 | Cloud Data Backup Storage - Techniques for cloud data backup are disclosed. Example methods may store backup data from a client computer on portions of data storage media associated with peer computers. In some example embodiments, a file may be encoded into segments using an error-tolerant encoding scheme, and the segments may be stored on peer computers. In some example embodiments, individual segments may be stored on more than one peer machine and/or an individual peer machine may not receive all of the segments associated with the file. | 06-13-2013 |
20140016026 | CAMERA FLASH MITIGATION - Techniques are generally described for an image capture system that may include an image sensor, a flash for providing illumination, a data storage, and a processor operatively associated with the data storage. The processor may be adapted to execute computer implemented instructions to pre-store one or more image capture device characteristics in the data storage, acquire data in a pre-capture phase, model shadow effects based on either or both of the pre-stored data and the acquired data, modify one or more image capture device settings based on the modeled shadow effects, and record image data with the image sensor. Illumination may be provided substantially coincident with recording of the image data. | 01-16-2014 |
20140018703 | MICROPHONE FOR REMOTE HEALTH SENSING - A health sensing device is described for placement on a user. The device may include a sensor, a filter, and a transmitter. The sensor is configured to sense one or more factors relating to an indicator of a health related condition or occurrence. The filter is configured to evaluate a signal from the sensor and determine if the indicator has been detected. The transmitter is arranged for initiating a transmission based on a signal from the filter. The sensor can include one or more microphone devices, accelerometers, and/or MEMs devices. A method of monitoring a user for a health related condition is also described. | 01-16-2014 |
20140188384 | TELEMETRICS BASED LOCATION AND TRACKING - A population activity mapping method may include detecting a plurality of wireless mobile devices within a geographic region. Individual wireless mobile devices may include a processor, a user interface, a transmitter and a receiver. The detecting operation may be performed by use of a wireless access point, a GPS satellite, and/or a base station, and may be performed at at least two different points in time. Input data may be provided based upon the detecting operation. A distance and speed at which the mobile devices travel within the geographic region may be discerned dependent upon the input data. The discerning operation is performed by at least one processor of a computer network. A time and/or location at which salable output is to be made available and/or an amount of salable output to be made available may be determined dependent upon the discerning operation. | 07-03-2014 |
20140250083 | CLOUD DATA BACKUP STORAGE MANAGER - Techniques for cloud data backup are disclosed. Example methods may store backup data from a client computer on portions of data storage media associated with peer computers. In some example embodiments, a file may be encoded into segments using an error-tolerant encoding scheme, and the segments may be stored on peer computers. In some example embodiments, individual segments may be stored on more than one peer machine and/or an individual peer machine may not receive all of the segments associated with the file. | 09-04-2014 |
20140258752 | POWER MANAGEMENT FOR PROCESSOR - Techniques are generally described related to management of power consumption for a processor. One example method may include identifying a target operating constraint and a first operating parameter; determining a second operating parameter based on the target operating constraint and the first operating parameter; estimating an actual operating constraint; comparing the target operating constraint and the actual operating constraint; and setting up the first operating parameter and the second operating parameter of the processor based on a comparison of the target operating constraint and the actual operating constraint, wherein the target operating constraint is not a worst-case operating constraint. Other examples of methods, systems, and computer programs related to managing power consumption for a processor are also contemplated. | 09-11-2014 |
20140281657 | PROCESSOR CORE CLOCK RATE SELECTION - Techniques described herein generally relate to multi-core processors including two or more processor cores. Example embodiments may set forth devices, methods, and computer programs related to calculating a clock rate for one or more of the processor cores in the multi-core processor. One example method may include determining a first estimated workload for a first processor core and a second estimated workload for a second processor core within a scheduling interval in a periodic scheduling environment. In addition, a first clock rate for the first processor core may be calculated based on one or more of the first estimated workload, a maximum clock rate supported by the multi-core processor and/or the scheduling interval. Similarly, a second clock rate for the second processor core may also be calculated based on one or more of the second estimated workload, the maximum clock rate, and/or the scheduling interval. | 09-18-2014 |
20140350842 | TRAFFIC FLOW MODEL TO PROVIDE TRAFFIC FLOW INFORMATION - Examples of maintaining or querying a traffic database to generate a traffic flow model to provide traffic flow information and determine a per-lane route for a vehicle to travel are disclosed. | 11-27-2014 |
20150033036 | SECURING BACKING STORAGE DATA PASSED THROUGH A NETWORK - Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing storage device are in encrypted form before that data is transferred to another device or over a network. In some examples, the methods, data processing devices and computer readable media may be arranged to encrypt the data passed to the network when the data stored in the backing storage device is in unencrypted form. Also disclosed are methods, data processing devices and computer readable media that identify when the data stored in the backing storage device is in unencrypted form, including methods that may detect that the data may appear to be in encrypted form as a result of the data being compressed. | 01-29-2015 |