G06F9/00

HARDWARE SUPPORT FOR MEMORY SAFETY WITH AN OVERFLOW TABLE

A method, system and apparatus for protecting from out of bounds memory references, including establishing a threshold number of active objects for examination for an out of bounds memory reference, determining whether a number of active objects for an application exceeds the threshold, and when the number of active objects exceeds the threshold, storing at least part of information about the active objects in an overflow table in a memory.

Operation defense method and device, apparatus, and computer-readable storage medium

An operation defense method and device, apparatus and computer-readable storage medium are provided. The method includes: receiving an operation request from a business system through a shared interface; according to a parameter carried in the operation request, selecting at least one risk evaluation algorithm for the operation request from an algorithm rule library shared by a plurality of service systems; performing risk evaluation to the operation request with the selected risk evaluation algorithm; and according to a risk evaluation result, determining to allow the operation request. In the present application, a centralized operation defense mechanism is used to analyze the operation requests from different service systems and to select an appropriate risk evaluation algorithm to calculate the risk coefficient of each operation request, so that an operation with a high risk can be prevented, and a diffusion range of an abnormality can be reduced.

Systems and methods for allocating and managing resources in an internet of things environment using location based focus of attention

A system for managing clouds of edge devices as an Infrastructure as a Service clouds includes an application server, a location based situational awareness subsystem and a cloud management subsystem. The cloud management subsystem includes a first API through which the application server makes request to the location based situational awareness subsystem and a conductor that searches for the optimal deployment of cloud resources that meet a set of constraints. A second API for managing and deploying applications on a selected set of the plurality of network connected devices. The system also includes a compute node that can interact with the selected set of the plurality of network connected devices to launch and manage containers on the selected set of the plurality of network connected devices.

Systems and methods for allocating and managing resources in an internet of things environment using location based focus of attention

A system for managing clouds of edge devices as an Infrastructure as a Service clouds includes an application server, a location based situational awareness subsystem and a cloud management subsystem. The cloud management subsystem includes a first API through which the application server makes request to the location based situational awareness subsystem and a conductor that searches for the optimal deployment of cloud resources that meet a set of constraints. A second API for managing and deploying applications on a selected set of the plurality of network connected devices. The system also includes a compute node that can interact with the selected set of the plurality of network connected devices to launch and manage containers on the selected set of the plurality of network connected devices.

Container image building using shared resources
11599348 · 2023-03-07 · ·

Container image building using shared resources is disclosed. A first instruction file that contains a first plurality of instruction keywords is read. Based on the first plurality of instruction keywords, a first plurality of files from a shared location is copied to a first consolidated location. Based on the first plurality of instruction keywords, a first container command file that references at least some of the first plurality of files on the first consolidated location is generated, the first container command file including commands that comply with a container builder syntax.

Container image building using shared resources
11599348 · 2023-03-07 · ·

Container image building using shared resources is disclosed. A first instruction file that contains a first plurality of instruction keywords is read. Based on the first plurality of instruction keywords, a first plurality of files from a shared location is copied to a first consolidated location. Based on the first plurality of instruction keywords, a first container command file that references at least some of the first plurality of files on the first consolidated location is generated, the first container command file including commands that comply with a container builder syntax.

Device with data processing engine array that enables partial reconfiguration

A device may include a processor system and an array of data processing engines (DPEs) communicatively coupled to the processor system. Each of the DPEs includes a core and a DPE interconnect. The processor system is configured to transmit configuration data to the array of DPEs, and each of the DPEs is independently configurable based on the configuration data received at the respective DPE via the DPE interconnect of the respective DPE. The array of DPEs enable, without modifying operation of a first kernel of a first subset of the DPEs of the array of DPEs, reconfiguration of a second subset of the DPEs of the array of DPEs.

Artificial reality system with multi-stage boot process

Techniques are described for improving security of a boot sequence of a system, such as an artificial reality system. In some examples, a method includes configuring, by a boot sequencing system, attack detection circuitry based on configuration information accessed from a first storage device; after configuring the attack detection circuitry, starting, by the boot sequencing system, a root of trust processor to initiate a boot sequence; enabling access, by the root of trust processor during the boot sequence, to secret information stored in a second storage device.

Method for an internal command of a first processing core with memory sub-system that caching identifiers for access commands
11474885 · 2022-10-18 · ·

Methods, systems, and devices for caching identifiers for access commands are described. A memory sub-system can receive an access command to perform an access operation on a transfer unit of the memory sub-system. The memory sub-system can store an identifier associated with the access command in a memory component and can generate an internal command using a first core of the memory sub-system. In some embodiments, the memory sub-system can store the identifier in a shared memory that is accessible by the first core and can issue the internal command to perform the access operation on the memory sub-system.

Sharing image installation image streams

A technique includes a first compute node of a cluster of nodes receiving a communication from a cluster maintenance node of the cluster instructing the first compute node to provide an installation image that is received by the first compute node to a second compute node of the cluster. The first node and the second node are peers. The technique includes sharing the first installation stream that communicates the image to the first compute node. Sharing the first installation stream includes, while the first compute node is receiving the first installation stream, the first compute node providing a second installation stream to communicate parts of the image received via the first installation stream to the second compute node.