Patent classifications
G06F9/30003
Spoofing a processor identification instruction
Embodiments of processors, methods, and systems for a processor core supporting processor identification instruction spoofing are described. In an embodiment, a processor includes an instruction decoder and processor identification instruction spoofing logic. The processor identification spoofing logic is to respond to a processor identification instruction by reporting processor identification information from a processor identification spoofing data structure. The processor identification spoofing data structure is to include processor identification information of one or more other processors.
OPTICAL CAMERA POSITIONING TOOL
A system and method may be used to position or orient a camera within a surgical field. A method may include generating a graphical user interface including a first set of instructions to reposition the camera, and determining whether the camera is within a target volume location. The method may include automatically outputting an indication when the camera is within the target volume location. The method may include outputting a second set of instructions for display on the graphical user interface to align a laser, coupled to or integrated into the camera, to the tracker by changing an angle of the camera
KEY VALUE STORAGE DEVICE WITH HASHING
A system and method for storing data. In some embodiments, the method includes: receiving, by a persistent key-value storage device including a hash for mapping keys to value addresses, a first instruction, the first instruction being an instruction for accessing a first key, in a first key-value collection; and recording the first instruction in an instruction log of the persistent key-value storage device.
Testing and remediating compliance controls
Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.
SYSTEM COMMAND PROCESSING
Techniques for routing a user command to a speechlet and resolving conflicts between potential speechlets are described. A system determines an intent of an input command. The system also receives context information associated with the input command. The system determines speechlets (e.g., speechlets and/or skills) that may execute with respect to the input command given the intent and the context data. The system then determines whether conditions of routing rules, associated with the speechlets, are satisfied given the context data. If the conditions of only one routing rule are satisfied, the system causes the speechlet associated with the routing rule to execute with respect to the input command. If the conditions of more than one routing rule are satisfied, the system may determine a speechlet to execute with respect to the input command based on the speechlets' priorities in a list of speechlets and/or based on potential output data provided by the speechlets.
Optical camera positioning tool
A system and method may be used to position or orient a camera within a surgical field. A method may include generating a graphical user interface including a first set of instructions to reposition the camera, and determining whether the camera is within a target volume location. The method may include automatically outputting an indication when the camera is within the target volume location. The method may include outputting a second set of instructions for display on the graphical user interface to align a laser, coupled to or integrated into the camera, to the tracker by changing an angle of the camera.
Extended asynchronous data mover functions compatibility indication
A method is provided that is executable by a processor of a computer. Note that the processor is communicatively coupled to a memory of the computer, and the memory stores a response block of a call command. In implementing the method, the processor defines a sub-functions field in the response block of the call command. Further the processor indicates that a set of functions of a set of instructions are installed and available at an interface based on a corresponding sub-functions flag within the sub-functions field being set. Note that the interface is also being executed on the computer and that the set of functions being represented by the corresponding sub-functions flag. The processor further indicates that the set of functions of the set of instructions are not installed based on the corresponding sub-functions flag not being set.
TESTING AND REMEDIATING COMPLIANCE CONTROLS
Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.
Waveform generation using end-to-end text-to-waveform system
Described herein are embodiments of an end-to-end text-to-speech (TTS) system with parallel wave generation. In one or more embodiments, a Gaussian inverse autoregressive flow is distilled from an autoregressive WaveNet by minimizing a novel regularized Kullback-Leibler (KL) divergence between their highly-peaked output distributions. Embodiments of the methodology computes the KL divergence in a closed-form, which simplifies the training process and provides very efficient distillation. Embodiments of a novel text-to-wave neural architecture for speech synthesis are also described, which are fully convolutional and enable fast end-to-end training from scratch. These embodiments significantly outperform the previous pipeline that connects a text-to-spectrogram model to a separately trained WaveNet. Also, a parallel waveform synthesizer embodiment conditioned on the hidden representation in an embodiment of this end-to-end model were successfully distilled.
Techniques for removing bound target substances during dialysis
Systems, methods, and/or apparatuses may be operative to perform a dialysis process that includes a displacer infusion process. The dialysis machine may include at least one processor and a memory coupled to the at least one processor, the memory comprising instructions that, when executed by the processor, may cause the at least one processor to access dialysis information for a dialysis process performed by a dialysis machine, the dialysis information indicating a target substance to be displaced from a binding compound by a displacer, and determine an infusion profile for infusing the displacer into a patient during a displacer infusion process of the dialysis process, the infusion profile determined based on the dialysis information and an infusion constraint. Other embodiments are described.