Patent classifications
G06F9/448
Cloud computing platform that executes third-party code in a distributed cloud computing network
A compute server receives a request from a client device that triggers execution of a third-party code piece. The compute server is one of multiple compute servers that are part of a distributed cloud computing network. The request may be an HTTP request and directed to a zone. A single process at the compute server executes the third-party code piece in an isolated execution environment. The single process is also executing other third-party code pieces in other isolated execution environments respectively. A response is generated to the request based at least in part on the executed third-party code piece, and the generated response is transmitted to the client device.
Method and Apparatus for Codifying User Experience Designs and Managing the Codified User Experirence Designs
Designers create user experience designs using external design systems. An Experience Design Codification and Management System (EDCMS) retrieves a user experience definition based on the user experience design from the external design system, and generates a comprehensive user experience specification from the user experience definition. Part of the comprehensive user experience specification includes JSON, XML, or YAML code created based on the user experience definition. The EDCMS then packages and encodes the comprehensive user experience specification to create a codified user experience from the comprehensive user experience specification. The codified user experience is then versioned and digitally signed, and the versioned and signed codified user experience is stored in a user experience design repository.
High-speed broadside communications and control system
A real-time computational device includes a programmable real-time processor, a communications input port which is connected to the programmable real-time processor through a first broadside interface, and a communications output port which is connected to the programmable real-time processor through a second broadside interface. Both broadside interfaces enable 1024 bits of data to be transferred across each of the broadside interfaces in a single clock cycle of the programmable real-time processor.
High-speed broadside communications and control system
A real-time computational device includes a programmable real-time processor, a communications input port which is connected to the programmable real-time processor through a first broadside interface, and a communications output port which is connected to the programmable real-time processor through a second broadside interface. Both broadside interfaces enable 1024 bits of data to be transferred across each of the broadside interfaces in a single clock cycle of the programmable real-time processor.
METHOD FOR STARTING A SYSTEM-ON-A-CHIP WITHOUT READ ONLY MEMORY, SYSTEM ON-A-CHIP WITHOUT READ ONLY MEMORY AND HEADPHONE
A method for starting a system-on-a-chip, SoC, without read only memory, ROM, comprises the steps of receiving, by a processor comprised by the SoC, a reset signal, monitoring, by a monitoring component comprised by the SoC, a connection between the processor and at least a non-volatile memory, both comprised by the SoC, upon occurrence of a first read access of the processor to the non-volatile memory via the connection checking, by the monitoring component, whether a data value returned in response to the first read access via the connection conforms to a pre-set value, and if the returned data value differs from the pre-set value, stopping, by the monitoring component, operation of the processor.
Updating An Edge Node of a Process Control System
A method, edge node application investigator, computer program and computer program product for for updating an edge node of a process control system using an information model for the edge node, where the information model representing the edge node as an object to which one or more application objects are linked, which application objects represent applications that are provided for being run by the edge node as well as to a process control system including such an edge node application investigator. The edge node application investigator compares applications of the edge node with the application objects in the information model and changes the applications of the edge node, if there is a deviation between the applications of the edge node and the application objects of the information model, so that the applications of the edge node correspond to the application objects of the information model.
LOCK FREE HIGH THROUGHPUT RESOURCE STREAMING
Methods, systems and apparatuses may provide for technology that conducts, via a plurality of concurrent threads, transfers of graphics resources into and out of graphics memory, wherein the transfers bypass lock operations between the plurality of concurrent threads, generates frames based on the graphics resources in the graphics memory, and streams the frames to a display. In one example, the transfers also bypass explicit wait operations for the graphics resources to be fully resident in the graphics memory.
Object-Oriented Memory for Client-to-Client Communications
Systems and corresponding methods employ an object-oriented (OO) memory (OOM) to effect inter-hardware-client (IHC) communication among a plurality of hardware clients included in same. A system comprises a centralized OOM and the plurality of hardware clients communicate, directly, to the centralized OOM device via OO message transactions. The centralized OOM device effects IHC communication among the plurality of hardware clients based on the OO message transactions. Another system comprises a plurality of OO memories (OOMs) capable of inter-object-oriented-memory-device communication. A hardware client communicates, directly, to a respective OOM device via OO message transactions. The inter-object-oriented-memory-device communication effects IHC communication among the plurality of hardware clients based on the OO message transactions.
Malware detection in memory
A system for detecting malware includes a processor to collect processor trace information corresponding to an application being executed by the processor (202). The processor can also detect an invalid indirect branch instruction from the processor trace information (204) and detect at least one malware instruction being executed by the application in response to analyzing modified memory values corresponding to the invalid indirect branch (206). Additionally, the processor can block the application from accessing or modifying memory (208).
Malware detection in memory
A system for detecting malware includes a processor to collect processor trace information corresponding to an application being executed by the processor (202). The processor can also detect an invalid indirect branch instruction from the processor trace information (204) and detect at least one malware instruction being executed by the application in response to analyzing modified memory values corresponding to the invalid indirect branch (206). Additionally, the processor can block the application from accessing or modifying memory (208).