Patent classifications
G06F9/45504
Accessing a migrated member in an updated type
Techniques for accessing a migrated method include: identifying a request to invoke a method defined by a type, the request including one or more arguments associated with respective argument types; identifying, in the type, an older version of the method associated with (a) a method name and (b) a first set of one or more parameter types, and a current version of the method associated with (a) the method name and (b) a second set of one or more parameter types; determining that the argument type(s) match(es) the first set of one or more parameter types; responsive to determining that the argument type(s) match(es) the first set of one or more parameter types: applying one or more conversion functions to convert the argument(s) to the second set of one or more parameter types; executing the current version of the method using the converted argument(s).
Optimizing neural network structures for embedded systems
A model training and implementation pipeline trains models for individual embedded systems. The pipeline iterates through multiple models and estimates the performance of the models. During a model generation stage, the pipeline translates the description of the model together with the model parameters into an intermediate representation in a language that is compatible with a virtual machine. The intermediate representation is agnostic or independent to the configuration of the target platform. During a model performance estimation stage, the pipeline evaluates the performance of the models without training the models. Based on the analysis of the performance of the untrained models, a subset of models is selected. The selected models are then trained and the performance of the trained models are analyzed. Based on the analysis of the performance of the trained models, a single model is selected for deployment to the target platform.
Virtualized hardware and methods for leveraging virtualized hardware with munition support software
An apparatus includes at least one memory configured to store a virtualization associated with a programming and test platform and a munition. The virtualization includes a virtual machine containing first software or firmware instructions associated with the programming and test platform and second software or firmware instructions that control behavior of the programming and test platform relative to the munition. The virtualization also includes a virtual representation of the munition. The virtualization further includes one or more virtual communication channels configured to communicatively couple the virtual machine and the virtual representation of the munition. The apparatus also includes at least one processor configured to execute the virtualization and simulate the programming and test platform and the munition on the apparatus.
System and Methods for Integration of an Application Runtime Environment Into a User Computing Environment
Systems and methods for creating application runtime environments or application environments that can be downloaded and integrated into the computing environment of a computing device are disclosed. One embodiment of the invention includes a computing device on which an operating system is installed that creates a computing environment, an Application Platform application, where the Application Platform application is at least partially natively implemented and creates an application runtime environment when executed by the computing device, and a cross-platform application, where the cross-platform application is configured to be executed within the application runtime environment and is not natively executable by the computing device. In addition, the Application Platform application is configured to integrate the cross-platform application into the computing environment of the computing device by providing at least one launch point for the cross-platform application within the computing environment.
SCALABLE, SECURE, EFFICIENT, AND ADAPTABLE DISTRIBUTED DIGITAL LEDGER TRANSACTION NETWORK
The present disclosure relates to systems, methods, and non-transitory computer readable storage media for implementing a scalable, secure, efficient, and adaptable distributed digital ledger transaction network. Indeed, the disclosed systems can reduce storage and processing requirements, improve security of implementing computing devices and underlying digital assets, accommodate a wide variety of different digital programs (or “smart contracts”), and scale to accommodate billions of users and associated digital transactions. For example, the disclosed systems can utilize a host of features that improve storage, account/address management, digital transaction execution, consensus, and synchronization processes. The disclosed systems can also utilize a new programming language that improves efficiency and security of the distributed digital ledger transaction network.
ADVANCED AGENT INSTRUMENTATION FOR OPENTELEMETRY IMPLEMENTATIONS
In one embodiment, a method herein comprises: intercepting runtime calls from a telemetry invocation for method entry to discover loaders; determining whether an implementation tenant is already allocated for a particular discovered loader; allocating, in response to no implementation tenant being already allocated for the particular discovered loader, a particular implementation tenant from a plurality of available implementation tenants, wherein a corresponding loader for the particular implementation tenant is set to delegate from the particular discovered loader; and calling, in response to the particular implementation tenant being allocated or being already allocated for the particular discovered loader, a method entry for the particular implementation tenant to perform an associated interception operation while using direct telemetry class and/or method calls.
UNIFIED PIPELINE FLOW WITH COMMON AND PHASE-SPECIFIC PATHS
Systems, methods, and other embodiments associated with associated with unified pipeline flow with common and phase-specific paths are described. In one embodiment, a method includes accepting, through a graphical user interface, a setting of a phase-specific link type for a link between nodes of a pipeline, wherein the phase-specific link type indicates that the link is associated with a particular phase; accepting, through the graphical user interface, a selection to execute the pipeline for the phase; parsing the pipeline to determine an execution set of nodes for execution in the phase based on the nodes being connected with links having either the link type or a default link type common to all phases; and executing the pipeline for the phase by executing the execution set of nodes, and not executing nodes not included in the set of nodes.
SYSTEM AND METHOD FOR SECURELY CONNECTING TO A PERIPHERAL DEVICE
A device connectable between a host computer and a computer peripheral over a standard bus interface is disclosed, used to improve security, and to detect and prevent malware operation. Messages passing between the host computer and the computer peripherals are intercepted and analyzed based on pre-configured criteria, and legitimate messages transparently pass through the device, while suspected messages are blocked. The device communicates with the host computer and the computer peripheral using proprietary or industry standard protocol or bus, which may be based on a point-to-point serial communication such as USB or SATA. The messages may be stored in the device for future analysis, and may be blocked based on current or past analysis of the messages. The device may serve as a VPN client and securely communicate with a VPN server using the host Internet connection.
SCALABLE, SECURE, EFFICIENT, AND ADAPTABLE DISTRIBUTED DIGITAL LEDGER TRANSACTION NETWORK
The present disclosure relates to systems, methods, and non-transitory computer readable storage media for implementing a scalable, secure, efficient, and adaptable distributed digital ledger transaction network. Indeed, the disclosed systems can reduce storage and processing requirements, improve security of implementing computing devices and underlying digital assets, accommodate a wide variety of different digital programs (or “smart contracts”), and scale to accommodate billions of users and associated digital transactions. For example, the disclosed systems can utilize a host of features that improve storage, account/address management, digital transaction execution, consensus, and synchronization processes. The disclosed systems can also utilize a new programming language that improves efficiency and security of the distributed digital ledger transaction network.
SYSTEM AND METHOD FOR VALIDATING A POWER CYCLE FOR AN EMULATED PCIe BASED STORAGE DEVICE
A system for validating a power cycle for an emulated Peripheral Component Interconnect express (PCIe) storage device, the system including: an emulating and virtualizing unit hosting a virtual machine; a PCIe bridge device; and emulated PCIe storage devices, wherein the PCIe bridge device: receives a bridge register value that indicates a “Power ON” or “Power OFF” condition; receives a request from the virtual machine to perform actions corresponding to the bridge register value; detects a condition associated with the bridge register value; performs the actions corresponding to the detected condition on the emulated PCIe storage devices to emulate the “Power ON” or “Power OFF” condition for the emulated PCIe storage devices; and validates a power cycle of the emulated PCIe storage devices based on a pre-stored vendor value and a corresponding pre-stored condition for the emulated “Power ON” or “Power OFF” condition for the emulated PCIe storage devices.