G06F9/544

PARALLEL PROCESSING OF THREAD GROUPS

Apparatuses, systems, and techniques to facilitate parallel processing. In at least one embodiment, an application programming interface allows a user to define a plurality of cooperative thread groups, and launch multiple cooperative thread groups in parallel provided sufficient processing resources are available.

PERCEPTION PROCESSING WITH MULTI-LEVEL ADAPTIVE DATA PROCESSING FLOW RATE CONTROL
20230093511 · 2023-03-23 ·

A perception processing system includes a memory and a main controller. The main controller includes modules and implements a data processing pipeline including algorithm stages, which are executed in parallel relative to sets of data and are executed sequentially relative to each of the sets of data. The algorithm stages share resources of the modules and the memory to process the sets of data and generate perception information. One of the modules executes global and local controllers. The global controller sets a processing rate for the local controllers. The local controllers monitor current processing rates of the algorithm stages. When one of the current processing rates is less than the set processing rate, the corresponding one of the local controllers sends a first signal to the global controller and in response the global controller sends a broadcast signal to the local controllers to adjust the current processing rates.

SYSTEMS AND METHODS FOR ESTABLISHING AND MANAGING FAST DATA CHANNELS AMONG MODERN WORKSPACES

Systems and methods for establishing and managing fast data channels among modern workspaces are described. In an embodiment, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: detect access by a first workspace and a second workspace to an IHS resource, and establish a fast data channel between the first and second workspaces, at least in part, based upon context information.

SYSTEM AND METHOD FOR AUTOMATIC DISCOVERY OF CANDIDATE APPLICATION PROGRAMMING INTERFACES AND DEPENDENCIES TO BE PUBLISHED

Disclosed herein are system, method, and computer program product embodiments for automatically discovering an API for publishing within a data repository. A discovery tool is used either on a server computer or a customer computer to examine the files stored in the data repository. A search of the repository is conducted to identify root API files that form the basis of an API. A first examination is conducted in which the files are examined for common indicia associated with known API standards. Then a second examination is done of the root API candidates found in the first examination to identify which of the root API candidates is actually a root API. Once the root API has been located, it is executed in a computer environment, and its dependents are detected. Once all the necessary API files have been located, they are packaged and automatically published.

Efficient streaming based lazily-evaluated machine learning framework

Methods, systems, and computer products are herein provided for lazy evaluation of input data by a machine learning (ML) framework. An ML pipeline receives input data and compiles a chain of operators into a chain of dataviews configured for lazy evaluation of the input data. Each dataview in the chain represents a computation over data as a non-materialized view of the data. The ML pipeline receives a request for column data and selects a chain of delegates comprising one or more delegates for one or more dataviews in the chain to fulfill the request. The ML pipeline processes the input data with the selected chain of delegates. The ML pipeline performs delegate chaining on a dataview. A feature value for a feature column of the dataview is determined based on the delegate chaining and provided to an ML algorithm to predict column data.

Computing device compatible encryption and decryption
11610010 · 2023-03-21 · ·

A method and apparatus encrypting data for use by an application includes receiving a first clear data in a security application running concurrently with the application. The security application encrypts the first clear data to generate a first encrypted package and distributes the encrypted package for use by the application or by other applications running concurrently with the application. The security application also receives and decrypts encrypted packages from the application or one of the other applications to provide clear data for use by the application. The security application may be implemented as a data entry utility that can be accessed directly by the application.

REAL-TIME SCHEDULING FOR A HETEROGENEOUS MULTI-CORE SYSTEM
20220342702 · 2022-10-27 ·

A heterogeneous multi-core system that executes a real-time system for an automobile includes a plurality of system-on chips in electronic communication with one another. Each system-on-chip includes a plurality of central processing units (CPUs) arranged into a plurality of logical domains. The heterogeneous multi-core system also includes a plurality of scheduled tasks that are executed based on an execution pipeline and each execute a specific set of tasks for one of the logical domains. The plurality of scheduled tasks includes at least one offset scheduled task that is executed at an offset time and a reference scheduled task located at an execution stage upstream in the execution pipeline relative to the offset scheduled task. The reference scheduled task communicates data to the offset scheduled task and the offset time represents a period of time measured relative to the reference scheduled task.

SECURE DEVSECOPS PIPELINE WITH TASK SIGNING
20220342679 · 2022-10-27 ·

An approach is disclosed that selects a current processing element from a set of processing elements included in a software pipeline. A selected input data to the current processing element was an output data from a previously executed processing element. The input data is verified by computing a current fingerprint of the selected input data and comparing the computed fingerprint to an expected fingerprint. The expected fingerprint was previously computed after the output data was generated by the previously executed processing element. In response to the comparing revealing that the current fingerprint fails to match the expected fingerprint, a verification error is indicated to a user of the process.

SELF-HEALING FOR DATA PROTECTION SYSTEMS USING AUTOMATIC MACRO RECORDING AND PLAYBACK

Embodiments for executing selected remediation scripts to remedy issues in a data storage system through an API/script recorder component or process that presents a DVR (digital video recorder)-like interface and capability to capture scripts and API calls as they are used when navigating a graphical user interface (GUI). Internal components of this function perform the recording and macro creation to allow constant playback of these recorded and selected scripts. By easily generating and managing scripts macros, system administrators can easily re-execute customer workflows to apply known fixes to current issues in the data storage system.

ACCESS CONTROL CONFIGURATIONS FOR SHARED MEMORY
20220342573 · 2022-10-27 ·

Methods, systems, and devices for access control configurations for inter-processor communications are described to support reconfiguration of a dynamic access control configuration at a device. The configuration may support additional configuration fields that may be added to existing access control rules of the device. A processor of the device may request creation of a new shared memory resource, using a subregion of an existing memory resource, where the additional fields may indicate a parent memory resource for the new memory resource. The additional fields may also include a value which may indicate a processor which has write permission for a respective memory region of the shared memory, where other processors of the device may be prevented from writing to the memory region. The additional fields may further indicate a chain of delegation, or a history, of which processors have been assigned the exclusive write permission for the respective memory region.