Patent classifications
G06F9/544
SIDE-CHANNEL PROTECTION
In various examples there is a computing device in communication with at least one other computing device via a communications network. The computing device has a memory and a central processing unit having a trusted execution environment comprising trusted regions of the memory. The computing device has an operating system configured to create a memory mapping between a virtual address space of the memory and a memory of the at least one other computing device and to provide details of the memory mapping to the trusted execution environment. The trusted execution environment is configured to execute an application which is able to communicate with the other computing device directly using the memory mapping provided by the operating system.
SEAMLESS ACCESS TO A COMMON PHYSICAL DISK IN AN AMP SYSTEM WITHOUT AN EXTERNAL HYPERVISOR
The present disclosure is directed to seamless access to a common physical disk in an AMP system without an external hypervisor, and includes one or more processors and one or more computer-readable non-transitory storage media comprising instructions that, when executed by the one or more processors, cause one or more components of the system to perform operations including instantiating, by a first instance, a second instance during a system upgrade, creating, in the first instance, a first disk abstraction for a block device of a physical disk, and attaching the block device under the first disk abstraction. The operations further include providing the second instance network-based access to the physical disk using the first disk abstraction of the first instance during the system upgrade.
MATRIX MULTIPLICATION AND ACCUMULATION OPERATIONS ON COMPRESSED MATRICES
Apparatuses, systems, and techniques to perform an operation to indicate one or more non-zero values within one or more matrices of data; to perform an API to compress one or more matrices of data; to perform a matrix multiply accumulate (MMA) operation on two or more matrices of data, wherein at least one of the two or more matrices contain compressed data; and/or to perform an API to decompress one or more matrices of data. In at least one embodiment, one or more circuits are configured to receive and compile one or more instructions to perform computational operations for a sparse matrix multiplication.
APPLICATION PROGRAMMING INTERFACE TO COMPRESS DATA
Apparatuses, systems, and techniques to perform an operation to indicate one or more non-zero values within one or more matrices of data; to perform an API to compress one or more matrices of data; to perform a matrix multiply accumulate (MMA) operation on two or more matrices of data, wherein at least one of the two or more matrices contain compressed data; and/or to perform an API to decompress one or more matrices of data. In at least one embodiment, one or more circuits are configured to receive and compile one or more instructions to perform computational operations for a sparse matrix multiplication.
PERFORMING MATRIX VALUE INDICATION
Apparatuses, systems, and techniques to perform an operation to indicate one or more non-zero values within one or more matrices of data; to perform an API to compress one or more matrices of data; to perform a matrix multiply accumulate (MMA) operation on two or more matrices of data, wherein at least one of the two or more matrices contain compressed data; and/or to perform an API to decompress one or more matrices of data. In at least one embodiment, one or more circuits are configured to receive and compile one or more instructions to perform computational operations for a sparse matrix multiplication.
Computer-based systems configured for automated computer script analysis and malware detection and methods thereof
Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.
APPLICATION PROGRAMMING INTERFACE TO INDICATE INCREASED RESOURCE USAGE
Apparatuses, systems, and techniques to cause usage of information by a computer program to be increased based, at least in part, on one or more data structures used to monitor use of the information. In at least one embodiment, usage of information by a computer program is caused to be increased based, at least in part, on one or more data structures used to monitor use of the information based on, for example, CUDA or other parallel computing platform code.
APPLICATION PROGRAMMING INTERFACE TO MONITOR RESOURCE USAGE
Apparatuses, systems, and techniques to generate one or more data structures to be used to monitor use of information by a computer program. In at least one embodiment, one or more data structures to be used to monitor use of information by a computer program are generated, based on, for example, CUDA or other parallel computing platform code.
APPLICATION PROGRAMMING INTERFACE TO IDENTIFY SHARABLE MEMORY
Apparatuses, systems, and techniques to execute one or more application programming interface (API) functions to facilitate parallel computing. In at least one embodiment, one or more APIs are to indicate whether one or more storage locations can be shared during performance of software using various novel techniques described herein.
Devices, Methods, and Graphical User Interfaces for Automatically Providing Shared Content to Applications
A computer system receives, by a messaging application, information identifying a first shared content item as shared content. The first shared content item is of a first type. In response to receiving the information identifying the first shared content item as shared content and in accordance with a determination that a first application of the plurality of applications can open content of the first type, in accordance with a determination that providing the information identifying the first shared content item as shared content to the first application has been authorized, computer system device automatically makes the first shared content item available within the first application, and in accordance with a determination that providing information identifying the first shared content item as shared content to the first application has not been authorized, the computer system does not make the first shared content item automatically available within the first application.