G06F15/17306

User experience/user interface based on interaction history

In one embodiment, a method includes accessing a base user experience (UX) including a user interface (UI) corresponding to one or more features of a computing system; determining one or more user categories based at least in part on previous interactions with the UI by a number of users; classifying, using a machine-learning algorithm, a particular user into one or more of the user categories based at least in part on current interactions of the particular user with the UI; and determining, relative to the base UX, one or more modifications to the UI based at least in part on the classification of the particular user into one or more of the user categories. The modifications to the UI modify one or more features of the UX. The method also includes applying the modifications to the UI; and providing the UI as modified for display to the particular user.

Systems and methods for using resources in a networked computing environment
10474624 · 2019-11-12 · ·

Methods and systems for a networked computing system are provided. One method includes generating, based on a first topology, a first proxy endpoint by a first device of a first pluggable compute module; establishing a communication tunnel between the first proxy endpoint and a non-volatile memory express (NVMe) storage device for peer-to-peer communication between the first proxy endpoint of the first device and a controller of the NVMe storage device. An NVMe translation module receives a request for the NVMe storage device from the first proxy endpoint and the NVMe translation module translates the request to an NVMe request for the NVMe storage device for accessing storage space at the NVMe storage device. The method further includes de-allocating the first proxy endpoint, when the first topology is deactivated making the first pluggable compute module and the NVMe storage device available for a second topology.

Chiplet system and positioning method thereof

A chiplet system and a positioning method thereof are provided. The positioning method of the chiplet system includes the following steps. Two end chiplets and a plurality of middle chiplets are classified. A quantity calculation packet is transmitted and accumulated from each of the end chiplets towards another end to analyze a quantity of middle chiplets. A serial number comparison packet is transmitted and accumulated from each of the middle chiplets connected to one of the end chiplets towards another end to set a starting point. An identify number setting packet is transmitted and accumulated from the middle chiplet set as the starting point towards another end to set a positioning number of each of the middle chiplets.

Inferential user matching system

Systems and methods of inferential user matching include inferring an interest in matching between the first user and the second user based at least in part on a first profile of a first user and a second profile of a second user. Based at least in part on the inferred interest in matching, the systems and methods match the first user and the second user for a service, and transmit (i) a first representation of the first user to a portable device of the second user, and (ii) a second representation of the second user to a portable device of the first user.

Method for managing the operation of a system on chip, and corresponding system on chip

System on a chip, comprising several master pieces of equipment, several slave resources, an interconnection circuit capable of routing transactions between master pieces of equipment and slave resources, and a processing unit at least configured to allow a user of the system on a chip to implement within the system on a chip at least one configuration diagram of this system defined by a set of configuration pieces of information including at least one piece of identification information assigned to each master piece of equipment, The identification pieces of information are intended to be attached to all the transactions emitted by the corresponding master pieces of equipment, the set of configuration pieces of information not being used for addressing the slave resources receiving the transactions and being used to define an assignment of at least one piece of master equipment to at least some of the slave resources.

METHOD FOR MANAGING TRANSACTIONS ROUTING BETWEEN SOURCE EQUIPMENT AND TARGET EQUIPMENT

A system on chip includes an interconnect circuit having an input interface and a number of output interfaces. A source device is coupled to the input interface. A target device includes a sectorized addressable memory space and a number of access ports respectively coupled to the output interfaces. The source device is configured to deliver a transaction containing an address word to the target device.

SYSTEMS AND METHODS FOR USING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT
20190286611 · 2019-09-19 · ·

Methods and systems for a networked computing system are provided. One method includes generating, based on a first topology, a first proxy endpoint by a first device of a first pluggable compute module; establishing a communication tunnel between the first proxy endpoint and a non-volatile memory express (NVMe) storage device for peer-to-peer communication between the first proxy endpoint of the first device and a controller of the NVMe storage device. An NVMe translation module receives a request for the NVMe storage device from the first proxy endpoint and the NVMe translation module translates the request to an NVMe request for the NVMe storage device for accessing storage space at the NVMe storage device. The method further includes de-allocating the first proxy endpoint, when the first topology is deactivated making the first pluggable compute module and the NVMe storage device available for a second topology.

Systems and methods for using resources in a networked computing environment
10318476 · 2019-06-11 · ·

Methods and systems for a networked computing system are provided. One method includes generating a first proxy endpoint by a non-transparent bridge (NTB) of a first pluggable compute module and a second proxy endpoint at a second pluggable module having a second NTB, based on a user defined topology; establishing a transaction layer packet (TLP) tunnel between the first proxy endpoint and the second proxy endpoint for peer to peer communication using a first stub endpoint of the first NTB and a second stub endpoint of the second NTB; and de-allocating the first proxy endpoint and the second proxy endpoint, when the topology is deactivated such that the first pluggable compute module and the second pluggable module are available for another user defined topology.

FACILITATING RESOURCE FREQUENCY MANAGEMENT FOR EMERGENCY RESPONSE
20190174556 · 2019-06-06 ·

Systems and techniques facilitating resource frequency management are provided. An apparatus comprises: a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations comprise: receiving information indicative of an emergency condition in a defined area; and transmitting a command to a network device for the defined area to cause the base station device to send a communication for the emergency condition via a first wireless communication channel with a mobile device of mobile devices associated with a subscriber identity of respective subscriber identities assigned to provide a response to the emergency condition.

COMMUNICATION CONTROLLER, COMMUNICATION METHOD, AND SYSTEM ON A CHIP
20190163663 · 2019-05-30 ·

An optimized communication technique is provided. A transaction capability table records a first value representing practical transaction capability of a source module for transmitting a communication transaction to a destination module. Exchange of transaction capability regarding the destination module between the source module and at least one neighboring source module is taken into account in the first value. The source control logic circuit manages the transaction capability table and controls the source module to transmit a communication transaction to the destination module based on the first value recorded in the transaction capability table.