H03M7/3084

TECHNOLOGIES FOR COORDINATING DISAGGREGATED ACCELERATOR DEVICE RESOURCES

A compute device to manage workflow to disaggregated computing resources is provided. The compute device comprises a compute engine receive a workload processing request, the workload processing request defined by at least one request parameter, determine at least one accelerator device capable of processing a workload in accordance with the at least one request parameter, transmit a workload to the at least one accelerator device, receive a work product produced by the at least one accelerator device from the workload, and provide the work product to an application.

Technologies for data center multi-zone cabling

Technologies for connecting data cables in a data center are disclosed. In the illustrative embodiment, racks of the data center are grouped into different zones based on the distance from the racks in a given zone to a network switch. All of the racks in a given zone are connected to the network switch using data cables of the same length. In some embodiments, certain physical resources such as storage may be placed in racks that are in zones closer to the network switch and therefore use shorter data cables with lower latency. An orchestrator server may, in some embodiments, schedule workloads or create virtual servers based on the different zones and corresponding latency of different physical resources.

Low data rate broadcast using low earth orbit (LEO) satellites

A system is disclosed for providing low data rate broadcast services. Different types of broadcast packets are detected among data packets received an external network. The different types broadcast packets contain different a different broadcast content. When a particular type of broadcast packet is detected, a transmit data rate is selected and Walsh codes are assigned for achieving the transmit data rate. Data packets corresponding to the broadcast packets are compressed, and at least one RLC block containing the compressed data packets is created. The RLC blocks are transmitted from a satellite using the assigned Walsh codes.

DETECTION OF MATCHING DATASETS USING ENCODE VALUES
20210365344 · 2021-11-25 ·

Techniques are disclosed relating to detecting matching datasets using encode values. In various embodiments, a data monitoring system may perform encoding operations on a first dataset to generate a first encode value that corresponds to a particular one of one or more fields included in the first dataset. The data monitoring system may then determine whether the first dataset matches a previously analyzed dataset. For example, in some embodiments, data monitoring system may compare the first encode value to a previous encode value that corresponds to a second field of the previously analyzed dataset. Based on this comparison, the data monitoring system may generate an output value that is indicative of a similarity between the first encode value and the previous encode value. The data monitoring system may then determine whether the first dataset matches the previously analyzed dataset based on this output value.

Techniques to configure physical compute resources for workloads via circuit switching

Embodiments are generally directed apparatuses, methods, techniques and so forth to select two or more processing units of the plurality of processing units to process a workload, and configure a circuit switch to link the two or more processing units to process the workload, the two or more processing units each linked to each other via paths of communication and the circuit switch.

Pooling blocks for erasure coding write groups

A technique provides efficient data protection, such as erasure coding, for data blocks of volumes served by storage nodes of a cluster. Data blocks associated with write requests of unpredictable client workload patterns may be compressed. A set of the compressed data blocks may be selected to form a write group and an erasure code may be applied to the group to algorithmically generate one or more encoded blocks in addition to the data blocks. Due to the unpredictability of the data workload patterns, the compressed data blocks may have varying sizes. A pool of the various-sized compressed data blocks may be established and maintained from which the data blocks of the write group are selected. Establishment and maintenance of the pool enables selection of compressed data blocks that are substantially close to the same size and, thus, that require minimal padding.

Automatic hash function selection

Compressing data includes hashing a first token length of an incoming data steam into a hash table, where the first token length includes a plurality of bytes. A second token length of the incoming data stream may be hashed into the hash table. The second token may be larger than the first token length and includes the plurality of bytes. The method may further include automatically comparing which token length enabled more efficient data compression, and automatically adjusting at least one of the first and second token lengths based on the comparison.

ADAPTIVE NANOPORE SIGNAL COMPRESSION
20220005549 · 2022-01-06 ·

Techniques described herein relate to systems and methods for parallel DNA molecules sequencing. A preprocessor can receive raw data frames from a sensor chip including 100,000 or more cells, where each raw data frame can include detection signals from the 100,000 or more cells at a given time during the formation of the 100,000 or more cells or during the DNA molecules sequencing using the 100,000 or more cells. The preprocessor can then extract relevant information for determining states of the cells from the raw data frames, generate one or more digested frames that includes the extracted information, and send the digested frames to a processor for processing, such as base determination. Because the number of digested frames sent to the processor is less than a number of the raw data frames and the digested frames include preprocessed data, the amount of data being transferred to the processor and the amount of data processing by the processor can be reduced.

APPARATUS AND METHOD FOR TWO-STAGE LOSSLESS DATA COMPRESSION, AND TWO-STAGE LOSSLESS DATA DECOMPRESSION

A lossless data compressor of an aspect includes a first lossless data compressor circuitry coupled to receive input data. The first lossless data compressor circuitry is to apply a first lossless data compression approach to compress the input data to generate intermediate compressed data. The apparatus also includes a second lossless data compressor circuitry coupled with the first lossless data compressor circuitry to receive the intermediate compressed data. The second lossless data compressor circuitry is to apply a second lossless data compression approach to compress at least some of the intermediate compressed data to generate compressed data. The second lossless data compression approach different than the first lossless data compression approach. Lossless data decompressors are also disclosed, as are methods of lossless data compression and decompression.

Malicious communication log detection device, malicious communication log detection method, and malicious communication log detection program

A malicious communication log detection device compresses first character strings representing characteristics of a communication log that is known to be malicious or benign, and second character strings obtained by coupling the first character strings with a character string representing a characteristic of a target communication log. The malicious communication log detection device calculates a score for determining whether the target communication log is malicious or benign based on a data size of the compressed first character strings and a data size of the compressed second character strings. The malicious communication log detection device determines whether the target communication log is malicious or benign based on the calculated score and a predetermined parameter.