Abstract:
Technologies are generally described for systems, methods and devices configured to monitor a performance of a resource of a device. In some examples, a processor may receive an application code. The application code may include at least one application thread configured to implement at least one task for the application code. The application code may be configured to spawn a performance thread. The processor may execute the application thread on the computing device. The application thread may be configured to use at least one resource of the computing device. The processor may further execute the performance thread on the computing device. The performance thread may be configured to calculate a value relating to the resource.
Abstract:
Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack.
Abstract:
Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value.
Abstract:
Methods and systems for detecting analytes using a sensor element having a cleaning cycle and renewable liquid material with an affinity for the analytes are described. An analyte detection system may include a controller in communication with a sensor element and a liquid dispensing assembly. The liquid dispensing assembly, such as an inkjet dispensing device, may deposit the liquid material on or adjacent to the sensor element. The controller may be operative to monitor at least one property associated with the liquid material deposited on the sensor element. In addition, the controller may be configured to generate at least one control signal based on the at least one property. The liquid dispensing assembly may be configured to deposit the at least one liquid material on the sensor element based on the at least one control signal.
Abstract:
Technologies are generally described for concurrent activation of multiple illumination sources to analyze a sample. A controller may be configured to activate the illumination sources substantially simultaneously, where a current or voltage of each activated illumination source is modulated at a different frequency by respective circuit drivers of the controller. Each activated illumination source may be configured to illuminate the sample with light at a different emission wavelength, and one or more detectors may be configured to detect a composite signal from the sample in response to the illumination. The composite signal may include multiple returned signals, where each returned signal corresponds to light emitted from one of the activated illumination sources at a respective emission wavelength. One or more filters, each associated with a respective modulation frequency of one activated illumination source, may be configured to extract each returned signal from the composite signal for analysis.
Abstract:
Techniques described herein generally relate to generating an audio signal with a speaker. In some examples, a speaker device is described that includes a membrane and a shutter. The membrane can be configured to oscillate along a first directional path and at a first frequency effective to generate an ultrasonic acoustic signal. The shutter can be positioned about the membrane and configured to modulate the ultrasonic acoustic signal such that an audio signal can be generated.
Abstract:
Techniques described herein generally include methods and systems related to a MEMS-based audio speaker system configured for generating an audio signal. The speaker system includes one or more apertures in the speaker system positioned to receive the ultrasonic carrier signal and one or more movable and over-sized obstruction elements that are configured to modulate the ultrasonic carrier signal and thereby generate an audio signal. Because the movable obstruction elements are configured to overlap one or more edges of the apertures when in the closed position, modulation depth of the generated audio signal can be substantially improved or otherwise varied.
Abstract:
Technologies are generally described to establish a hardware interconnect based communication between SSD controllers. According to some examples, a first solid state drive (SSD) controller and a second SSD controller are detected. The hardware interconnect is detected between the first SSD controller and the second SSD controller. Next, a communication connection between the first SSD controller and the second SSD controller is established through the hardware interconnect. The first SSD controller may be allowed to manage a flash controller of the second SSD controller for tasks that include a deduplication task and a low level redundant array of independent disks (RAID) task.
Abstract:
Technologies are generally described to coordinate group members that may be at distinct locations and optionally moving in distinct directions to meet at a coordinated meeting point and/or to move in a common direction. A coordinated meeting point may optimize a parameter of interest for each of the group members or group as a whole. Example parameters may include distance, time, fuel usage, remaining resource levels, a network coverage, and group members' patience, mood, and/or tiredness factors. In some examples, a controller may determine the meeting point that minimizes a parameter of interest for the group members or whole group, where the meeting point may be stationary or dynamic. The controller may map the calculated meeting point to a geographical location, and may determine an optimal or preferred route from each group member to the meeting point to gather the group members together optimizing for a particular parameter of interest.
Abstract:
Technologies are generally described for systems, methods and devices effective to analyze a file. In some examples, a processor may receive the file. The file may include content and instructions. The content may include data executable by a browser. The processor may analyze the instructions. The processor may identify an internet protocol (IP) address in the instructions based on the analysis. The processor may compare the identified IP address with a list of IP addresses associated with an attack. The processor may generate an alert based on the comparison.