scispace - formally typeset
Search or ask a question

Showing papers by "Amazon.com published in 2011"


Journal ArticleDOI
TL;DR: VL2 is a practical network architecture that scales to support huge data centers with uniform high capacity between servers, performance isolation between services, and Ethernet layer-2 semantics and can be deployed today, and a working prototype is built.
Abstract: To be agile and cost effective, data centers must allow dynamic resource allocation across large server pools. In particular, the data center network should provide a simple flat abstraction: it should be able to take any set of servers anywhere in the data center and give them the illusion that they are plugged into a physically separate, noninterfering Ethernet switch with as many ports as the service needs. To meet this goal, we present VL2, a practical network architecture that scales to support huge data centers with uniform high capacity between servers, performance isolation between services, and Ethernet layer-2 semantics. VL2 uses (1) flat addressing to allow service instances to be placed anywhere in the network, (2) Valiant Load Balancing to spread traffic uniformly across network paths, and (3) end system--based address resolution to scale to large server pools without introducing complexity to the network control plane. VL2's design is driven by detailed measurements of traffic and fault data from a large operational cloud service provider. VL2's implementation leverages proven network technologies, already available at low cost in high-speed hardware implementations, to build a scalable and reliable network architecture. As a result, VL2 networks can be deployed today, and we have built a working prototype. We evaluate the merits of the VL2 design using measurement, analysis, and experiments. Our VL2 prototype shuffles 2.7 TB of data among 75 servers in 395 s---sustaining a rate that is 94% of the maximum possible.

981 citations


Journal ArticleDOI
TL;DR: The broad distribution of activity observed and the unprecedented case of anaerobic growth using PUR as the sole carbon source suggest that endophytes are a promising source of biodiversity from which to screen for metabolic properties useful for bioremediation.
Abstract: Bioremediation is an important approach to waste reduction that relies on biological processes to break down a variety of pollutants. This is made possible by the vast metabolic diversity of the microbial world. To explore this diversity for the breakdown of plastic, we screened several dozen endophytic fungi for their ability to degrade the synthetic polymer polyester polyurethane (PUR). Several organisms demonstrated the ability to efficiently degrade PUR in both solid and liquid suspensions. Particularly robust activity was observed among several isolates in the genus Pestalotiopsis, although it was not a universal feature of this genus. Two Pestalotiopsis microspora isolates were uniquely able to grow on PUR as the sole carbon source under both aerobic and anaerobic conditions. Molecular characterization of this activity suggests that a serine hydrolase is responsible for degradation of PUR. The broad distribution of activity observed and the unprecedented case of anaerobic growth using PUR as the sole carbon source suggest that endophytes are a promising source of biodiversity from which to screen for metabolic properties useful for bioremediation.

383 citations


Patent
17 Mar 2011
TL;DR: In this article, a transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers.
Abstract: Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user's location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.

333 citations


Patent
09 Dec 2011
TL;DR: In this article, a power management system for a lighting circuit may include a grid shifting controller that includes a processor and a connection to an external power source, and a communication interface associated with the controller.
Abstract: A power management system for a lighting circuit may include a grid shifting controller that includes a processor and a connection to an external power source. The power management system may also include a communication interface associated with the grid shifting controller. The grid shifting controller may be configured to provide control information to a processor of at least one grid shifting electrical fixture over the communication interface, the control information being configured to direct the at least one grid shifting electrical fixture on the use of power from the external power source and an energy storage device associated with the at least one grid shifting electrical fixture.

327 citations


Patent
21 Apr 2011
TL;DR: In this paper, the authors describe techniques for providing managed virtual computer networks that may have a configured logical network topology with one or more virtual networking devices, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the networking devices if they were physically present.
Abstract: Techniques are described for providing managed virtual computer networks that may have a configured logical network topology with one or more virtual networking devices, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the networking devices if they were physically present. In some situations, the emulating of networking device functionality includes receiving routing communications directed to the networking devices and using included routing information to update the configured network topology for the managed computer network. In addition, the techniques may further include supporting interactions with devices that are external to the virtual computer network, including remote physical networking devices that are part of a remote computer network configured to interoperate with the virtual computer network, and/or specialized network devices that are accessible via a substrate network on which the virtual computer network is overlaid.

282 citations


Patent
30 Jun 2011
TL;DR: In this article, a client computing device requests a remote persistent browsing context instance at a network computing provider, which is maintained at the network computing providers subsequent to the user ending his interaction with the browser application at the client device.
Abstract: A remote browsing process is directed to the generation and management of a remote persistent browsing context at a network computing provider. A client computing device requests a remote persistent browsing context instance at a network computing provider. The network computing provider provides processing results corresponding to processed representations of requested content to the client computing device. The persistent browsing context may be maintained at the network computing provider subsequent to the user ending his interaction with the browser application at the client device. A client computing device may subsequently request access to the persistent browsing context maintained at the network computing and storage device.

242 citations


Journal ArticleDOI
TL;DR: This paper describes a framework that is built using Hadoop to store and retrieve large numbers of RDF triples by exploiting the cloud computing paradigm and shows that this framework is scalable and efficient and can handle large amounts of R DF data, unlike traditional approaches.
Abstract: Semantic web is an emerging area to augment human reasoning. Various technologies are being developed in this arena which have been standardized by the World Wide Web Consortium (W3C). One such standard is the Resource Description Framework (RDF). Semantic web technologies can be utilized to build efficient and scalable systems for Cloud Computing. With the explosion of semantic web technologies, large RDF graphs are common place. This poses significant challenges for the storage and retrieval of RDF graphs. Current frameworks do not scale for large RDF graphs and as a result do not address these challenges. In this paper, we describe a framework that we built using Hadoop to store and retrieve large numbers of RDF triples by exploiting the cloud computing paradigm. We describe a scheme to store RDF data in Hadoop Distributed File System. More than one Hadoop job (the smallest unit of execution in Hadoop) may be needed to answer a query because a single triple pattern in a query cannot simultaneously take part in more than one join in a single Hadoop job. To determine the jobs, we present an algorithm to generate query plan, whose worst case cost is bounded, based on a greedy approach to answer a SPARQL Protocol and RDF Query Language (SPARQL) query. We use Hadoop's MapReduce framework to answer the queries. Our results show that we can store large RDF graphs in Hadoop clusters built with cheap commodity class hardware. Furthermore, we show that our framework is scalable and efficient and can handle large amounts of RDF data, unlike traditional approaches.

225 citations


Journal ArticleDOI
TL;DR: Serial qPCR is useful for leishmania detection and species determination and for absolute quantification when compared to a standard curve from the same Leishmania species.
Abstract: The invention provides a method for determining the presence, species, and/or quantity of Leishmania in a sample.

167 citations


Patent
15 Aug 2011
TL;DR: In this paper, a system and a method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided, where a processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource.
Abstract: A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a set of service providers for alternatively hosting, processing, and/or transmitting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative set(s) of service providers. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of service providers with respect to specific resource requests are also provided.

159 citations


Patent
25 Feb 2011
TL;DR: In this article, a hosted mobile management service is provided for enabling a user to access a centralized account through a web browser on a terminal in order to manage the user's media information, such as digital music and photos.
Abstract: A hosted mobile management service is provided for enabling a user to access a centralized account through a web browser on a terminal in order to manage the user's media information, such as digital music and photos. Any modifications made by user through the web browser are transparently sent to the user's mobile device where a thin client application receives such modification information and interacts with the mobile device's file system to reconcile such modifications.

154 citations


Patent
26 Sep 2011
TL;DR: In this paper, a system, methods, and interfaces for managing request routing functionality associated with resource requests for one or more resources associated with a content provider is presented, which can correspond to the processing of domain name service (DNS) requests for resources by computing devices and the resolution of the DNS requests by the identification of a network address of a computing device that will provide the requested resources.
Abstract: A system, methods, and interfaces for managing request routing functionality associated with resource requests for one or more resources associated with a content provider. The request routing functionality can correspond to the processing of domain name service (“DNS”) requests for resources by computing devices and the resolution of the DNS requests by the identification of a network address of a computing device that will provide the requested resources. Unlike traditional CDN service provider implementation, the processing of resource requests by the service provider is separate from the delivery of the content by the content provider (or on behalf of the content provider).

Patent
08 Sep 2011
TL;DR: In this paper, a code for accessing a resource having a customer account associated therewith is presented via a secondary device, and authentication data indicative of the code that was presented is received from a primary device.
Abstract: A code for accessing a resource having a customer account associated therewith is presented via a secondary device, and authentication data indicative of the code that was presented is received from a primary device. The primary device is identified as a trusted device associated with the customer account responsive to receiving the authentication data therefrom, and the secondary device is authenticated for access to the resource responsive to identification of the primary device as the trusted device associated with the customer account.

Patent
Ahamed A. Kannanari1
09 Nov 2011
TL;DR: In this article, a user may request a payment token from a host, which is a unique one-time use identifier linked to one or more payment accounts associated with the user.
Abstract: A user may request a payment token from a host. The payment token may be a unique one-time use identifier linked to one or more payment accounts associated with the user. The payment token may be subject to conditions of use. To redeem the payment token, the user device may generate an image code to visually present the payment token for access by a recipient's camera. The recipient may then record the image code. The user may also provide a security identifier to the recipient. The recipient may then transmit the image code and the security identifier to the host as a payment request. The host may verify the payment request and verify compliance with any associated conditions. When the payment token is valid, funds are available, and the conditions are satisfied, then the host may transfer the funds to an account of the recipient.

Patent
28 Nov 2011
TL;DR: In this article, multiple microphone arrays of different physical sizes are used to acquire signals for spatial tracking of one or more sound sources within the augmented reality environment, and accuracy of the spatial location is improved by selecting different sized arrays.
Abstract: An augmented reality environment allows interaction between virtual and real objects. Multiple microphone arrays of different physical sizes are used to acquire signals for spatial tracking of one or more sound sources within the environment. A first array with a larger size may be used to track an object beyond a threshold distance, while a second array having a size smaller than the first may be used to track the object up to the threshold distance. By selecting different sized arrays, accuracy of the spatial location is improved.

Journal ArticleDOI
TL;DR: Scientific literature sources provide evidence for the mosquito repellency of many of the EOs and individual chemical components found in EOs used in patented repellent inventions.
Abstract: Bites Bites of mosquitoes belonging to the genera Anopheles Meigen, Aedes Meigen, Culex L. and Haemagogus L. are a general nuisance and are responsible for the transmission of important tropical diseases such as malaria, hemorrhagic dengue and yellow fevers and filariasis (elephantiasis). Plants are traditional sources of mosquito repelling essential oils (EOs), glyceridic oils and repellent and synergistic chemicals. A Chemical Abstracts search on mosquito repellent inventions containing plant-derived EOs revealed 144 active patents mostly from Asia. Chinese, Japanese and Korean language patents and those of India (in English) accounted for roughly 3/4 of all patents. Since 1998 patents on EO-containing mosquito repellent inventions have almost doubled about every 4 years. In general, these patents describe repellent compositions for use in topical agents, cosmetic products, incense, fumigants, indoor and outdoor sprays, fibers, textiles among other applications. 67 EOs and 9 glyceridic oils were individually cited in at least 2 patents. Over 1/2 of all patents named just one EO. Citronella [Cymbopogon nardus (L.) Rendle, C.winterianus Jowitt ex Bor] and eucalyptus (Eucalyptus LʼHer. spp.) EOs were each cited in approximately 1/3 of all patents. Camphor [Cinnamomum camphora (L.) J. Presl], cinnamon (Cinnamomum zeylanicum Blume), clove [Syzygium aromaticum (L.) Merr. & L.M. Perry], geranium (Pelargonium graveolens LʼHer.), lavender (Lavandula angustifolia Mill.), lemon [Citrus × limon (L.) Osbeck], lemongrass [Cymbopogon citratus (DC.) Stapf] and peppermint (Mentha × piperita L.) EOs were each cited in > 10% of patents. Repellent chemicals present in EO compositions or added as pure “natural” ingredients such as geraniol, limonene, p-menthane-3,8-diol, nepetalactone and vanillin were described in approximately 40% of all patents. About 25% of EO-containing inventions included or were made to be used with synthetic insect control agents having mosquito repellent properties such as pyrethroids, N,N-diethyl-m-toluamide (DEET), (±)-p-menthane-3,8-diol (PMD) and dialkyl phthalates. Synergistic effects involving one or more EOs and synthetic and/or natural components were claimed in about 10% of all patents. Scientific literature sources provide evidence for the mosquito repellency of many of the EOs and individual chemical components found in EOs used in patented repellent inventions.

Journal ArticleDOI
TL;DR: The goal of this work is to understand the underlying reason why PCA is effective for modeling lung motion and find the optimal number of PCA coefficients for accurate lung motion modeling and propose a new method to derive the entire lung motion using a single internal marker based on the PCA model.
Abstract: Respiration-induced organ motion is one of the major uncertainties in lung cancer radiotherapy and is crucial to be able to accurately model the lung motion. Most work so far has focused on the study of the motion of a single point (usually the tumor center of mass), and much less work has been done to model the motion of the entire lung. Inspired by the work of Zhang et al (2007 Med. Phys. 34 4772–81), we believe that the spatiotemporal relationship of the entire lung motion can be accurately modeled based on principle component analysis (PCA) and then a sparse subset of the entire lung, such as an implanted marker, can be used to drive the motion of the entire lung (including the tumor). The goal of this work is twofold. First, we aim to understand the underlying reason why PCA is effective for modeling lung motion and find the optimal number of PCA coefficients for accurate lung motion modeling. We attempt to address the above important problems both in a theoretical framework and in the context of real clinical data. Second, we propose a new method to derive the entire lung motion using a single internal marker based on the PCA model. The main results of this work are as follows. We derived an important property which reveals the implicit regularization imposed by the PCA model. We then studied the model using two mathematical respiratory phantoms and 11 clinical 4DCT scans for eight lung cancer patients. For the mathematical phantoms with cosine and an even power (2n) of cosine motion, we proved that 2 and 2n PCA coefficients and eigenvectors will completely represent the lung motion, respectively. Moreover, for the cosine phantom, we derived the equivalence conditions for the PCA motion model and the physiological 5D lung motion model (Low et al 2005 Int. J. Radiat. Oncol. Biol. Phys. 63 921–9). For the clinical 4DCT data, we demonstrated the modeling power and generalization performance of the PCA model. The average 3D modeling error using PCA was within 1 mm (0.7 ± 0.1 mm). When a single artificial internal marker was used to derive the lung motion, the average 3D error was found to be within 2 mm (1.8 ± 0.3 mm) through comprehensive statistical analysis. The optimal number of PCA coefficients needs to be determined on a patient-by-patient basis and two PCA coefficients seem to be sufficient for accurate modeling of the lung motion for most patients. In conclusion, we have presented thorough theoretical analysis and clinical validation of the PCA lung motion model. The feasibility of deriving the entire lung motion using a single marker has also been demonstrated on clinical data using a simulation approach.

Patent
19 Dec 2011
TL;DR: In this paper, the authors describe a denial of service attack mitigation strategy that is applied to portions of the network traffic received at the one or more locations of a DDoS attack.
Abstract: Systems and methods protect against denial of service attacks. Remotely originated network traffic addressed to one or more network destinations is routed through one or more locations. One or more of the locations may be geographically proximate to a source of a denial of service attack. One or more denial of service attack mitigation strategies is applied to portions of the network traffic received at the one or more locations. Network traffic not blocked pursuant to the one or more denial of service attack mitigation strategies is dispatched to its intended recipient. Dispatching the unblocked network traffic to its intended recipient may include the use of one or more private channels and/or one or more additional denial of service attack mitigation strategies.

Patent
09 Mar 2011
TL;DR: In this paper, the authors describe systems and associated processes for generating recommendations for users based on usage, among other things, in the context of an interactive computing system that enables users to download applications for mobile devices (such as phones) or for other computing devices.
Abstract: This disclosure describes systems and associated processes for generating recommendations for users based on usage, among other things. These systems and processes are described in the context of an interactive computing system that enables users to download applications for mobile devices (such as phones) or for other computing devices. Users' interactions with applications once they are downloaded can be observed and tracked, with such usage data being collected and provided to the interactive computing system. The interactive computing system can include a recommendation system or service that processes the usage data from a plurality of users to detect usage patterns. Using these usage patterns, among possibly other data, the recommendation system can recommend applications to users for download.

Patent
27 Jun 2011
TL;DR: In this article, a content provider generates a network topology having one or more subnetworks made up of content sources and then distributes the content such that for each identified subnetwork, each content segment is distributed to a content source.
Abstract: A system and method for content distribution are provided. A content provider generates a network topology having one or more subnetworks made up of content sources. The content provider segments content, such as applications, into segments for distribution. The content provider then distributes the content such that for each identified subnetwork, each content segment is distributed to a content source. Subsequent, client computing device requests for content can be serviced by selecting a content source in a particular subnetwork selected for delivering the requested content to the client computing device to minimize traffic flow of the requested content through the nodes of the distribution network.

Patent
21 Sep 2011
TL;DR: In this paper, a user can purchase rights to content in any format, such that as new formats emerge or the user upgrades to devices with enhanced capabilities, the user can receive the improved formats automatically without having to repurchase the content.
Abstract: Intelligent content delivery enables content to be delivered to different devices in formats appropriate for those devices based on the capabilities of those devices. A user might access the same piece of content on two different devices, and can automatically receive a higher quality format on a device capable of playing that higher quality format. The user can purchase rights to content in any format, such that as new formats emerge or the user upgrades to devices with enhanced capabilities, the user can receive the improved formats automatically without having to repurchase the content. Further, the user can pause and resume content between devices even when those devices utilize different formats, and can access content on devices not otherwise associated with the user, receiving content in formats that are appropriate for those unknown devices even if the user has not previously accessed content in those formats.

Patent
15 Dec 2011
TL;DR: In this article, a user device determines an orientation of the user device, and selects one of multiple antennas to use as a first transmit antenna based on the orientation of user device and transmits information using the first transmitter antenna.
Abstract: Methods and systems for selecting one of a plurality of antennas to be used as a transmit antenna based on an orientation of a user device are described. A user device determines an orientation of the user device, and selects one of multiple antennas to use as a first transmit antenna based on the orientation of the user device. The user device transmits information using the first transmit antenna.

Patent
22 Mar 2011
TL;DR: In this paper, a computer system that provides services to clients may adaptively throttle incoming service requests in order to reach and then maintain operation at an ideal request rate, which is defined as a maximum rate at which incoming requests can be serviced such that client-specified quality of service (QoS) expectations are met for most or all incoming requests.
Abstract: A computer system that provides services to clients may adaptively throttle incoming service requests in order to reach and then maintain operation at an ideal request rate. An ideal request rate may be a maximum rate at which incoming service requests can be serviced such that client-specified quality of service (QoS) expectations are met for most or all incoming service requests, or a rate within a range of rates defined by that maximum rate. Determining whether the system is operating at an ideal request rate may include determining the minimum difference between the expected and actual QoS for a group of recently serviced requests. The system may gradually modify a throttle multiplier value in order to reach or maintain an ideal request rate. Maintaining operation at an ideal request rate may allow the system to avoid entering an overloaded state, and/or oscillating between an overloaded state and a non-overloaded state.

Patent
09 Mar 2011
TL;DR: In this paper, the authors describe systems and associated processes for generating recommendations for users based on usage, among other things, in the context of an interactive computing system that enables users to download applications for mobile devices (such as phones) or for other computing devices.
Abstract: This disclosure describes systems and associated processes for generating recommendations for users based on usage, among other things. These systems and processes are described in the context of an interactive computing system that enables users to download applications for mobile devices (such as phones) or for other computing devices. Users' interactions with applications once they are downloaded can be observed and tracked, with such usage data being collected and provided to the interactive computing system. The interactive computing system can include a recommendation system or service that processes the usage data from a plurality of users to detect usage patterns. Using these usage patterns, among possibly other data, such as data about related users' applications, the recommendation system can recommend applications to users for download.

Patent
Nicholas J. Lynch1
16 Jun 2011
TL;DR: In this paper, a request queue includes requests from customers for computing resources to be allocated to individual ones of the customers based at least in part on requested availability times, device parameters, and at least one allocation rule.
Abstract: Disclosed are various embodiments related to the fulfillment of requests for computing capacity. In one embodiment, a request queue includes requests from customers for computing resources to be allocated. Individual ones of the computing resources are allocated to individual ones of the customers based at least in part on requested availability times, device parameters, and at least one allocation rule. Another request for allocating a computing resource for a first customer is added to the request queue. At least one computing resource from a second customer is reallocated to the first customer in response to the other request.

Proceedings ArticleDOI
07 May 2011
TL;DR: It is argued that tools like this can educate and empower consumers by making broadband speeds and sources of slow-downs more visible, and design implications for future tools are provided.
Abstract: With widespread broadband adoption, more households report experiencing sub-optimal speeds. Not only are slow speeds frustrating, they may indicate consumers are not receiving the services they are paying for from their internet service providers. Yet, determining the speed and source of slow-downs is difficult because few tools exist for broadband management. We report on results of a field trial with 10 households using a visual network probe designed to address these problems. We describe the results of the study and provide design implications for future tools. More importantly, we argue that tools like this can educate and empower consumers by making broadband speeds and sources of slow-downs more visible.

Patent
22 Sep 2011
TL;DR: In this paper, the location of an electronic device can be tracked and updated in order to provide a user of the device accurate directions from the user's current location to a target location, for various types of environments.
Abstract: The location of an electronic device can be tracked and updated in order to provide a user of the device accurate directions from the user's current location to a target location, for various types of environments. Upon detecting a trigger (e.g., detecting a QR code or detecting an access point signal), an example device can switch from using a first type of positioning element (e.g., GPS) to a second type of positioning element (e.g., using accelerometers, QR codes, etc.) in determining the user's current location. By using the appropriate type of positioning element for each environment, the device may determine the user's current location more accurately. The device may provide an overlay (e.g., arrows) for displaying the directions over images captured from the user's surroundings to provide a more realistic and intuitive experience for the user.

Book ChapterDOI
Jinesh Varia1
03 Jan 2011
TL;DR: This chapter is targeted toward cloud architects who are gearing up to move an enterprise-class application from a fixed physical environment to a virtualized cloud environment and discusses some unprecedented concepts that have emerged due to the dynamic nature of the cloud.
Abstract: For several years, software architects have discovered and implemented several concepts and best practices to build highly scalable applications. In today’s “era of tera,” these concepts are even more applicable because of ever-growing datasets, unpredictable traffic patterns, and the demand for faster response times. This chapter will reinforce and reiterate some of these traditional concepts and discuss how they may evolve in the context of cloud computing. It will also discuss some unprecedented concepts, such as elasticity, that have emerged due to the dynamic nature of the cloud. This chapter is targeted toward cloud architects who are gearing up to move an enterprise-class application from a fixed physical environment to a virtualized cloud environment. The focus of this chapter is to highlight concepts, principles, and best practices in creating new cloud applications or migrating existing applications to the cloud.

Patent
17 Nov 2011
TL;DR: In this article, a system, method, and computer readable medium for managing registration, by a content broker, of one or more resources with one or multiple service providers is provided. But the content broker does not have the ability to manage the registration of the resources with the service provider.
Abstract: A system, method, and computer readable medium for managing registration, by a content broker, of one or more resources with one or more service providers are provided. A content broker obtains registration information for registering the one or more resources with a service provider. The registration information may include a request to publish one or more resources to a service provider, an identification of the one or more resources, service provider selection criteria provided by the content provider or otherwise selected, and the like. The content broker transmits a service provider generation request corresponding to the registration information to the service provider. Then, the content broker manages and processes data pursuant to registration of the one or more resources with the service provider.

Patent
10 Jan 2011
TL;DR: In this paper, techniques for managing execution of programs, including using excess program execution capacity of one or more computing systems, are described, where a private pool of excess computing capacity may be maintained for a user based on unused dedicated program execution capacities allocated for that user, with the private pool being available for priority use by that user.
Abstract: Techniques are described for managing execution of programs, including using excess program execution capacity of one or more computing systems For example, a private pool of excess computing capacity may be maintained for a user based on unused dedicated program execution capacity allocated for that user, with the private pool of excess capacity being available for priority use by that user Such private excess capacity pools may further in some embodiments be provided in addition to a general, non-private excess computing capacity pool that is available for use by multiple users, optionally including users who are associated with the private excess capacity pools In some such situations, excess computing capacity may be made available to execute programs on a temporary basis, such that the programs executing using the excess capacity may be terminated at any time if other preferred use for the excess capacity arises

Patent
13 May 2011
TL;DR: In this paper, a full 360° scan is performed using at least one image capture element to locate a primary direction to a user of the device, and a smaller range (e.g., 45°) centered around that direction can be used to capture, analyze, or provide information for the user.
Abstract: The amount of resources needed for an electronic device to track and/or interact with a user is reduced by utilizing a predicted relative position of that user. In some embodiments, a full 360° scan is performed using at least one image capture element to locate a primary direction to a user of the device. Once this direction is determined, a smaller range (e.g., 45°) centered around that direction can be used to capture, analyze, or provide information for the user. As the user moves, the determined direction is updated and the range adjusted accordingly. If the user moves outside the range, the device can increase the size of the range until the user is located, and the range can again be decreased around the determined direction. Such approaches limit the amount of image or audio information that must be captured and/or analyzed to track the relative position of a user.