Abstract:
In one embodiment, a method includes determining real-time location information for a transportation item. The method further includes determining real-time route information for a plurality of vehicles, the plurality of vehicles comprising a vehicle-in-transit actively transporting the transportation item. In addition, the method includes analyzing, via the real-time location information and the real-time route information, a route efficiency of the plurality of vehicles relative to an intended destination of the transportation item. Further, the method includes selecting a replacement vehicle from among the plurality of vehicles based, at least in part, on a result of the analyzing. Additionally, the method includes initiating physical transfer of the transportation item from the vehicle-in-transit to the replacement vehicle.
Abstract:
Systems and techniques to reduce bandwidth usage of video frames in a videoconferencing system are described. A computing device may receive a first frame of a first video stream from an imaging device and decompose the frame into a plurality of portions. The computing device may select a first portion of the plurality of portions, determine that the first portion matches a sent portion in a sent catalog, determine a first identifier associated with the first portion, and send the first identifier to a server. The computing device may select a second portion of the plurality of portions, determine that the second portion fails to match any of the sent portions in the sent catalog, create and associate a second identifier with the second portion, store the second portion with the second identifier in the sent catalog, and send the second portion to the server.
Abstract:
In one embodiment, a method is performed by a computer system. The method includes receiving a trigger to setup a target resource for remote control at a management system, wherein an operating system of the target resource enforces a transactional installation process for new software, wherein the operating system designates user-writable storage. The method further includes, responsive to the trigger, retrieving prerequisite client-side software of the management system. In addition, the method includes creating a remote connection to the target resource using an encrypted network protocol. Further, the method includes copying, via the remote connection, the prerequisite client-side software to the user-writable storage. Moreover, the method includes causing the copied prerequisite client-side software to be installed in the user-writable storage of the target resource, thereby bypassing the transactional installation process of the operating system of the target resource.
Abstract:
Systems and techniques to dynamically correct a gaze of participants in a video conference are described. A computing device participating in a video conference may determine that a frame of a video stream includes features of a face, extract a portion of the frame that includes a first pair of eyes, and determine that the first pair of eyes are looking in a non-forward direction. The computing device may retrieve, from a database, a stored portion that includes a second pair of eyes that are looking in a forward direction, and modify the frame by substituting the stored portion for the portion in the frame to create a modified frame. The computing device may send the modified frame to a videoconferencing server for distribution to other computing devices participating in the video conference.
Abstract:
A system, method, and computer-readable medium for providing a device control operation which enables a device to receive or otherwise identify commands intended for it by having the device consult and interact with a secure decentralized transactional ledger. Such a device control operation indirectly and securely controls a device. More specifically, in certain embodiments, the transactional ledger comprises a distributed data structure that is maintained by a set of unassociated network attached information handling systems. In certain embodiments, the network attached information handling systems use novel algorithms and cryptographic methods to ensure that the state of the ledger is valid and that it reflects the state endorsed by a predetermined number (e.g., a majority) of the information handling systems maintaining the ledger.