Abstract:
When providing a user with native access to at least a portion of device hardware, the user can be prevented from modifying firmware and other configuration information by controlling the mechanisms used to update that information. In some embodiments, an asymmetric keying approach can be used to encrypt or sign the firmware. In other cases access can be controlled by enabling firmware updates only through a channel or port that is not exposed to the customer, or by mapping only those portions of the hardware that are to be accessible to the user. In other embodiments, the user can be prevented from modifying firmware by only provisioning the user on a machine after an initial mutability period wherein firmware can be modified, such that the user never has access to a device when firmware can be updated. Combinations and variations of the above also can be used.
Abstract:
A system for generating surgical procedure training media draws upon the realistic data of an actual surgical procedure for realistic training without the risks. A 3D capturing component records three-dimensional model plus imaging data over time of a portion of a patient's body undergoing a surgical procedure. A spatial detection system detects an orientation of a surgical instrument relative to the patient's body during the surgical procedure. A modeling component creates a four-dimensional model (3D model+time) of the portion of the patient's body. Animation such as contingent events, trainee prompts, a virtual surgical instrument, etc., can be added to the model to expand upon the training potential. A user interface processes and edits training media for playback of the four-dimensional model including defining triggers responsive to a trainee simulated surgical inputs to pace sequencing of playback. An interactive player responds to pacing the playback of the editing training media or to a spatially detected simulated surgical instrument held by the student for direct tissue interaction.
Abstract:
An exemplary system includes a front-end component to receive requests for resources in a data center and configured to associate each request with identifying information, to locate one or more resources for each request and to store, in a log file, the identifying information and information about the location of the one or more resources; one or more distributed computation and storage components to acquire log file information and configured to analyze log information to decide if one or more resources associated with one or more requests should be migrated to a data center in a different geographical location; and a location service component to receive decisions made by the one or more distributed computation and storage components and configured to inform the front-end component when a decision causes one or more resources to be migrated to a data center in a different geographical location to thereby allow the front-end component to re-direct future requests for the one or more migrated resources to the data center in the different geographical location. Various other devices, systems and methods are also described.
Abstract:
When providing a user with native access to at least a portion of device hardware, the user can be prevented from modifying firmware and other configuration information by controlling the mechanisms used to update that information. In some embodiments, an asymmetric keying approach can be used to encrypt or sign the firmware. In other cases access can be controlled by enabling firmware updates only through a channel or port that is not exposed to the customer, or by mapping only those portions of the hardware that are to be accessible to the user. In other embodiments, the user can be prevented from modifying firmware by only provisioning the user on a machine after an initial mutability period wherein firmware can be modified, such that the user never has access to a device when firmware can be updated. Combinations and variations of the above also can be used.
Abstract:
A set of techniques is described for monitoring and analyzing crashes and other malfunctions in a multi-tenant computing environment (e.g. cloud computing environment). The computing environment may host many applications that are executed on different computing resource combinations. The combinations may include varying types and versions of hardware or software resources. A monitoring service is deployed to gather statistical data about the failures occurring in the computing environment. The statistical data is then analyzed to identify abnormally high failure patterns. The failure patterns may be associated with particular computing resource combinations being used to execute particular types of applications. Based on these failure patterns, suggestions can be issued to a user to execute the application using a different computing resource combination. Alternatively, the failure patterns may be used to modify or update the various resources in order to correct the potential malfunctions caused by the resource.
Abstract:
A system for providing resources to customers includes racks, sub-rack level secure containment units in the racks, and a provisioning control system. The sub-rack level secure containment units each enclose system resources. The racks hold two or more of the sub-rack level secure containment units. For each customer, the provisioning control system may provision a set of sub-rack level secure containment units to the customer. The provisioning control system may monitor, and create a record of, events of physical access to the system resources in each customer's set of sub-rack level secure containment units.
Abstract:
A data center for executing a data processing application includes processing units, sub-units or servers. Each of the processing units, sub-units or servers can execute a part or all of the data processing application. The processing units, sub-units or servers are electrical disjoint with respect to data communications, but can communicate with each other over free space optical links.
Abstract:
A cost-effective, durable and scalable archival data storage system is provided herein that allow customers to store, retrieve and delete archival data objects, among other operations. For data storage, in an embodiment, the system stores data in a transient data store and provides a data object identifier may be used by subsequent requests. For data retrieval, in an embodiment, the system creates a job corresponding to the data retrieval and provides a job identifier associated with the created job. Once the job is executed, data retrieved is provided in a transient data store to enable customer download. In various embodiments, jobs associated with storage, retrieval and deletion are scheduled and executed using various optimization techniques such as load balancing, batch processed and partitioning. Data is redundantly encoded and stored in self-describing storage entities increasing reliability while reducing storage costs. Data integrity is ensured by integrity checks along data paths.
Abstract:
A remote browsing process is directed to the generation and management of a remote browse session at a network computing provider. A client computing device requests a remote browse session instance at a network computing provider. The network computing and storage provider processes the requested content for display, and provides a processed representation of the requested content to the client computing device for display. The network computing provider further provides a historical content representation corresponding to the requested content to a historical browse storage component for storage. The network computing provider may further provide historical content representations to the historical browse storage component for content directly or indirectly referenced by the requested content. The client computing device may subsequently search for content not previously displayed by the client computing device.
Abstract:
A data center for executing a data processing application includes processing units, sub-units or servers. Each of the processing units, sub-units or servers can execute a part or all of the data processing application. The processing units, sub-units or servers are electrical disjoint with respect to data communications, but can communicate with each other over free space optical links.