An adapter layer may be used to customize a machine learning component by transforming data flowing into, out of, and/or within the machine learning component. The adapter layer may include a number of neural network components, or “adapters,” configured to perform a transformation on input data. Neural network components may be configured into adapter groups. A router component can, based on the input data, select one or more neural network components for transforming the input data. The input layer may combine the results of any such transformations to yield adapted data. Different adapter groups can include adapters of different complexity (e.g., involving different amounts of computation and/or latency). Thus, the amount of computation or latency added by an adapter layer can be reduced for simpler transformations of the input data.
Techniques for determining when speech is directed at another individual of a dialog, and storing a representation of such user-directed speech for use as context when processing subsequently-received system-directed speech are described. A system receives audio data and/or video data and determines therefrom that speech in the audio data is user-directed. Based on this, the system determine whether the speech is able to be used to perform an action by the system. If the speech is able to be used to perform an action, the system stores a natural language representation of the speech. Thereafter, when the system receives system-directed speech, the system generates a rewrite of a natural language representation of the system-directed speech based on the previously-received user-directed speech. The system then determines output data responsive to the system-directed speech using the rewritten natural language representation.
Techniques disclosed integrate generative AI assistant plugins with a large language model (LLM) to enhance conversational interactions. The techniques include receiving a user's input and retrieving relevant text passages based on a query derived from this input. A complex LLM prompt is generated, including these passages, descriptions of candidate plugins, and the user's input. This prompt is sent to an LLM service, which selects the most suitable plugin for the user's needs. Following this, a query is sent to the chosen plugin, and its response is used to craft the agent's reply to the user. The techniques emphasize dynamic selection and integration of specialized plugins based on real-time user input, leveraging LLM capabilities to interpret and recommend the best plugin response. This approach ensures tailored, informed interactions by providing responses that are both relevant and enriched with specialized plugin knowledge or functionality.
Systems and methods for automatically taring mobile produce scales include receiving sensor data indicating a weight change event associated with a weight sensor, and generating a tare request. In response to the tare request, a difference in weight data associated with the weight sensor before and after the weight change event may be determined. Stability data associated with the weight sensor may also be used to determine whether to automatically tare the weight sensor. If the difference between the weight data is within a threshold associated with the weight change event, the weight sensor may be automatically tared. If the difference between the weight data exceeds the threshold associated with the weight change event, the weight sensor will not be automatically tared. The weight sensor may then be re-tared manually.
G01G 19/414 - Weighing apparatus or methods adapted for special purposes not provided for in groups with provisions for indicating, recording, or computing price or other quantities dependent on the weight using electromechanical or electronic computing means using electronic computing means only
B62B 3/14 - Hand carts having more than one axis carrying transport wheelsSteering devices thereforEquipment therefor characterised by provisions for nesting or stacking, e.g. shopping trolleys
5.
CAPTURING UNIQUE CONSTRAINT VIOLATIONS WHEN BUILDING A UNIQUE SECONDARY INDEX
Unique constraint violations for building a unique secondary index may be captured. Creation of a secondary index with a unique value constraint may be initiated. One or more database tables may be queried to backfill the secondary index up to a point in time, while updates to the database tables after the point in time may be performed on the secondary index. After backfill is complete, an evaluation of the secondary index for unique constraint violations may be performed. If a unique constraint violation is determined, a cause of the unique constraint violation provided.
Techniques for logical text passage generation and retrieval for retrieval-augmented generation. The techniques involve processing markup language documents to generate logical text passages and their corresponding embeddings. These embeddings are indexed for efficient retrieval. Upon receiving a user utterance, a user query is formed and transformed into an embedding to query the index. Relevant text passages are identified and used to prompt a large language model (LLM), which generates a completion. This completion is then sent as a response to the user. The process effectively bridges user queries with relevant information through advanced embedding and natural language processing techniques, enabling accurate and contextually appropriate interactions within a user-agent dialogue framework.
Techniques for generating a summary of text-based documents are described. A system may be configured to generate a summary based on context data. The system may receive different types of context data corresponding to a user input. The context data may be converted to a linearized representation so that it can be processed by a decoder along with a source document for which the summary is being generated.
Unique constraint violations for building a unique secondary index may be captured. Creation of a secondary index with a unique value constraint may be initiated. One or more database tables may be queried to backfill the secondary index up to a point in time, while updates to the database tables after the point in time may be performed on the secondary index. After backfill is complete, an evaluation of the secondary index for unique constraint violations may be performed. If a unique constraint violation is determined, a cause of the unique constraint violation provided.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
Techniques for generating a natural language response to a user input of a dialog are described. A system receives a natural language user input of a dialog and determines dialog history data including a previous natural language user input of the dialog. Based on the first natural language user input and the dialog history data, the system generates at least a first question associated with the natural language user input. Based on the first natural language user input and the dialog history data, the system generates at least a first answer to the at least first question. Using the dialog history data, the first natural language question, and the first natural language answer, the system generates an output responsive to the natural language user input.
Methods and systems are disclosed for selecting a set of peptides from a plurality of peptides for producing a drug product. A request may be received to produce a vaccine that meets specific requirements, including the desired immune response and the inclusion of certain types of peptides. The system may rank peptides using one or more metrics that factor in immunogenicity and/or manufacturability. Based on the ranking, the system may select a group of peptides for inclusion in a manufacturing simulation process, which returns a set of peptides that are predicted to be successfully manufactured. The system refines its selection to a subset of manufacturable peptides based on specific criteria. This iterative process continues until predefined conditions are met, such as the convergence of the simulation results. Based on these results, the system identifies an optimal or near-optimal set of peptides that can be used for effective drug production.
Techniques are generally described for query evaluation for image retrieval and image generation. In various examples, a first encoded representation of first natural language input data may be generated. An image retrieval process may be selected from among the image retrieval process and an image generation process based at least in part on the first encoded representation of the first natural language input data. A second natural language encoder may generate a second encoded representation of the first natural language input data. The second encoded representation may be used to determine first image data stored in a first data repository. The first image data may be sent for output on a display of a first computing device.
Methods and systems are disclosed for selecting a set of peptides from a plurality of peptides for producing a drug product. A request may be received to produce a vaccine that meets specific requirements, including the desired immune response and the inclusion of certain types of peptides. The system may rank peptides using one or more metrics that factor in immunogenicity and/or manufacturability. Based on the ranking, the system may select a group of peptides for inclusion in a manufacturing simulation process, which returns a set of peptides that are predicted to be successfully manufactured. The system refines its selection to a subset of manufacturable peptides based on specific criteria. This iterative process continues until predefined conditions are met, such as the convergence of the simulation results. Based on these results, the system identifies an optimal or near-optimal set of peptides that can be used for effective drug production.
Systems and methods for implementing a quantum code using cat qubits as data qubits and transmon qubits as ancilla qubits is disclosed. In some embodiments, a three-level transmon is used and Chi-matching is performed to determine dispersive coupling coefficients between the cat qubits and first and second excited states of the transmon qubits, wherein the dispersive coupling coefficients are used to perform gates between the cat data qubits and the transmon ancilla qubits. The Chi-matching determines the dispersive coupling coefficients such that the cat qubits are rotated in a same manner while performing the gates regardless as to whether a given transmon ancilla qubit remains in a second excited state or has decayed to a first excited state.
Item consolidation tools are described. In one example, an item consolidator includes first and second bay doors, a door displacement system, and a controller. The door displacement system includes first and second drive systems secured to the undersides of the first and second bay doors. The drive systems provide angular and a lateral degrees of freedom, to move the first and second bay doors. The controller is configured to direct the door displacement system to form a bay door vertex between leading edges of the bay doors. Items can be placed on the doors and will rest at the vertex between the doors. The controller can also determine drop locations for the items. The controller can then direct the door displacement system to reposition the bay door vertex based on the drop locations and drop the items by opening or retracting the doors.
Machine-level metrics for machines of a processing line, as well as latent metrics for results of the processing line, are obtained for the current time period. Machine configuration setting values for the machines during the current time period, as well as at the earlier time period are also obtained. Updates to current configuration setting values of the machines are determined based upon analysis of the machine-level metrics, the process-level metrics for the current time period, the latent metrics for the earlier time period, and the machine configuration setting values for the current and earlier time periods (e.g., the metrics and configuration values may be input to one or more machine learning models used to determine the updates to current configuration setting values for the individual machines). The current values may be changed to the updated values via an automated process or the updates presented as a recommendation report.
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
H04L 41/08 - Configuration management of networks or network elements
H04L 41/0859 - Retrieval of network configurationTracking network configuration history by keeping history of different configuration generations or by rolling back to previous configuration versions
Techniques described herein may be implemented in the context of a computing resource service provider. A machine learning (ML) service provides an interface to clients which can be used to create, read, update, and delete ML pipelines. ML pipelines can be converted to a human-readable format, which a server persists. Clients of a machine learning service can start, stop, and resume executions a ML pipeline based on the human-readable format of the ML pipeline.
A container transport can move containers around a warehouse environment. The container transport can include a container receiving area with multiple container bays. Containers can be received in the container bays and moved around the warehouse environment.
Techniques for concept shift detection and correction using probabilistic models and learned feature representations are described. A gaussian process model is trained using representations generated by a primary machine learning (ML) model for existing training data elements in a training memory. For a new batch of data elements, representations again generated by the primary ML model can be used as input for the gaussian process model to generate predictive distributions. When the true targets for the new data elements are not sufficiently likely according to the corresponding predictive distributions, concept shift is likely and the training memory can be purged of the existing data elements before further retraining of the primary ML model.
G06V 10/77 - Processing image or video features in feature spacesArrangements for image or video recognition or understanding using pattern recognition or machine learning using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]Blind source separation
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
Techniques for 3D point cloud labeling are described. An example of labeling includes initializing a point-cloud environment according to a configuration; loading of point-cloud data into a memory buffer of a device, wherein the point-cloud data is compatible with a virtual reality (VR) environment and a non-VR environment; drawing of at least the loaded point-cloud data into a point-cloud environment of the device; receiving user input in a task user interface of the device; and in response to the user input, performing an operation to one or more of a bounding box and quality of a label.
Systems and methods are disclosed for wireless powering and control of conveyors on shuttles. An example system may include a track, and a shuttle configured to move along the track, the shuttle having a conveyor, and a first induction coil. The system may include a second induction coil disposed at a first location along the track, where the second induction coil is configured to interact with the first induction coil to power the conveyor. The shuttle may not have an onboard power source coupled to the conveyor.
A pneumatic element graph of a pneumatic system can be accessed. The pneumatic system may include a set of pneumatic components. A set of input controls may be received. The set of input control elements may correspond to at least one of i) an operational command of at a first pneumatic component of the set of pneumatic components, or ii) a geometric feature of a second pneumatic component of the set of pneumatic components. A set of pressure states may be determined for at least one pneumatic component of the set of pneumatic components based at least in part on previous pressure states of the at least one pneumatic component. An operational sequence of the pneumatic system using the previous pressure states may be performed.
An inventory handling system may implement a backstop to facilitate container engagement by a robotic manipulator. The system may include a second set of rollers positioned lower than a first set of rollers so as to define a stepped interface. The roller sets may be configured to carry a container. A backstop surface may be positioned along the stepped interface between the first set of rollers and the second set of rollers. The backstop surface may be arranged so as to contact a trailing side of the container traveling on the second set of rollers and in response to a robotic end effector pushing a leading side of the container towards the backstop surface and the first set of rollers. The backstop surface may be configured to resist movement of the container to enable the robotic end effector to engage with the leading side of the container.
B65G 43/00 - Control devices, e.g. for safety, warning or fault-correcting
B65G 47/53 - Devices for transferring articles or materials between conveyors, i.e. discharging or feeding devices between conveyors which cross one another
Systems and methods for implementing a right-sizing service that recommends and automatically implements sizing recommendations for nodes and resources of compute clusters executing applications is disclosed. Performance metrics for compute nodes executing the application may be gathered and normalized with anomalous nodes excluded. Then, respective time series data for the compute nodes may be temporally aligned to identify phases of execution of the application and resource sizes may be estimated for the various phases. A sizing recommendation may then be made based in part on this estimated resource sizes. The sizing recommendation may further integrate with other sizing recommendations and be used to manually or automatically size a compute cluster or selected among a number of pre-sized compute clusters, in various embodiments.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
Techniques for implementing tensor parallel execution can include identifying a first tensor contraction operation in a compute flow, and slicing the first tensor contraction operation into a first set of multiple tensor contraction portions to have each compute engine of multiple compute engines perform a portion of the first tensor contraction operation. A set of slicing options can then be determined for a second tensor contraction operation that operates on a tensor result of the first tensor contraction operation. A cost for each slicing option is determined, and a slicing option having the lowest cost is selected. The second tensor contraction operation is sliced according to the selected slicing option to have each compute engine perform a portion of the second tensor contraction operation. Collective compute operations can be inserted in the compute flow for the first and second tensor contraction operations.
A computing device may generate a first cryptographic key data for communicating with a second computing device. A computing device may receive, by a microphone of the computing device, a sound information, wherein the first sound information represents speech occurring during a multi-participant conversation. A computing device may generate a sound embedding using the sound information. A computing device may compare the sound embedding to each speaker embedding of a set of speaker embeddings stored in a memory of the computing device to generate a result. A computing device may identify, based on the result, a current active speaker. A computing device may generate a second cryptographic key data, based in part on a speaker embedding associated with the current active speaker.
G10L 17/00 - Speaker identification or verification techniques
H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
Techniques and systems can partition data with a partition key to provide data partitioned based on the partition key. Queries performed against the data partitioned based on the partition key can be queried to identify a query predicate shared by at least a plurality of the queries. That query predicate can be used to reparation the data to generate other partitioned data or to replace the data partitioned based on the partition key.
Techniques for generating tasks to be completed in order to perform an action responsive to a user input and, for a given task, shortlisting available components to those that are relevant for the task are described. The system processes a user input to determine tasks to be completed in order to perform an action responsive to the user input. The system determines a priority of the tasks and selects a top-ranked task. The system determines descriptions of processing performable by components that are semantically similar to the current task, and requests a description of the function the corresponding components would perform for the current task. Based on the received descriptions, the system selects one or more components to perform the task. Thereafter, the system causes the action to be performed and outputs a response to the user input.
Maps of a physical space provide information to an autonomous mobile device (AMD) about the location of objects. For example, a local map may represent objects currently detected while a global map represents objects that persist over time. Disagreements between the maps may result from quantization errors, sensor errors, changes in the physical space over time that are shown in one map but not another, and so forth. For example, the local map may indicate an obstacle in a space that the global map indicates is empty, or vice versa. A cluster representing an object in a map may be assessed to distinguish if the object is actual or false. Other techniques may be used to determine disagreements. Information about persistent disagreements may be stored for mitigation. The AMD may mitigate disagreements by exploring the physical space associated with the disagreement to add to map data.
Approaches are disclosed for managing aspects of content delivery in a multi-tenant environment. A request buffer can be used to remove correlations between requests and randomly shuffle requests without storing all the requests concurrently. A shuffle sharding algorithm can be used to randomly allocate a subset of resources to different users in order to ensure less than a maximum risk of one user impacting the use of all resources allocated to other users. In some embodiments, separate fleets of resources can be maintained for manifests and video segments to allow for more accurate scaling and customization. Multiple manifests can also be associated with a single endpoint to allow multiple media players to obtain similar content segments from the single endpoint.
An assembly includes a conveyance mechanism configured to move in a first direction and a second direction opposite the first direction, and an energy limiting device coupled to the conveyance mechanism. The energy limiting device is configured to move in the first direction with the conveyance mechanism, and move in the second direction as the conveyance mechanism moves in the first direction upon an amount of force greater than a threshold amount of force being imparted to the energy limiting device. A sensor is configured to generate sensor data associated with movement of the energy limiting device in the second direction as the conveyance mechanism moves in the first direction.
In various examples, an augmented, mixed, or virtual reality device comprising a camera and a display may determine first storage buffer with a first bin in a physical environment. The augmented, mixed, or virtual reality device may generate a first virtual object including a first virtual bin, the first virtual object corresponding to the first storage buffer and the first virtual bin corresponding to the first bin. The augmented, mixed, or virtual reality device may receive first data indicating a first object located in the first bin. First graphical data highlighting the first virtual bin may be generated. The first graphical data highlighting at least the portion of the first virtual bin on a first portion of the display may be generated. The first portion of the display may overlay at least a portion of the first bin in a field of view of the camera.
A wireless device may use two communication interfaces that utilize frequencies within the same band. As a result, a first communication interface such as an HDMI interface may interfere with operation of a second communication interface such as a WiFi interface. A conductive member is placed between the communication interfaces to reduce this interference. The conductive member has multiple slots, each slot having dimensions that cause resonance at a frequency used by the first communication interface. The number and spacing of the slots corresponds to the strength of signals used by the second communication interface. Placement of the conductive member between the first and second communication interfaces enables the conductive member to attenuate signals from the second communication interface that would interfere with the frequency used by the first communication interface.
Techniques for fast database recovery in a multi-volume database environment via transactional awareness are described. In the event of a failure associated with a first volume storing database page data, the first volume can be restored to a point in time and transactional metadata from a second volume storing logical change data can be obtained for a limited number of transactions occurring at/after that point in time, as opposed to analyzing extremely large change log files. These transactions can be checked to ensure that they have all been persisted, and if not, change data for those transactions can be obtained from the second volume and used to replay these transactions on the restored first volume.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
A computer-networking system is described to leverage traffic splits naturally occurring in Clos fabrics along the path to a top tier of the fabric. Using the traffic splits, a result similar to or the same as WECMP can be implemented but using less network-device overhead. The system introduces another level of indirection abstracting sets of outgoing next hops across tier 1 devices in the fabric and leveraging ECMP or WECMP to manage the capacity. Incoming traffic flows are split as they get forwarded across the fabric due to the fabric's topology, routing design, and/or the pattern of external connections. These traffic splits are leveraged in creating forwarding tables for the network devices, thereby making the scaling model for WECMP a function of the outgoing external connections of the fabric rather than the number of traffic flow destinations in the network domain.
Filter direction modifications are performed in vector-based searches. A query data item is obtained along with a data item filter to perform a data item search on a set of data items. A query vector that represents the query in feature space is generated and modified using a filter vector obtained from a matrix of filter vectors generated for the data item filters. The modified query vector is used to perform a search technique to identify data items to return as a result for the search.
Techniques for optical lens characterization and calibration are described herein. In an example, a computer system receives a first image of a target captured by an image acquisition system having a camera and a lens and using first setting values in a setting space. The computer system inputs the first setting values and a first decode performance associated with image acquisition system having the first setting values for the barcode sets in the first image into a machine learning model and determines a representation of the setting space. The computer system inputs the machine learning model and one or more conditions into an algorithm and receives an output indicating second setting values in the setting space for the image acquisition system. The computer system sends the second setting values to the controller, which is configured to set the settings for the image acquisition system based on the second setting values.
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
Hardware errors can be detected by generating a plurality of test templates to perform testing on an integrated circuit (IC) device. A set of random tests can be generated corresponding to the plurality of test templates. The set of random tests can be executed on the IC device for multiple passes, and the results of the multiple passes can be compared to detect the hardware error in the IC device. The set of random tests can be generated as a binary image for execution on the IC device. The IC device may include multiple processing cores, and executing the multiple passes may include changing logical role of each processing core between subsequent passes. The set of random tests can be executed in a bare-metal mode, or at an application level of the IC device.
A resource set which includes multiple servers with a respective plurality of training computing devices is identified for training a machine learning model. The resource set is subdivided into partition groups, such that each partition group can store a respective replica of state information of the model. The model is trained using the partition groups. The training comprises a multi-stage gathering of a portion of the state information at training computing devices of a particular partition group. Different types of communication channels between training computing devices are used in respective stages of the gathering, including inter-server communication channels in one stage and an intra-server communication channel during another stage. A trained version of the model is stored.
Techniques to perform transpose operations in a crossbar circuit may include receiving a set of write transactions to write a data array to a target memory, and determining that the set of write transactions is for a transpose write. Write data for each of the write transactions can be stored diagonally in a transpose memory of the crossbar circuit. Each row of data in the transpose memory can be rotated, and rotated data from each row of the transpose memory can be provided to a corresponding output port of the crossbar circuit to write to the target memory.
G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
A device includes a housing, a first coupler coupled to the housing, and a second coupler coupled to the housing. The first coupler has a first channel and the second coupler has a second channel. The device further includes a first laser configured to output a first laser beam in a first direction, a second laser disposed at least partially within the first channel of the first coupler and configured to output a second laser beam in a second direction different than the first direction, and a third laser disposed at least partially within the second channel of the second coupler and configured to output a third laser beam in a third direction different than the second direction.
Systems and methods are described relating to pose and shape estimation of objects. In some examples, a camera generates images depicting an object from different viewpoints. Within the images, a system identifies corners of the object, and the system uses these corners to generate lines that are projected from different viewpoints through the corners. Points may be identified by intersecting lines such that the points may be used to generate estimations of the object. The estimation with the highest score may be used to place the object in a location different from where the object was located.
G06T 7/73 - Determining position or orientation of objects or cameras using feature-based methods
G06T 17/10 - Volume description, e.g. cylinders, cubes or using CSG [Constructive Solid Geometry]
G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
Techniques are generally described for controllable image-to-video generation. In various examples, a first image representing at least a first object may be received. First input data including a selection of the first object in the first image for animation may be received. Second input data including at least a first bounding box indicating a target location of the first object may be received. A latent diffusion text-to-image model and the first image may be used to generate a first plurality of visual tokens. One or more first grounding tokens may be generated representing a location of the first bounding box. The latent diffusion text-to-image model may be used to generate a video animating the first object based on the first plurality of visual tokens and the one or more first grounding tokens.
Systems and methods are described relating to score generation for an account of a delivery service using one or more neural networks. The one or more neural networks can generate the score using time series data including metrics associated with the account. In response to a time slot being selected by the account from the set of time slots, the score can be used to generate safeguards for the account, where the safeguards are to be applied prior to execution of one or more scheduled deliveries associated with the time slot.
Systems and methods are disclosed for managing communication between a carrier and a recipient using neural networks. Systems use neural networks, performed by one or more processors, to identify triggers that are provided to the recipient based on information associated with a scheduled delivery. In response to initiating the contact, systems use neural networks, performed by one or more processors, to generate content for the recipient, where the content indicates issues of the scheduled delivery. The systems use neural networks, performed by one or more processors, to generate instructions for the carrier such that the carrier can complete the scheduled delivery.
Various embodiments of systems and methods for providing virtualized (e.g., serverless) broker clusters for a data streaming service are disclosed. A data streaming service uses a front-end proxy layer and a back-end broker layer to provide virtualized broker clusters, for example in a Kafka-based streaming service. Resources included in a virtualized broker cluster are monitored and automatically scaled-up, scaled-down, or re-balanced in a way that is transparent to data producing and/or data consuming clients of the data streaming service.
Techniques for intelligent multi-carrier network edge application deployment are described. Traffic that is destined for an application implemented in multiple edge locations of a cloud provider network is originated by a mobile user equipment device via use of a communications network of a first communications service provider (CSP). An edge location hosting the application, from multiple such candidates, can be selected as a destination for the traffic. The edge location may be deployed in a facility of a different CSP. The traffic can be sent into the edge location using a network address of the different CSP to securely allow for its entry thereto.
Techniques are generally described for controllable image-to-video generation. In various examples, a first image representing at least a first object may be received. First input data including a selection of the first object in the first image for animation may be received. Second input data including at least a first bounding box indicating a target location of the first object may be received. A latent diffusion text-to-image model and the first image may be used to generate a first plurality of visual tokens. One or more first grounding tokens may be generated representing a location of the first bounding box. The latent diffusion text-to-image model may be used to generate a video animating the first object based on the first plurality of visual tokens and the one or more first grounding tokens.
41 - Education, entertainment, sporting and cultural services
Goods & Services
(1) Employment counseling and recruiting assistance services in the field of cloud computing and information technology; providing career information and job placement services for individuals pursuing careers in cloud computing and information technology; career placement services, namely, connecting program graduates with potential employers in the technology industry; providing interview preparation, resume review, and job application assistance for individuals pursuing careers in cloud computing and information technology; promoting public awareness of cloud computing careers and workforce development.
(2) Educational services, namely, providing training programs in the fields of cloud computing and information technology (IT); conducting workshops, seminars, and courses in the field of cloud computing and information technology (IT); offering workforce development training programs to prepare individuals for careers in cloud computing and information technology (IT); conducting scenario-based learning and hands-on labs to develop technical skills in cloud computing and information technology (IT); providing educational materials and resources in the field of cloud computing and information technology; career counseling, namely, providing advice and guidance concerning career opportunities, resume writing and job application preparation for pursuing careers in the field of cloud computing and information technology; providing a directory of third-party training and educational providers delivering educational programs in the field of cloud computing and information technology (IT); providing support services, namely, assistance with program enrollment, course navigation, and educational guidance.
41 - Education, entertainment, sporting and cultural services
Goods & Services
Employment counseling and recruiting assistance services in the field of cloud computing and information technology; providing career information and job placement services for individuals pursuing careers in cloud computing and information technology; career placement services, namely, connecting program graduates with potential employers in the technology industry; providing interview preparation, resume review, and job application assistance for individuals pursuing careers in cloud computing and information technology; promoting public awareness of cloud computing careers and workforce development Educational services, namely, providing training programs in the fields of cloud computing and information technology (IT); conducting workshops, seminars, and courses in the field of cloud computing and information technology (IT); offering workforce development training programs to prepare individuals for careers in cloud computing and information technology (IT); conducting scenario-based learning and hands-on labs to develop technical skills in cloud computing and information technology (IT); providing educational materials and resources in the field of cloud computing and information technology; career counseling, namely, providing advice and guidance concerning career opportunities, resume writing and job application preparation for pursuing careers in the field of cloud computing and information technology; providing a directory of third-party training and educational providers delivering educational programs in the field of cloud computing and information technology (IT); providing support services, namely, assistance with program enrollment, course navigation, and educational guidance
41 - Education, entertainment, sporting and cultural services
Goods & Services
Employment counseling and recruiting assistance services in the field of cloud computing and information technology; providing career information and job placement services for individuals pursuing careers in cloud computing and information technology; career placement services, namely, connecting program graduates with potential employers in the technology industry; providing interview preparation, resume review, and job application assistance for individuals pursuing careers in cloud computing and information technology; promoting public awareness of cloud computing careers and workforce development. Educational services, namely, providing training programs in the fields of cloud computing and information technology (IT); conducting workshops, seminars, and courses in the field of cloud computing and information technology (IT); offering workforce development training programs to prepare individuals for careers in cloud computing and information technology (IT); conducting scenario-based learning and hands-on labs to develop technical skills in cloud computing and information technology (IT); providing educational materials and resources in the field of cloud computing and information technology; career counseling, namely, providing advice and guidance concerning career opportunities, resume writing and job application preparation for pursuing careers in the field of cloud computing and information technology; providing a directory of third-party training and educational providers delivering educational programs in the field of cloud computing and information technology (IT); providing support services, namely, assistance with program enrollment, course navigation, and educational guidance.
A voltage droop detection circuit can be used to detect a voltage droop in an integrated circuit (IC) device. The voltage droop detection circuit may include a chain of inverting stages, and each inverting stage may include a P-type transistor and an N-type transistor. The chain of inverting stages can be initialized to alternating logic states during an initialization phase of a clock cycle, and an evaluation pulse can be inputted into the chain of inverting stages during an evaluation phase of the clock cycle. A voltage droop may be detected if a number of inverting stages that are able to switch output logic states from their respective initialized logic states is smaller than a nominal value indicating a number of inverting stages that are able to switch their respective output logic states under normal voltage condition.
A waveguide combiner with dynamic grating activation is described herein. In an example, an apparatus includes a first optical element that is configured to receive light. The apparatus also includes a substrate configured to propagate the light received by the first optical element along a propagation path within the substrate. The substrate includes an input surface and an output surface. The input surface is coupled to the first optical element. The apparatus also includes a second optical element coupled to the output surface and configured to output the light propagated along the propagation path. The second optical element includes a plurality of diffraction gratings at the output surface. Each one of the plurality of diffraction gratings has a corresponding controllable diffraction efficiency.
G02F 1/13 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulatingNon-linear optics for the control of the intensity, phase, polarisation or colour based on liquid crystals, e.g. single liquid crystal display cells
G02F 1/1334 - Constructional arrangements based on polymer-dispersed liquid crystals, e.g. microencapsulated liquid crystals
57.
Frontier node-based data layout analysis framework
Techniques for determining a compatible data layout for a computational flow being executed on an integrated circuit device may include obtaining a representation of a set of connected nodes representing loopnests in a compute flow graph. Those of the nodes in the set of connected nodes that are associated with operators having a fixed data layout can be initialized into a set of layout groups. A set of merging operations can then be iteratively performed to form a single layout group from the set of connected nodes. The set of merging operations may include identifying a set of frontier nodes adjacent to the set of layout groups, determining an initialization cost of each of the frontier nodes, selecting a frontier node having a lowest initialization cost, and merging the selected frontier node with one or more adjacent layout groups to form a new layout group having a compatible data layout.
Systems and methods are provided for assigning, to a host computing device of an on-demand code execution system comprising a plurality of host computing devices, a set of network addresses available for virtual computing components instantiated on the host computing device, wherein a prefix of each network address of the set of network addresses comprises a same host computing device-specific prefix, and wherein each network address of the set of network addresses is to be accessible from outside the on-demand code execution system; determining to configure a virtual computing component on the host computing device for execution of application code, wherein the virtual computing component is associated with an identifier; and assigning, to the virtual computing component, a network address of the set of network addresses, wherein the network address comprises the prefix and is based on the identifier.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
59.
Delegated authorization for consumers of shared databases
A system for delegation of authorization management of a shared database of a database service is described. The database service includes a control plane and a producer database engine. The producer database engine receives a creation request to create a datashare for a database. The creation request delegates, to a data exchange service, authorization management to access the datashare. The control plane is configured to update permission data for the datashare to indicate that authorization to the datashare is managed by the data exchange service. The producer database engine is further configured to receive a request, from a consumer database engine, to obtain metadata used to perform a query to the database of the datashare, determine that the data exchange service authorized the consumer database engine to access the datashare based on the permission data for the datashare, and return the metadata to the consumer database engine.
Described are systems and techniques configured to acquire data from user speech generated by one user of a materials handling facility speaking to themselves or another user. The user speech is processed using natural language processing to determine key words, concepts, meanings, and so forth. Based on the processed data, queries may be executed, data may be presented in user interfaces, operation of the materials handling facility may be modified, and so forth.
Methods, systems, and computer-readable media for user engagement modeling for engagement optimization are disclosed. Based (at least in part) on one or more user engagement models, a user engagement modeling system determines an uplift score for a user of an Internet-accessible service. The uplift score comprises an estimated effect on one or more user engagement metrics of an incentive to interact with the service. The uplift score is determined based (at least in part) on values of the user engagement metric(s) for the user in a treatment group and values of the metric(s) for the user in a control group, in view of propensity score to be in either group. The treatment group is offered the incentive, and the control group is not offered the incentive. The system determines that the user is or is not offered the incentive based at least in part on the uplift score.
Embodiments of an audio advertising optimization system are disclosed to enable optimization of audio ad play selection and audio ad content creation using machine learning techniques. In embodiments, the system uses audio processing model(s) to extract metadata about audio ads that it receives from advertisers, such as speaker voice characteristics, music characteristics, and types of call-to-action (CTA) used. As the ads are played to users by ad servers, conversion results associated with the ad plays are recorded. Machine learning model(s) are built based on the ad metadata, user metadata, listening context data, and the user conversion results to learn conversion patterns of the ads. The conversion patterns may be used to optimize the play selection of ad servers to improve conversion rates. In embodiments, the conversion patterns may be made available to ad production systems, which may use the data to optimize audio ad content.
Recent location and control information received from “lead” vehicles that traveled over a segment of land, sea, or air is captured to inform, via aggregated data, subsequent “trailing” vehicles that travel over that same segment of land, sea, or air. The aggregated data may provide the trailing vehicles with annotated road information that identifies obstacles. In some embodiments, at least some sensor control data may be provided to the subsequent vehicles to assist those vehicles in identifying the obstacles and/or performing other tasks. Besides, obstacles, the location and control information may enable determining areas traveled by vehicles that are not included in conventional maps, as well as vehicle actions associated with particular locations, such as places where vehicles park or make other maneuvers.
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
G08G 1/01 - Detecting movement of traffic to be counted or controlled
G08G 1/0967 - Systems involving transmission of highway information, e.g. weather, speed limits
G08G 1/123 - Traffic control systems for road vehicles indicating the position of vehicles, e.g. scheduled vehicles
H04W 4/02 - Services making use of location information
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Systems and techniques are disclosed for authorizing users based on biometric data. Images are collected from an authorized user are used to generate three-dimensional representations of the user that are stored for use in authorization operations. Images accompanying a request for authorization are first processed using liveness detection operations and then, if the images are associated with a live person, a three-dimensional representation of the person is generated using the images. If a correspondence to a verified user's three-dimensional representation is identified for the three-dimensional representation of the person requesting authorization, the request is granted.
Disclosed are systems and methods that monitor for malicious and unauthorized behaviors, determine categories for detected malicious behaviors, determine why a domain is determined to be malicious, and provide information to users that identifies the categories and reasons as to why a domain is determined to be malicious. In some implementations, the disclosed systems and methods may be utilized to provide monitoring security to customers of a cloud service. For example, customers of a cloud service may maintain an account with the cloud service and the disclosed implementations may be utilized to protect those accounts from malicious attacks and cybercrimes such as, but not limited to, spam, phishing, malware, botnets, etc.
Diagnostic testing systems and related methods employ actuation pressure-based control during fluid transfer within a test cartridge. A method of operating a cartridge to process a biological sample includes coupling an actuation port of the cartridge with a pump assembly of a portable analyzer. A transfer operation of the pump assembly induces airflow through the actuation port so as to displace an aliquot of the sample solution along a fluid channel. A control unit monitors a pressure signal indicative of a pressure of air displaced by the pump assembly. The transfer operation is stopped in response to a change in the pressure signal indicative of contact of the aliquot of the sample solution with a hydrophobic staging vent.
Systems and methods are disclosed for containers having lever-based actuation of brakes and locks. In one embodiment, an example container may include a first container wall, a second container wall, a third container wall, a fourth container wall, a first wheel, a second wheel, and a wheel lock assembly configured to prevent swiveling of the first wheel. The wheel lock assembly may include a first wheel lock, a first lever configured to actuate the first wheel lock, and a first cable that is coupled to the first wheel lock and the first lever, where the first lever is disposed on the third container wall, and a wheel brake assembly configured to prevent rotation of the second wheel, the wheel brake assembly including a first wheel brake, a second lever configured to actuate the first wheel brake, and a second cable coupled to the first wheel brake and the second lever.
B60B 33/02 - Castors in general with disengageable swivel action
B62B 3/00 - Hand carts having more than one axis carrying transport wheelsSteering devices thereforEquipment therefor
B62B 3/02 - Hand carts having more than one axis carrying transport wheelsSteering devices thereforEquipment therefor involving parts being adjustable, collapsible, attachable, detachable, or convertible
Described herein are systems and techniques for multi-dimensional user verification for an action request at a computing device. The user verification techniques include receiving a request for action at the device, determining, based on the type of request for action, a set of input factors to enable verification for the request to be performed. The status of the input factors may be determined or scored and used to evaluate a validity of the request and verification to perform the request. The techniques also describe carrying out the request or denying the request based on the validity of the input factors and evaluating manual validation techniques available to override the verification.
This disclosure describes, in part, techniques for retrieving images based on detecting events. For instance, system(s) may detect an event, such as an event associated with a collection of images for an item. Based on detecting the event, the system(s) may determine an area within a facility, such as an inventory location, for retrieving image data. The system(s) may then determine one or more imaging devices that have field(s) of view of the area. Additionally, the system(s) may score the imaging device(s) based on visibility data associated with the imaging device(s). The system(s) may also determine occlusion data for image data generated by the imaging device(s). Using the scores and the occlusion data, the system(s) may then select image data that represents the area. The system(s) may then store the image data in one or more data stores, such as with the collection of images.
Storage units including platforms that are outfitted with RFID antennas and auxiliary sensors detect changes in loading on the platforms based on changes in loading determined by the auxiliary sensors or changes in signals received by the RFID antennas. The platforms include surfaces for receiving items tagged with RFID transmitters thereon, such as items of common types and variable weights. An interaction involving the placement of an item on the platform, or the removal of the item from the platform, is detected by the auxiliary sensors. The energization of an RFID field is triggered in response to the detected interaction, and an item is identified where an RFID signal transmitted by the item is present at one time and absent at another time.
A system and method for distributing quantum entanglement using optically protected fiber optical paths is described. In some embodiments, multiple optical paths are used to connect a source site to a receiver site. Quantum entangled particles are transmitted from the source site to the receiver site using a first one of the multiple optical paths and related service channel information is transmitted from the source site to the receiver site using a second one of the multiple optical paths. In response to a failure of either the first or second optical path, an entanglement distribution controller automatically updates the routing such that the service channel information and the quantum entangled particles are routed concurrently on a remaining one of the first or second optical path.
72.
DETERMINATION OF QUANTUM CIRCUIT COMPILATION PASSES AND/OR COMPILATION PARAMETERS OPTIMIZED FOR ONE OR MORE PERFORMANCE METRICS
A quantum computing service includes a quantum circuit compilation module that uses received information about quantum processing units (QPUs) along with information about a quantum circuit to be compiled in order to generate an optimized ordered list of compilation passes to be performed to compile the quantum circuit for execution on a given QPU.
G06N 10/00 - Quantum computing, i.e. information processing based on quantum-mechanical phenomena
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
Techniques for synchronizing device group data across different device control applications are described. A device group may include two or more smart home devices that may be controlled/supported by different device control applications. A user may set up device groups, including the same devices, in the different device control applications. A system may include a group synchronization service that synchronizes (e.g., merges) the multiple device groups across the different device control applications. The groups may be synchronized based on matching group names, matching devices included in the group, etc. After the device groups are synchronized, modifications made by the user to a device group in one device control application may be propagated to other device control applications.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
Goods & Services
Pre-recorded downloadable audio recordings featuring comedic entertainment programs; pre-recorded video recordings featuring comedic entertainment programs; pre-recorded downloadable audio and visual recordings featuring comedic entertainment programs; pre-recorded audio and visual recordings in optical discs, DVD and CD format featuring comedic entertainment programs; motion picture films featuring animated entertainment, action adventure, live action, comedy, musicals, drama and documentaries. Entertainment in the nature of an ongoing television series in the fields of comedy and reality; entertainment services, namely, an ongoing television program in the fields of comedy and reality provided through television, cable, the Internet and wireless communications networks; providing online non-downloadable comic books and graphic novels; providing a website featuring blogs and non-downloadable publications in the nature of books, graphic novels, comics and screenplays in the field of entertainment; providing a website featuring entertainment information, audio, video and prose presentations, and online-non-downloadable publications in the nature of fiction and non-fiction books, graphic novels and comics all in the field of entertainment; entertainment services, namely, arranging and conducting contests; providing current event news and information in the field of entertainment relating to contests, video, audio and prose presentations and publications all in the field of entertainment; providing on-line reviews of television shows and movies; providing a video-on-demand website featuring non-downloadable movies and films; providing a website featuring non-downloadable videos in the field of movies, television shows, and film trailers on a variety of topics; providing a searchable on-line entertainment database featuring on-line non-downloadable music, movies, television shows, multimedia presentations in the field of entertainment, audio files featuring music, comic books, and publications in the nature of entertainment; providing information on entertainment, movies and television shows via social networks.
09 - Scientific and electric apparatus and instruments
Goods & Services
Pre-recorded downloadable audio recordings featuring dramatic entertainment programs; pre-recorded video recordings featuring dramatic entertainment programs; pre-recorded downloadable audio and visual recordings featuring dramatic entertainment programs; pre-recorded audio and visual recordings in optical discs, DVD and CD format featuring dramatic entertainment program; and motion picture films featuring animated entertainment, action adventure, live action, comedy, musicals, drama and documentaries
41 - Education, entertainment, sporting and cultural services
Goods & Services
Entertainment in the nature of an ongoing television drama series; entertainment services, namely, an ongoing drama series provided through television, cable, the Internet and wireless communications networks; providing online non-downloadable comic books and graphic novels; providing a website featuring blogs and non-downloadable publications in the nature of books, graphic novels, comics and screenplays in the field of entertainment; providing a website featuring entertainment information, audio, video and prose presentations, and online-non-downloadable publications in the nature of fiction and non-fiction books, graphic novels and comics all in the field of entertainment; entertainment services, namely, arranging and conducting contests; providing current event news and information in the field of entertainment relating to contests, video, audio and prose presentations and publications all in the field of entertainment; providing on-line reviews of television shows and movies; providing a video-on-demand website featuring non-downloadable movies and films; providing a website featuring non-downloadable videos in the field of movies, television shows, and film trailers on a variety of topics; providing a searchable on-line entertainment database featuring on-line non-downloadable music, movies, television shows, multimedia presentations in the field of entertainment, audio files featuring music, comic books, and publications in the nature of entertainment; and providing information on entertainment, movies and television shows via social networks
41 - Education, entertainment, sporting and cultural services
Goods & Services
Entertainment in the nature of an ongoing television series in the fields of comedy and reality; entertainment services, namely, an ongoing television program in the fields of comedy and reality provided through television, cable, the Internet and wireless communications networks
09 - Scientific and electric apparatus and instruments
Goods & Services
Pre-recorded downloadable audio recordings featuring comedic entertainment programs; pre-recorded video recordings featuring comedic entertainment programs; pre-recorded downloadable audio and visual recordings featuring comedic entertainment programs
Disclosed are various embodiments for creating personalized insoles designed to provide physical comfort to the individual wearing shoes containing the personalized insoles. A three-dimensional (3D) foot scan is performed on the individual's feet to better understand the contours and geometry of each foot of the individual. In addition, a 3D insole scan of the current insole of the shoe is performed to determine an accurate outline of the insole as well as to identify any wear patterns and compression points within the insole. The 3D foot scan combined with the 3D insole scan is used to generate the personalized insole that is accurately sized to fit into the corresponding shoe. The personalized insole is designed to be inserted into the shoe in order to provide a supportive fit that is personalized for both the individual and shoe in order to minimize foot pain and/or discomfort for the individual.
A tote collapser can be used for unlatching and collapsing walls of a shippable tote. The collapser includes a mounting frame, and a set of collapser brackets. The mounting frame can include a first frame member and a second frame member movable relative to each other. The set of collapser brackets can include a first and a second collapser brackets attached to the first frame member, and a third and a fourth collapser brackets attached to the second frame member. Each collapser bracket can include an indexer shaped to align the tote in a specified orientation, a retainer extending perpendicularly from the indexer and configured to engage with top side of the sidewalls, a bumper shaped to engage with a latch on a sidewall of the tote, and a receiving space between the indexer and the bumper to receive a thickness portion of the sidewall of the tote.
Systems and methods are disclosed for dynamic adhesive application for roll-formed containers. In one embodiment, an example system may include a first conveyor configured to convey a packaging material, and an adhesive application system configured to apply adhesive to the packaging material, the adhesive application system having an adhesive applicator configured to dispense adhesive, and an applicator support assembly configured to support the adhesive applicator. The adhesive support assembly may be configured to move the adhesive applicator in two dimensions, where the adhesive application system can apply adhesive along three edges of the packaging material.
B65B 51/02 - Applying adhesives or sealing liquids
B65B 61/24 - Auxiliary devices, not otherwise provided for, for operating on sheets, blanks, webs, binding material, containers or packages for shaping or reshaping completed packages
B65D 5/02 - Rigid or semi-rigid containers of polygonal cross-section, e.g. boxes, cartons or trays, formed by folding or erecting one or more blanks made of paper by folding or erecting a single blank to form a tubular body with or without subsequent folding operations, or the addition of separate elements, to close the ends of the body
B65D 5/42 - Details of containers or of foldable or erectable container blanks
82.
Systems and methods for efficient package sorting for delivery
Systems, methods, and computer-readable media are disclosed for package sorting systems that facilitate efficient package sorting for delivery. The package sorting system may be a multi-level or single-level fulfillment or sortation center. The package sorting system may include a receiving area for receiving a large volume of packages and placing the packages into containers. The containers may be transported to an unloading area, which may be on a second story. At the unloading area, the packages may be unloaded from containers and placed into destination bins, each package in a destination bin destined for delivery within close proximity to one another. The destination container may be transported to a delivery area. At the delivery area the packages may be loaded into delivery vehicles for distributing the packages. The package sorting system may include drive units and package drive units for transporting containers and/or packages.
B65G 1/06 - Storage devices mechanical with means for presenting articles for removal at predetermined position or level
B65G 43/08 - Control devices operated by article or material being fed, conveyed, or discharged
B66F 9/06 - Devices for lifting or lowering bulky or heavy goods for loading or unloading purposes movable, with their loads, on wheels or the like, e.g. fork-lift trucks
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
A vehicle software release management system enables receipt of a vehicle software package and an associated test plan to generate a versioned software artifact set. The vehicle software release management system may initiate a workflow to manage testing, certification, and deployment of the software package based on the versioned software artifact set. The vehicle software release management system may facilitate testing of the vehicle software package, including generating test scripts and configuring the testing environment according to test configurations. The vehicle software release management system may facilitate certification of the vehicle software package according to the versioned software artifact set and manage the deployment/rollback to software package destinations.
Systems, devices, and methods are provided for cryptographic co-dependent across multiple roots of trust. A device may comprise two or more co-dependent roots of trust, such as a trusted execution environment (TEE) of a main application processor and a cryptographic subsystem comprising a cryptographic processor. A server may validate digital signatures generated by each co-dependent root of trust that is known for the device and then provide the device with cryptographic material that can be used to establish a shared secret. The shared secret may be used by the device to request the performance of a sensitive operation.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
A data producer service obtains a structured data payload containing one or more data fields. The data producer service obfuscates the one or more data fields in accordance with a policy to produce a sealed data payload. A data producer service transmits the sealed data payload to a data consumer service. The data consumer service unseals at least a portion of the obfuscated data fields of the sealed data payload in accordance with an access policy. Sealed data payloads may further be encrypted.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/33 - User authentication using certificates
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
86.
Data store on a device and related access controls
A data store of a device and related controls are described. For example, a first application of the device sends first data to the data store. The first data permits use of the data store by a plurality of applications. The first application receives second data from a second application executing remotely from the device and, based at least in part on the first data, sends the second data to the data store. The first application also receives a read request of a third application of the device to read the second data from the data store. The first application determines a permission of the third application to access the data store based at least in part on the first data. As such, the first application sends the second data to the to the third application.
This disclosure describes a system that models the complexity of image labeling tasks utilizing image data, labeling instructions, and label requirements. A labeling service of a service provider network includes an application that determines a task complexity value based on a data complexity value, a cognitive complexity value, and a product complexity value. The task complexity value is used to predict or estimate needed resources for an image labeling task for labeling image data, e.g., the time and effort needed to label (annotate) the image data. Once the needed resources are estimated, associated costs may also be estimated. The needed resources and associated costs may be provided to a user that submitted the image data, who may then provide an indication with respect to proceeding with the image labeling task.
G06V 10/96 - Management of image or video recognition tasks
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
Techniques for reducing latency in processing of audio data, where the latency may be caused in detecting audio of interest in the audio data, are described. A device that captures audio data may include a detection component to determine when the audio data includes audio of interest (e.g., device-directed speech), and an audio embedding generator to generate embedding vectors for the captured audio data while the detection component processes the audio data. The device may generate an embedding vector for audio data captured at the device for a duration of time; determine, at the end of the duration of time, that the audio data represents audio of interest; and send the embedding vector to an audio processing component (e.g., an automatic speech recognition component) for processing.
Techniques for resuming a skill session are described. A system receives a user input, determines a skill to execute with respect to the user input, opens a skill session, and causes the skill to execute. After the skill executes, the skill indicates the skill session is to be placed in a background state, resulting in the user being able to conduct one or more skill sessions while the skill processes in the background state. Sometime after placing the skill session in the background state, the skill requests the system to resume the skill session. If the system determines the skill session is to be resumed, the system sends data to the skill indicating that the skill session will be resumed. Once the skill session is to be resumed, the system places the skill session in an active state, and calls the skill to resume processing of the skill session.
The present application provides techniques for implementing a skill component, configured to perform an assessment of a user, as part of a speech processing system. The system may receive a natural language user input requesting assistance. The skill component may, using one or more machine learning models, determine at least one characteristic of the natural language input (e.g., lexical embedding, acoustic embedding, topic, tone, etc.). The skill component may determine state data for a present session, where the state data indicates a topic of the natural language user input and/or a user state associated with the natural language user input. The skill component may determine past state data of one or more past sessions, and generate a question to the user based on the state data for the natural language user input and the past state data.
An apparatus for use at an inventory location stowing items comprises an array of sensor elements. Each sensor element comprises a plurality of conductive elements that are driven as a self-capacitance sensor. Based on changes in capacitance values, interactions between a lane and user may be determined. The conductive elements may be selectively addressed to provide various physical resolutions and operational configurations. Some geometries of conductive elements provide information about position of an interaction along a long axis of the lane, as well as presence of items in the lane. The sensor element may include three conductors, stacked atop one another and separated by an insulator. To compensate for temperature and other effects, these the outermost conductors are grounded, and innermost conductor is driven. The array may be implemented on a rigid or flexible substrate. The array operates reliably in the presence of water condensation or small spills.
G01R 27/26 - Measuring inductance or capacitanceMeasuring quality factor, e.g. by using the resonance methodMeasuring loss factorMeasuring dielectric constants
G01R 35/00 - Testing or calibrating of apparatus covered by the other groups of this subclass
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
H03K 17/955 - Proximity switches using a capacitive detector
92.
Low-latency stateful load-balanced connections using stateless load balancers
A network connection is established between a client program and a particular request handler of a network-accessible service. The request handler is selected by a load balancer using an algorithm whose input includes configuration information of the service. The load balancer does not store flow state information for messages transmitted via the network connection. A networking manager of a host at which the client program runs stores the flow state information, including identification information of the particular request handler. Using the identification information, the networking manager causes additional messages directed to the service from the client program to be received at the particular request handler without using the load balancer as an intermediary.
Techniques for generating a capacity recommendation engine are described herein. First information that identifies capacity changes associated with shipping packages from one or more entities may be obtained. Each capacity change may be associated with a reason code that identifies a reason for the capacity change. Second information that identifies uncontrollable event data for one or more geographic areas that correspond to a delivery area for the one or more entities may be received. Historical information that includes historical capacity changes and associated reason codes from the one or more entities may be obtained. A machine learning algorithm may be implemented based on the first information, the second information, and the historical information. A recommendation may be generated for an entity using the machine learning algorithm. The recommendation may include a modification of a component associated with the shipping network of the entity for a future time period.
A patching service provides customers with a mechanism to automate patching of customer operated computing resources. A set of patch actions may be specified for various computing resource. A patch workflow may be used to deploy patches to the computing resource. The patch workflows may be generated based at least in part on attributes of the computing resources and the set of patch actions. The patch workflows may be stored and used to deploy patches to the customer operated computing resources.
Systems and methods are provided for tracking sensitive data within a plurality of storage units, where storage units include block storage volume(s) and/or “snapshot(s)” representing values of every block of a block storage volume or device at a particular point in time. A computing device may be configured to receive a notification identifying a first tainted storage unit. Subsequently, a subset of the plurality of storage units may be identified. Additional tainted storage units can be identified as tainted within the subset. This identification may depend on whether the storage units contain data blocks in common with the first tainted storage unit. Remedial action may be taken for storage units identified as tainted.
G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
97.
Privately sharing database data across provider network regions
Database data of a database service may be privately shared across provider network regions. A database producer can authorize an account of to access a database in another region of the provider network. The consumer of the database can associate the database in order to accept the permission to access the database. The database can then be created as an external table at a consumer database engine and metadata for the database privately shared between producer and consumer database engines that can be used to query the external table.
A method includes generating a set of training data, wherein a first training instance of the set of training data comprises a first plurality of messages between a first customer service agent and a first purported customer and a first label indicating whether one or more messages of the first plurality of messages are associated with malicious behavior; training a large language model (LLM) using the set of training data to generate messages; generating, by the LLM representing a second purported customer, a message associated with malicious behavior; receiving a response message from a second customer service agent based on the message associated with malicious behavior; and in response to the response message being an authorization, generating a feedback for the second customer service agent based on a number of responses before the response was an action.
Systems and techniques are disclosed for determining personally identifiable information in one or data file. An input data file is analyzed to determine whether it includes structured data based on an explicit indicator and/or header content. If it includes structured data, the data in the file is sampled and standardized for input to a machine-learned personally identifiable information that provide personally identifiable information detection results indicating quantities and types of personally identifiable information detected. The results are used with the input file to determine aggregated personally identifiable information results that may be presented to a user without exposing any personally identifiable information.
Generative machine learning models may be used to generate a transcreated version of input data. A transcreation request to generate a translated version of the input data may be received. One or more instructions for the input data may be determined based at least in part on an aggregated transcreation style identified for the request. A generative machine learning model may be used to generate the translated version of text in a source natural language that is associated with the input data according to the one or more instructions. The created version of the input data may be provided.