Patent application number | Description | Published |
20130212165 | DISTRIBUTED STORAGE SYSTEM WITH WEB SERVICES CLIENT INTERFACE - A distributed, web-services based storage system. A system may include a web services interface configured to receive, according to a web services protocol, a given client request for access to a given data object, the request including a key value corresponding to the object. The system may also include storage nodes configured to store replicas of the objects, where each replica is accessible via a respective unique locator value, and a keymap instance configured to store a respective keymap entry for each object. For the given object, the respective keymap entry includes the key value and each locator value corresponding to replicas of the object. A coordinator may receive the given client request from the web services interface, responsively access the keymap instance to identify locator values corresponding to the key value and, for a particular locator value, retrieve a corresponding replica from a corresponding storage node. | 08-15-2013 |
20130212167 | MANAGING RESOURCE CONSOLIDATION CONFIGURATIONS - Systems and methods for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance information associated with processing a request corresponding to two or more embedded resources. The processing device uses the processed performance information to determine a consolidation configuration to be associated with a subsequent request for the content associated with the two or more embedded resources. In some embodiments, in making such a determination, the processing device assesses performance information collected and associated with subsequent requests corresponding to the content associated with the two or more embedded resources and using each of a variety of alternative consolidation configurations. Aspects of systems and methods for generating recommendations to use a particular consolidation configuration to process a subsequent request corresponding to the content associated with the two or more embedded resources are also provided. | 08-15-2013 |
20130318153 | LOCALITY BASED CONTENT DISTRIBUTION - A system and method for content distribution are provided. A content provider generates a network topology having one or more subnetworks made up of content sources. The content provider segments content, such as applications, into segments for distribution. The content provider then distributes the content such that for each identified subnetwork, each content segment is distributed to a content source. Subsequent, client computing device requests for content can be serviced by selecting a content source in a particular subnetwork selected for delivering the requested content to the client computing device to minimize traffic flow of the requested content through the nodes of the distribution network. | 11-28-2013 |
20130346480 | TECHNIQUES FOR CAPTURING DATA SETS - Techniques, including systems and methods, for capturing data sets include performing a client-side two-phase commit to ensure one or more data consistency conditions. A logical volume may represent a data set that is distributed among a plurality of physical storage devices. One or more client devices are instructed to block at least acknowledgment of write operations. When the one or more client devices have blocked at least acknowledgment of write operations, one or more servers in communication with the physical storage devices are instructed to capture corresponding portions of the data set. When the servers have been instructed to capture corresponding portions of the data set, the client devices are instructed to resume at least acknowledgment of write operations. | 12-26-2013 |
20140062939 | Electronic Device Component Stack - Electronic devices that include reflective displays for rendering content, touch sensors layered atop the reflective displays for detecting touch inputs, front lights layered atop the touch sensors for lighting the reflective displays and antiglare components for reducing glare caused by ambient light. This disclosure also describes techniques for assembling electronic devices including these component stacks. | 03-06-2014 |
20140082050 | Fulfillment of Applications to Devices - Disclosed are various embodiments for facilitating fulfillment of applications to various devices that may be associated with a user account. When a request to obtain access to an application is received, a device characteristic of the various devices is identified and a corresponding application binary associated with the application is identified. The corresponding application binaries are distributed to the devices corresponding to the user account. Additionally, an appropriate browser accessible application is identified and access can be granted to a device depending upon the capabilities of a browser executed by the device. | 03-20-2014 |
20140082164 | DYNAMICALLY ALLOCATING NETWORK ADDRESSES - Disclosed are various embodiments for dynamically allocating network addresses to devices based on demand. A first network address allocation is initially assigned to a subdivision of a network including multiple computing devices. A router for the subdivision is configured to implement the first network address allocation. Data indicating a reconfiguration of the computing devices is obtained. A second network address allocation is subsequently assigned to the subdivision of the network based at least in part on the reconfiguration of the computing devices. The router for the subdivision is reconfigured to implement the second network address allocation. | 03-20-2014 |
20140082403 | Adaptive Service Timeouts - Disclosed are various embodiments for a timeout management application. Latency data for executing services is obtained. The used service capacity is calculated. If the service capacity is outside of a predefined range, the timeout of a selected service is reconfigured. | 03-20-2014 |
20140085245 | DISPLAY INTEGRATED CAMERA ARRAY - Motions or gestures can provide input to an electronic device by capturing images of a feature used to provide the motions or gestures, then analyzing the images. Conventional cameras have a limited field of view, creating a “dead zone” near the device that is outside the field of view. Various embodiments utilize an array of detectors positioned behind a display screen that are configured to operate as a large, low resolution camera. The array can resolve objects within a distance of the device sufficient to cover at least a portion of the dead zone. In some embodiments the device can include one or more infrared (IR) emitters to emit IR light that can be reflected by an object in the dead zone and detected by the detectors. The use of multiple emitters at different locations enables at least some depth information to be determined from the array images. | 03-27-2014 |
20140089778 | Progressive Image Rendering Utilizing Data URI Enhancements - Architectures and techniques for providing an initial portion of media content of a network site to a user equipment. One technique includes embedding an initial portion of the media content within hypertext markup language (HTML) for displaying a page of the network site. A uniform resource identifier (URI) is embedded within the HTML for displaying the page of the network site that includes the media content, where the URI indicates a location of the media content. The HTML including the initial portion of the media content and the URI is provided to the user equipment for displaying the page of the network site that includes the media content on the user equipment. | 03-27-2014 |
20140090033 | Context Aware Content Distribution - Described herein are systems and methods for context aware content distribution. Content such as e-books, presentations, audio, video, applications, and so forth may be distributed to user devices after establishing a trust relationship. An invitation to provide content may be sent to a user device based on the context of the user device, such as proximity to pre-determined devices, location, and so forth. Upon acceptance of the invitation to opt-in to receiving content, a trust relationship may be established which provides for the transfer of content to the user device. | 03-27-2014 |
20140100715 | FILLING AN ORDER AT AN INVENTORY PIER - A system includes a inventory pier and a mobile drive unit. The inventory pier includes a first side and a second side. The first side includes defined areas at which inventory holders are designated to be stationed. The inventory pier is operable to receive inventory items from at least one of the inventory holders at least one of the defined areas. The mobile drive unit is operable to transport an order holder along the second side of the inventory pier, wherein the order holder is operable to receive an inventory item from the inventory pier at a location along the second side of the inventory pier. | 04-10-2014 |
20140100769 | REPLENISHING A RETAIL FACILITY - A system includes storage shelves and display shelves at a retail facility. The system also includes a management module operable to determine to replenish a display shelf with an inventory item stored by a storage shelf. The management module is also operable to coordinate movement of mobile drive units to replenish the display shelf with the inventory item at an inventory restocking station. The system also includes a first mobile drive unit and a second mobile drive unit. The first mobile drive unit is operable to receive first instructions from the management module to transport the display shelf to the inventory restocking station. The second mobile drive unit is operable to receive second instructions from the management module to transport the storage shelf to the inventory restocking station. At the inventory restocking station, the display shelf receives the inventory item. | 04-10-2014 |
20140100998 | FILLING AN ORDER AT AN INVENTORY PIER - A system includes an inventory pier, a mobile drive unit, and a management module. The inventory pier includes a defined area arranged to station an inventory holder. The inventory holder stores an inventory item. The mobile drive unit is operable to transport an order holder. The management module is operable to calculate a metric associated with demand for the inventory item. Based at least in part upon the metric, the management module is operable to select, from a plurality of inventory holders, the inventory holder storing the inventory item to be stationed at the defined area of the inventory pier. The management module is further operable to receive an order for the inventory item and instruct the mobile drive unit to transport the order holder to the inventory pier. The order holder is operable to receive the inventory item from the inventory holder proximate to the defined area. | 04-10-2014 |
20140111615 | Automated Optical Dimensioning and Imaging - Disclosed are various embodiments for automatically generating media and/or data associated with an item. An item imaging apparatus may apply an imaging sequence based on an item being imaged to gather media and/or data associated with the item. The media and/or data associated with the item may be used in the generation of additional data associated with the item. The media and/or data may be in a profile of the item in an electronic marketplace. | 04-24-2014 |
20140118257 | GESTURE DETECTION SYSTEMS - The amount of power and processing needed to enable gesture input for a computing device can be reduced by utilizing one or more gesture sensors. A gesture sensor can have a lower resolution but larger pixel pitch than conventional cameras. The lower resolution can be achieved in part through skipping or binning pixels in some embodiments. The low resolution enables a global shutter to be used with the gesture sensor. The gesture sensor can be connected to an illumination controller for synchronizing illumination from a device emitter with the global shutter. In some devices, the gesture sensor can be used as a motion detector, enabling the gesture sensor to run in a low power state unless there is likely gesture input to process. At least some processing and circuitry is included with the gesture sensor such that functionality can be performed without accessing a central processor or system bus. | 05-01-2014 |
20140129690 | CUSTOM RESOURCES IN A RESOURCE STACK - A resource stack managed by a resource stack provider is created based on a resource stack template that integrates a custom resource from a second provider into the resource stack using a notification system with the second provider. For example, a customer may create a template that defines a resource stack that comprises resources available from the resource stack provider and one or more custom resources provided by a second provider. When a resource stack is created, resources available from the resource stack provider may be provisioned. Custom resources may be initialized by notifying the provider of the custom resource of the requested integration of the custom resource with the resource stack and requested configuration details. The custom resource provider may respond with an indication of successful integration when the custom resource has been successfully initialized. After initializing the resources, the resource stack may be enabled for use. | 05-08-2014 |
20140136782 | Dynamic Selection of Storage Tiers - An operating system is configured to receive a request to store an object that does not specify the location at which the object should be stored. The request might also include an optimization factor and one or more object location factors. The operating system might also generate object location factors or retrieve object location factors from one or more external locations. Object location factors might also be utilized that are based upon properties of the object to be stored. Utilizing the object location factors, and the optimization factor if provided, the operating system dynamically selects an appropriate storage tier for storing the object. The tiers might include a local storage tier, a local network storage tier, a remote network storage tier, and other types of storage tiers. The object is then stored on the selected storage tier. The object may be retrieved from the storage tier at a later time. | 05-15-2014 |
20140136942 | DELIVERY AND DISPLAY OF PAGE PREVIEWS DURING PAGE RETRIEVAL EVENTS - A system and process are disclosed for providing users with page previews during page loading events, such that the delay experienced before the display of page content is reduced. The previews may include screenshots of the pages or of portions thereof, and may be generated periodically and cached by the system for delivery to user devices. The process of generating and delivering the previews via the Internet or some other network may be implemented partly or wholly within an intermediary system that sits logically between the user devices and content servers. The process may be used with existing browsers without the need for any browser modifications, or may be used with a “preview-aware” browser that includes special program code for providing page previews. | 05-15-2014 |
20140149355 | STREAMING RESTORE OF A DATABASE FROM A BACKUP SYSTEM - A distributed data warehouse system may maintain data blocks on behalf of clients in multiple clusters in a data store. Each cluster may include a single leader node and multiple compute nodes, each including multiple disks storing data. The warehouse system may store primary and secondary copies of each data block on different disks or nodes in a cluster. Each node may include a data structure that maintains metadata about each data block stored on the node, including its unique identifier. The warehouse system may back up data blocks in a remote key-value backup storage system with high durability. A streaming restore operation may be used to retrieve data blocks from backup storage using their unique identifiers as keys. The warehouse system may service incoming queries (and may satisfy some queries by retrieving data from backup storage on an as-needed basis) prior to completion of the restore operation. | 05-29-2014 |
20140149356 | AUTOMATIC REPAIR OF CORRUPTED BLOCKS IN A DATABASE - A distributed data warehouse system maintains data blocks on behalf of clients, and stores primary and secondary copies of data blocks on different disks or nodes in a cluster. The data warehouse system may back up data blocks in a key-value backup storage system. In response to a query targeting a data block previously stored in the cluster, the data warehouse system may determine whether a consistent, uncorrupted copy of the data block is available in the cluster (e.g., by applying a consistency check). If not (e.g., if a disk or node failed), the data warehouse system may automatically initiate an operation to restore the data block from the backup storage system, using a unique identifier of the data block to access a backup copy. The target data may be returned in a query response prior to restoring primary and secondary copies of the data block in the cluster. | 05-29-2014 |
20140149357 | BLOCK RESTORE ORDERING IN A STREAMING RESTORE SYSTEM - A distributed data warehouse system may maintain data blocks on behalf of clients, and may store primary and secondary copies of each data block on different disks or nodes in a cluster. The warehouse system may back up data blocks in a remote key-value backup storage system. A restore operation may retrieve data blocks from backup storage using their unique identifiers as keys (while incoming queries are serviced) in response to a failure or a query targeting data that was lost or corrupted. The order in which data blocks are restored may be dependent on the relative likelihood that they will be accessed in the near future (e.g., based on how recently or frequently they were accessed, written, or backed up; the values of one or more access counters associated with each data block; or how recently a database table containing data in each data block was loaded). | 05-29-2014 |
20140149537 | DISTRIBUTED CACHING CLUSTER MANAGEMENT - A management system may enable and monitor a cache or other cluster to make the cluster configuration-aware such that initialization and changes to the underlying structure of the cluster can be dynamically updated. For example, a distributed memory caching system may provide initial configuration to a client from a memory caching node referenced by an alias provided by a configuration endpoint. Updates of configuration may be retrieved from memory caching nodes, each storing current configuration of the cache cluster. A management system monitors changes to the cache cluster, such as provisioning of new caching nodes, and updates the configuration stored in the caching nodes for retrieval by a client. | 05-29-2014 |
20140149590 | SCALING COMPUTING CLUSTERS IN A DISTRIBUTED COMPUTING SYSTEM - A currently operating computing cluster that has multiple nodes storing cluster data may be scaled. A cluster scaling request may be received for the current cluster indicating a change in a number or type of nodes in the current cluster. In response to receiving the cluster scaling request, a new cluster may be created as indicated in the cluster scaling request, a copy of the cluster data from the current cluster to the nodes in the new cluster may be initiated, a network endpoint for the current cluster may be moved to the new cluster, and the current cluster may be disable. The current cluster may, in some embodiments, respond to read access requests during the copy of the cluster data. | 05-29-2014 |
20140149754 | GESTURE DETECTION MANAGEMENT FOR AN ELECTRONIC DEVICE - The amount of power and processing capacity needed to process gesture input for a computing device is reduced by splitting the management of sensors, used to detect the input, among different processing components. A relatively high power processor system can monitor the sensors and determine the presence of gestures when the device is in an active state. When the device, or at least the processor system, enters a sleep mode, sensor management is transferred to a microcontroller connected to at least a portion of the sensors, such that the microcontroller can analyze the sensor data to determine the likelihood of a wake action being performed. In response to detecting a wake action, the microcontroller can contact a component such as a power management component to place the processor system in an active state, and enable the processor system to resume management of the sensors. | 05-29-2014 |
20140156632 | SYSTEM-WIDE QUERY OPTIMIZATION - A locally optimized plan for executing a command using a sequence of steps can be determined for a single computing node. However, the locally optimized sequence of steps may not be optimized for a combined system comprising multiple computing nodes, any one of which may be tasked with executing the command. A plan that is optimized for the combined system may be determined by comparing the predicted cost of locally optimized plans for computing nodes in the combined system. | 06-05-2014 |
20140163977 | SPEECH MODEL RETRIEVAL IN DISTRIBUTED SPEECH RECOGNITION SYSTEMS - Features are disclosed for managing the use of speech recognition models and data in automated speech recognition systems. Models and data may be retrieved asynchronously and used as they are received or after an utterance is initially processed with more general or different models. Once received, the models and statistics can be cached. Statistics needed to update models and data may also be retrieved asynchronously so that it may be used to update the models and data as it becomes available. The updated models and data may be immediately used to re-process an utterance, or saved for use in processing subsequently received utterances. User interactions with the automated speech recognition system may be tracked in order to predict when a user is likely to utilize the system. Models and data may be pre-cached based on such predictions. | 06-12-2014 |
20140171088 | DETERMINING MOBILITY STATES FOR A USER DEVICE - A mobility module receives sensor data from one or more sensors and determines the movement of type of movement of a user device, based on the sensor data. Based on the movement or rate of movement, the mobility module transitions the user device to a mobility state. The user device evaluates the power levels of radio signals from neighbor base stations using one or more measurement parameters that are scaled of offset based on the mobility state. | 06-19-2014 |
20140176415 | DYNAMICALLY GENERATING HAPTIC EFFECTS FROM AUDIO DATA - Haptic effects are dynamically generated for content presentation on a device through analysis of the content. During content playback, audio data for the content may be analyzed to determine low frequency audio data. The low frequency audio data is mapped from a low frequency range to a haptic control frequency range of one or more haptic actuators included in the device. This mapping may be used to generate a control signal to drive the one or more haptic actuators. The haptic effects and the content may be synchronized to one another during the presentation of the content on the device. The haptic actuator control signal may be amplified proportionally to the amplitude of the low frequency audio data. | 06-26-2014 |
20140176614 | Dynamically Updating an Electronic Paper Display by Computational Modeling - Embodiments provide techniques for updating pixels of an electrophoretic display through computational modeling of a current state of each pixel. A model buffer may store data for a modeled current state of each pixel in a display, providing a prediction of a current color state for each pixel based on voltages previously applied to the pixel. Upon receiving a frame to be displayed, including a target state for each pixel, embodiments determine which of a set of voltages (e.g., positive, negative, or neural/zero voltages) optimally alters the state of the pixel to be as close as possible to the target state. These voltage(s) may be applied to each pixel in an iterative manner, with each voltage determined based on the current modeled state of the pixel. | 06-26-2014 |
20140180697 | IDENTIFICATION OF UTTERANCE SUBJECTS - Features are disclosed for generating markers for elements or other portions of an audio presentation so that a speech processing system may determine which portion of the audio presentation a user utterance refers to. For example, an utterance may include a pronoun with no explicit antecedent. The marker may be used to associate the utterance with the corresponding content portion for processing. The markers can be provided to a client device with a text-to-speech (“TTS”) presentation. The markers may then be provided to a speech processing system along with a user utterance captured by the client device. The speech processing system, which may include automatic speech recognition (“ASR”) modules and/or natural language understanding (“NLU”) modules, can generate hints based on the marker. The hints can be provided to the ASR and/or NLU modules in order to aid in processing the meaning or intent of a user utterance. | 06-26-2014 |
20140181395 | VIRTUAL TAPE LIBRARY SYSTEM - A virtual tape library system is used to back up data from a client archive system expecting physical tape operations onto logical data containers and/or a metadata store of a storage service by emulating the physical tape operations. For example, a virtual tape library appliance is installed at a customer premise location to interface with a client archive system. The virtual tape library appliance provides virtual interfaces to appear as physical tape library subsystems, such as tape drives and media changing interfaces. However, these virtual interfaces are supported by logical data containers in a storage service and a metadata store. The virtual tape library system allows the client archive system to make requests to import new virtual tapes, export virtual tapes for archiving, store virtual tapes at a virtual location, load and eject virtual tapes into a virtual tape drive and operate on virtual tapes in a virtual tape drive. | 06-26-2014 |
20140181396 | VIRTUAL TAPE USING A LOGICAL DATA CONTAINER - A virtual tape is constructed using a logical data container to aid in emulating a virtual tape by providing tape functionality, reducing seek time and improving recovery time in case of a failure. For example, the logical data container may comprise a global header followed by one or more data block groups. The global header may provide metadata to track record locations, file mark locations, virtual tape data in memory, data validation information and a virtual tape head location. This metadata in the global tape header may help reduce seek time, improve recovery time using last known data in memory, erase a virtual tape and provide tape head position. Data block groups may include information that validates data, provides error correction, provides record and file marks and provides storage of client data. | 06-26-2014 |
20140188815 | Annotation of Resources in a Distributed Execution Environment - A distributed execution environment includes various resources, such as instances of computing resources, hardware resources, software resources, and others. A resource state viewing tool executing in conjunction with the distributed execution environment provides access to data regarding the state of each resource in the form of a resource page associated with the resource. The resource page for a resource might also include one or more annotations assigned to the resource by a user or by a component within the distributed execution environment. The annotations might have associated expiration data, such as an expiration time or event, which may be utilized to expire the annotations. The annotations might also have a namespace assigned thereto that is utilized when responding to requests to retrieve the annotations. The annotations might also have permissions assigned thereto that identify the rights of one or more users and/or components to read, modify, or delete the annotations. | 07-03-2014 |
20140195337 | BROWSER INTERFACE FOR ACCESSING SUPPLEMENTAL CONTENT ASSOCIATED WITH CONTENT PAGES - A user of a computing device may view a content page on a display of a computing device. One aspect of the disclosure is a browser user interface than enables the user to flip the content page (or portion thereof) over (e.g., via a touchscreen gesture) to view supplemental content, such as metadata, associated with the content page (or portion thereof). While viewing the metadata on the back side of the content page in some embodiments, the user can perform a second or reverse flip operation to return to the original page. The user may be presented with options to flip the page backward and forward multiple times to view multiple flipped pages presenting additional supplemental content. The supplemental content may include virtually any information in which the user may be interested and/or that is related or similar to the content page. | 07-10-2014 |
20140195890 | BROWSER INTERFACE FOR ACCESSING SUPPLEMENTAL CONTENT ASSOCIATED WITH CONTENT PAGES - A user of a computing device may view a content page on a display of a computing device. One aspect of the disclosure is a browser user interface than enables the user to flip the content page (or portion thereof) over (e.g., via a touchscreen gesture) to view supplemental content, such as metadata, associated with the content page (or portion thereof). While viewing the metadata on the back side of the content page in some embodiments, the user can perform a second or reverse flip operation to return to the original page. The user may be presented with options to flip the page backward and forward multiple times to view multiple flipped pages presenting additional supplemental content. The supplemental content may include virtually any information in which the user may be interested and/or that is related or similar to the content page. | 07-10-2014 |
20140201094 | UNAUTHORIZED PRODUCT DETECTION TECHNIQUES - An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain. | 07-17-2014 |
20140201129 | EFFICIENT QUERY PROCESSING USING HISTOGRAMS IN A COLUMNAR DATABASE - A probabilistic data structure is generated for efficient query processing using a histogram for unsorted data in a column of a columnar database. A bucket range size is determined for multiples buckets of a histogram of a column in a columnar database table. In at least some embodiments, the histogram may be a height-balanced histogram. A probabilistic data structure is generated to indicate for which particular buckets in the histogram there is a data value stored in the data block. When an indication of a query directed to the column for select data is received, the probabilistic data structure for each of the data blocks storing data for the column may be examined to determine particular ones of the data blocks which do not need to be read in order to service the query for the select data. | 07-17-2014 |
20140207918 | INSTANCE HOST CONFIGURATION - Methods and apparatus for instance host configuration are disclosed. A system includes a plurality of instance hosts configurable for resource instances of a network-accessible service, and control servers to manage remote configuration of the instance hosts. In response to an instance configuration request from a client, a selected control server transmits, to a selected instance host, a sequence of one or more commands. The selected instance host instantiates a remote command executor. The remote command executor initiates configuration operations corresponding to the command sequence, and terminates. The selected control server provides a response to the instance configuration request, based at least in part on results of the operations initiated by the executor. | 07-24-2014 |
20140207919 | INSTANCE CONFIGURATION ON REMOTE PLATFORMS - Methods and apparatus for instance configuration on remote platforms are disclosed. A storage medium comprises program instructions to implement a control server configured to, in response to an instance configuration request directed to a network-accessible service implemented using resource instances whose configuration is managed from within the provider network, determine whether configuration operations corresponding to the request are to be performed at a remote platform external to the provider network. In response to determining that configuration operations are to be performed at a remote platform, the control server issues commands to a selected remote platform; otherwise, it issues commands to an instance host of the provider network. Based on results of the commands, the control server provides a response to the request. | 07-24-2014 |
20140208097 | SECURING RESULTS OF PRIVILEGED COMPUTING OPERATIONS - A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order to secure the results of privileged operations on systems such as the operating system (OS) kernel and/or the hypervisor. The interface allows a public key to be included into a request to perform a privileged operation on a hypervisor and/or kernel. The kernel and/or hypervisor use the key included in the request to encrypt the results of the privileged operation. In some embodiments, the request itself can also be encrypted, such that any intermediate parties are not able to read the parameters and other information of the request. | 07-24-2014 |
20140208111 | SECURE VIRTUAL MACHINE MIGRATION - A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order to enable secure migration of virtual machine instances between multiple host computing devices. The migration is performed by receiving a request to migrate a virtual machine where the request includes public keys for the source host computing and the destination host computing. The source and destination hosts use the public keys to establish an encrypted session and then use the encrypted session to migrate the virtual machine. | 07-24-2014 |
20140208123 | PRIVILEGED CRYPTOGRAPHIC SERVICES IN A VIRTUALIZED ENVIRONMENT - A privileged cryptographic service is described, such as a service running in system management mode (SMM). The privileged service is operable to store and manage cryptographic keys and/or other security resources in a multitenant remote program execution environment. The privileged service can receive requests to use the cryptographic keys and issue responses to these requests. In addition, the privileged service can measure the hypervisor at runtime (e.g., either periodically or in response to the requests) in an attempt to detect evidence of tampering with the hypervisor. Because the privileged service is operating in system management mode that is more privileged than the hypervisor, the privileged service can be robust against virtual machine escape and other hypervisor attacks. | 07-24-2014 |
20140208414 | USE OF FREEFORM METADATA FOR ACCESS CONTROL - Approaches are described for security and access control for computing resources. Various embodiments utilize metadata, e.g., tags that can be applied to one or more computing resources (e.g., virtual machines, host computing devices, applications, databases, etc.) to control access to these and/or other computing resources. In various embodiments, the tags and access control policies described herein can be utilized in a multitenant shared resource environment. | 07-24-2014 |
20140214195 | Inventory System with Connectable Inventory Holders - A system includes a first mobile drive unit and a second mobile drive unit. The first mobile drive unit is operable to dock with a first item holder at a first end of a column of connected item holders. The second mobile drive unit is operable to dock with a second item holder at a second end of the column of connected item holders. The system also includes a management module that is operable to instruct the first mobile drive unit and the second mobile drive units to transport the column of connected item holders from a first location to a second location. | 07-31-2014 |
20140214196 | Inventory System with Connectable Inventory Holders - A system includes a station and a management module. The station includes a queue having a first row and a second row. The management module is operable to instruct a first mobile drive unit to move a first group of connected item holders from the second row to the first row, instruct the first mobile drive unit to move the first group of connected item holders along the station such that one or more items stored by the first group of connected item holders are processed at the station, and after the one or more items from the first group of items are processed, instruct a second mobile drive unit to move a second group of connected item holders from the second row to the first row. | 07-31-2014 |
20140214234 | Inventory System with Connectable Inventory Holders - An apparatus includes an interface and a processor. The interface is operable to wirelessly transmit instructions to one or more mobile drive units. The processor is communicatively coupled to the interface and is operable to instruct a mobile drive unit to transport a first shipping container storing at least one completed order to a shipping station, instruct the mobile drive unit to connect the first shipping container to a second shipping container to form a group of connected shipping containers. The processor is also operable to detect a trigger event, and in response to detecting the trigger event, coordinate movement of one or more mobile drive units to transport the group of connected shipping containers onto a vehicle for shipment. | 07-31-2014 |
20140214918 | COMMUNICATION BETWEEN APPLICATION COMPONENTS DISTRIBUTED AMONG DEVICES - Disclosed are various embodiments for facilitating communications between application components that are distributed among many devices across a network. This allows for the application to execute as if on one device even though the application components are on many devices. A component interface is generated for the application components. The component interface intercepts communications sent from an application component, locates the intended receiving application component, and generates a component interface packet with the location. The component interface packet is then put into a network stream. The receiving component listens to the stream to obtain component interface packets that indicate the location of the device running the receiving application component. The component interface decodes the component interface packets intended for components associated with the component interface and sends communications encoded in the packet to the application components. | 07-31-2014 |
20140214919 | ARCHITECTURE FOR SHARING BROWSING SESSION HISTORIES - Features are disclosed for enabling users to efficiently store and share browsing sessions or portions thereof with other users or the general public. Browsing session requests and other activities may be sent to an intermediary system, which can retrieve requested content and store a representation of the requested content or data regarding the requested content. The stored data may be organized as a saved browsing session such that users may access the shared browsing session at a subsequent time and view the browsing session substantially in its entirety. Users may search for shared browsing sessions and access data regarding the requests made during a browsing session. In addition, data regarding client devices used during shared browsing sessions may be tracked and associated with the shared browsing sessions such that subsequent users can search for shared browsing sessions based partly on such device characteristics. | 07-31-2014 |
20140215035 | DISTRIBUTION OF APPLICATION COMPONENTS AMONG DEVICES - Disclosed are various embodiments for distributing application components among many devices across a network for optimal execution of the application. A distribution is determined based on performance metrics, distribution profiles, and/or other indications of how to distribute application components for execution on many devices. In various embodiments, an application component may be simultaneously executed on many devices or on one device. The application components execute as if on one device even though they are distributed among many devices. Performance metrics indicate how well an application component executes in a device. During execution, the application components may be redistributed if another distribution is indicated by performance tolerances. If application components are redistributed, the execution of the application continues as if no redistribution had occurred. | 07-31-2014 |
20140235326 | Delegating Video Game Tasks Via a Sharing Service - Video game tasks are delegated using a sharing service. A first computing device is configured to execute a game application. The first computing device can receive a request from a first user to delegate play of the game application to a second user so that the second user can attempt to complete a game task on behalf of the first user by controlling the game application from a second computing device that is associated with the second user. Control of the game application can be made available from the second computing device to the first computing device via a sharing session that is created and managed by a sharing service to which the first computing device and the second computing device are connected. | 08-21-2014 |
20140236775 | PURCHASE OF PHYSICAL AND VIRTUAL PRODUCTS - A computing device can include a retail application and a virtual environment application. The retail application can display a product purchase interface and receive a request to purchase the product from a user. When the user orders the product, the retail application can provide the virtual environment application with an indication that the product has been purchased. In response to the user's purchase of the product, the virtual environment application can grant the user's virtual environment account with ownership of a virtual version of the product. | 08-21-2014 |
20140237490 | Application Programming Interface for a Sharing Service - A computing device executes an application that is configured to call a sharing service application programming interface (“API”) to create a sharing session via a sharing service. The application can call the sharing service API to utilize one or more methods exposed by the sharing service API to connect to the sharing service and initiated the creation of the sharing session. The computing device can join the sharing session with one or more other computing devices. The computing device can receive data via the sharing session from one or more of the other computing devices. The data can include screen data and/or application data. | 08-21-2014 |
20140238705 | FIRE SUPPRESSION SYSTEM FOR SUB-FLOOR SPACE - A system includes a raised floor, a sub-floor space below the raised floor, electrical components in the sub-floor space, and a fire suppression device coupled to the raised floor. The fire suppression device dispenses fire suppression material the electrical components in the sub-floor space. | 08-28-2014 |
20140244580 | PREDICTIVE STORAGE SERVICE - A predictive storage application selectively determines files from a computing system to send to a predictive storage service that makes the files available for use in another computing system. The predictive storage application may receive events indicating a use of files. The predictive storage application may determine that a file has enough importance and send it to a predictive storage service. Other aspects of the disclosure are described in the detailed description, figures, and claims. | 08-28-2014 |
20140244585 | DATABASE SYSTEM PROVIDING SINGLE-TENANT AND MULTI-TENANT ENVIRONMENTS - A database service may provide multi-tenant and single-tenant environments in which tables may be maintained on behalf of clients. The service (or underlying system) may create database instances and tables in either or both types of environments (e.g., by default or according to various parameter values specified in requests to create the instances or tables). When receiving and servicing requests directed to a table hosted in a single-tenant environment, the system may elide at least some of the authentication or metering operations that would be performed when servicing requests directed to tables hosted in a multi-tenant environment. Tables may be moved from a single-tenant environment to a multi-tenant environment, or vice versa, automatically by the system (e.g., dependent on an observed, expected, or desired throughput) or in response to an explicit request from a client to do so (e.g., to increase throughput or reduce cost). | 08-28-2014 |
20140244785 | COMPUTING INFRASTRUCTURE FOR CONFIGURABLE-QUALITY RANDOM DATA - Methods and apparatus for a computing infrastructure for configurable-quality random data are disclosed. A storage medium stores program instructions that when executed on a processor designate some servers of a provider network as members of a pool of producers of random data usable by random data consumers. The instructions, when executed, determine a subset of the pool to be used to supply a collection of random data intended for a random data consumer, and one or more sources of random phenomena to be used to generate the collection of random data. The instructions, when executed, initiate a transmission of the collection of random data directed to the random data consumer. | 08-28-2014 |
20140245425 | CONFIGURABLE-QUALITY RANDOM DATA SERVICE - Methods and apparatus for a configurable-quality random data service are disclosed. A method includes implementing programmatic interfaces enabling a determination of respective characteristics of random data to be delivered to one or more clients of a random data service of a provider network. The method includes implementing security protocols for transmission of random data to the clients, including a protocol for transmission of random data to trusted clients at devices within the provider network. The method further includes obtaining, on behalf of a particular client and in accordance with the determined characteristics, random data from one or more servers of the provider network, and initiating a transmission of the random data directed to a destination associated with the particular client. | 08-28-2014 |
20140247346 | APPROACHES FOR DEVICE LOCATION AND COMMUNICATION - An electronic device can utilize image capture technology to detect the presence and location of another device. Using this information, the electronic device can display, in a user interface, a graphical element representing a detected device, along with identity information and the location of the detected device relative to the electronic device. The location of each detected device relative to the electronic device can be tracked and thus the graphical element can be updated in the user interface. | 09-04-2014 |
20140250215 | CONFIGURATION AND VERIFICATION BY TRUSTED PROVIDER - A computing resource is loaded with the code or data, and an audited record of the loaded code or data is generated. Furthermore, a configuration integrity is generated based on the record of the loaded code or data. The configuration integrity verifier is sent to a requestor for verification of the code or data, the configuration integrity verifier being usable as a trusted verification of the loaded code or data. | 09-04-2014 |
20140253305 | FORCE SENSING INPUT DEVICE - User input is accepted by a force sensing resistor (“FSR”) assembly, a force sensing capacitor (“FSC”) or both. The FSR or FSC assemblies may be located within an input device, such as behind a device exterior, display, and so forth. A force applied to the device exterior proximate to the assembly may result in activation of the assembly. The activation may be processed as input and used to determine and then perform a particular action. The particular action may be based at least in part on a particular portion of the assembly which has been activated, a magnitude of applied force, or both. A haptic output may be provided on activation to provide feedback to a user. | 09-11-2014 |
20140254089 | STALL CONTAINMENT OF RACK IN A DATA CENTER - A system for managing air flow computing devices in a rack includes a stall and filler elements. The stall includes a stall top panel and two side panels spaced apart from one another. The stall accommodates a rack computing system. The filler elements fill gaps between the computing devices of the rack computing systems and the panels of the stalls. An air moving system moves air from the cold aisle through cold-aisle facing air inlets of the computing devices. The filler elements inhibit air moving toward the cold aisle-facing inlets from leaking through gaps between the computing devices of the rack computing systems and the stall panels such that the filler elements inhibit air moving toward inlets in the computing devices from leaking through the gaps between the computing devices in the rack and the stall panels. | 09-11-2014 |
20140254090 | MANAGING AIRFLOW SUPPLIED THROUGH SOFT DUCTS - A system for conveying air from one location to another includes a soft duct having a passage and an air flow control device. The air flow control device can be operated to vary a cross sectional area of a portion of the passage of the soft duct. | 09-11-2014 |
20140258155 | APPLICATION MARKETPLACE FOR VIRTUAL DESKTOPS - Systems and methods are presented for accessing an application available from a data center of a program execution service. The metadata associated with a user computing device may be used to determine whether the user computing device is authorized to access the application through a virtual desktop instance. At least a portion of the application may be executed by the virtual desktop instance and provided to the user. Applications may be purchased, licensed, or rented by a user. | 09-11-2014 |
20140258374 | AUTOMATED DATA CENTER SELECTION - Systems and methods are presented for automatically selecting a data center that can communicate with a user computing system over a connection that provides reduced or minimal latency. In some cases, the system can select the data center based on the calculation of one or more latency factors that correlate, at least in part, to the latency of a communication channel between the data center and the user computing system. Further, the selected data center may be identified from a set of data centers that include one or more computing resources the user has identified as desiring to access. | 09-11-2014 |
20140258450 | AUTOMATED DESKTOP PLACEMENT - Systems and methods are presented for enabling a user to provide rules for the placement of computing resources at a data center for an entity that employs or is associated with the user. The data center can use the placement rules to select a data center computer system to host computing resources for a user. The rules can be used to establish diversity in computing resource placement at the data center thereby reducing the number of users who lose access to computing resources when a specific data center computer suffers a failure. Further, the placement rules can be used to facilitate configuration of the computer resources for the user based, for example, on the user's employment responsibilities. | 09-11-2014 |
20140258506 | TRACKING APPLICATION USAGE IN A COMPUTING ENVIRONMENT - Disclosed are various embodiments for reporting as well as tracking usage and/or installation of an application in a machine instance in a computing environment. A machine instance can execute an application and can be associated with a storage volume on which the application is installed. The application, or an installer utility associated with the application, can report installation and/or usage of the application to an application usage service. | 09-11-2014 |
20140267077 | User Device with a Primary Display and a Substantially Transparent Secondary Display - This disclosure relates to systems and methods for projecting an image from a primary display onto a secondary display and enabling the user to interact with the user device by touching the secondary display. The secondary display may be positioned to intercept the light emitted from the primary display. The secondary display may be a transparent or semi-transparent component that reflects or refracts the image on the primary display. | 09-18-2014 |
20140267167 | MANAGING SENSORY INFORMATION OF A USER DEVICE - External mobile device sensors may be provided that are configured to manage sensory information associated with motion of objects external to the mobile device. In some examples, the object motion may be detected independent of contact with the device. In some examples, a device may include a screen with a first sensor (e.g., a touch sensor). The device may also include at least a second sensor external to the screen. Instructions may be executed by a processor of the device to at least determine when an object is hovering over a first graphical user interface (GUI) element of the screen. Additionally, in some cases, a second GUI element may be provided on the screen such that the second GUI element is rendered on the screen adjacent to a location under the hovering object. | 09-18-2014 |
20140270528 | LOCAL IMAGE ENHANCEMENT FOR TEXT RECOGNITION - Various embodiments enable regions of text to be identified in an image captured by a camera of a computing device for preprocessing before being analyzed by a visual recognition engine. For example, each of the identified regions can be analyzed or tested to determine whether a respective region contains a quality associated with poor text recognition results, such as poor contrast, blur, noise, and the like, which can be measured by one or more algorithms. Upon identifying a region with such a quality, an image quality enhancement can be automatically applied to the respective region without user instruction or intervention. Accordingly, once each region has been cleared of the quality associated with poor recognition, the regions of text can be processed with a visual recognition algorithm or engine. | 09-18-2014 |
20140279905 | TOKEN-BASED ADMISSION CONTROL FOR REPLICATED WRITES - Methods and apparatus for token-based admission control for replicated writes are disclosed. Data objects are divided into partitions, and corresponding to each partition, at least a master replica and a slave replica are stored. A determination as to whether to accept a write request directed to the partition is made based at least in part on one or more of (a) available throughput capacity at the master replica, and (b) an indication, obtained using a token-based protocol, of available throughput capacity at the slave replica. If the write request is accepted, one or more data modification operations are initiated. | 09-18-2014 |
20140280482 | DETERMINING APPROPRIATE BROWSING APPLICATIONS FOR SELECTED NETWORK RESOURCES - A network resource, such as a page, may be loaded or rendered in different manners on a plurality of different browsers. Data and information regarding the loading and/or rendering of various network resources on a variety of browsers, including data or information regarding errors, latencies or customer ratings of the loading or rendering of such resources on such browsers, may be evaluated in order to identify the most appropriate browser for viewing a requested network resource. If that network resource is available to a user who requests the network resource, then a recommendation or an instruction to view the network resource in the most appropriate browser may be provided to the user. | 09-18-2014 |
20140280872 | INVENTORY SERVICE FOR DISTRIBUTED INFRASTRUCTURE - Disclosed are various embodiments for an inventory application. Machine instances execute a monitoring service to determine the process names of applications executed in the machine instance. An inventory application identifies the applications executed on the machine instances as a function of data obtained from the monitoring services. Analytics reports can be generated from data embodying the identified applications. | 09-18-2014 |
20140280873 | INFERRING APPLICATION INVENTORY - Disclosed are various embodiments for an application inventory application. Computing resource usage data and configuration data is obtained for machine instances executed in a cloud computing architecture. The usage data and configuration data are used as factors to identify applications executed in the machine instance. Reports embodying the application identifications are generated. | 09-18-2014 |
20140280884 | NETWORK TRAFFIC MAPPING AND PERFORMANCE ANALYSIS - An overlay network analysis method obtains data including but not limited to client packet traffic data on an overlay network, and performs one or more analyses based on the obtained data to generate and output topological and/or performance information for the overlay network and/or the network substrate on which the overlay network is implemented. Client traffic data collected for specific client resource instances may be analyzed to generate performance metrics for the overlay network between the instances. Aggregated client traffic data for specific clients may also be analyzed to generate mappings of the clients' private network implementations on the overlay network, as well as performance metrics for the clients' private networks on the overlay network. In addition, client traffic data from multiple clients may be aggregated and analyzed to generate mappings and performance metrics for the overlay network as a whole. | 09-18-2014 |
20140282269 | NON-OCCLUDED DISPLAY FOR HOVER INTERACTIONS - A computing device can be configured to recognize when a user hovers over or is within a determined distance of an element displayed on the computing device to perform certain tasks. Information associated with the element can be displayed when such a hover input is detected. This information may comprise a description of what tasks are performed by selection of the element. This information could also be an enlarged version of the element to help the user disambiguate selection of multiple elements. The information can be displayed in a manner such that at least substantive portions of the information would not be obscured or occluded by the user. | 09-18-2014 |
20140282936 | PROVIDING DEVICES AS A SERVICE - Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device to a network of the customer hosted by the computing resource provider. The computing resource provider reconfigures a set of computing resources so that the devices of the customer are able to communicate with the device as if the device was in the customer's own network. | 09-18-2014 |
20140289463 | REPLICATION TARGET SERVICE - A data storage service receives commands configured according to a communication protocol, such as a small computer system interface protocol. The commands may be replications of commands sent to a block-level data storage system, such as a storage area network. Data to be written by execution of the commands is persisted using an object-based data storage system. When read commands are received, data blocks can be extracted from the data objects in which they are stored. | 09-25-2014 |
20140297835 | VISUALIZATION OF RESOURCES IN A DATA CENTER - A system and method are disclosed for monitoring usage of resources (e.g., hosts, instances, applications, etc.) in a datacenter. Customers, developers and system administrators can collect and track metrics, gain insight, and react to keep applications and businesses running smoothly by providing system-wide visibility into resource utilization, application performance, and operational health. Users can programmatically retrieve monitoring data and view heat maps to assist in troubleshooting, spotting trends, and taking automated action based on the state of a cloud environment. Users can further monitor resources in real-time, so that metrics such as CPU utilization, latency, memory usage, transaction volumes, error rates, etc. can be visualized. | 10-02-2014 |
20140297866 | USER-DEFINED POOLS - One or more resource slots are allocated to a customer according to a first set of pricing policies. The customer is allowed to identify at least one of the resource slots and identify other users allowed to access the identified resource slots according to a second pricing policy, the second pricing policy being designated by the customer. | 10-02-2014 |
20140297867 | CAPACITY MERGING FOR USER-DEFINED POOLS - One or more resource slots are allocated to at least two entities according to a first set of pricing policies. The entities are allowed to identify users allowed to access identified resource slots according to a second pricing policy, the second pricing policy being designated by one or both of the users. | 10-02-2014 |
20140297868 | BURST CAPACITY FOR USER-DEFINED POOLS - One or more resource slots are instantiated and allocated to a user according to a first set of pricing policies. The user is allowed to identify at least one of the resource slots and identify other users allowed to access the identified resource slots according to a second pricing policy, the second pricing policy being designated by the user. An indication is received that a request has been received that exceeds a computing capacity. In response, additional computing capacity to allow fulfillment of the request is allocated. | 10-02-2014 |
20140300704 | AUTOMATIC RECTIFICATION OF STEREO IMAGING CAMERAS - An electronic device can have two or more pairs of cameras capable of performing three-dimensional imaging. In order to provide accurate disparity information, these cameras should be sufficiently rectified. Automatic rectification can be performed by periodically capturing images with the cameras of interest, and locating matching feature points in corresponding images captured by those cameras. Small misalignment errors can be treated as linear translations, such that a set of linear equations can be used to solve for the misalignments. Another process can process a set of homographies for the cameras until a cost function converges. Various other approaches can be used as well, such as to directly solve for yaw, pitch, and roll errors. Once this information is obtained, the misalignment values (or related values) can be stored for use in correcting images subsequently captured by those cameras. | 10-09-2014 |
20140304104 | IDENTIFYING PART INTERCHANGES AT ELECTRONIC MARKETPLACES - Electronic marketplaces offer a variety of items to customers over the Internet. Where two or more items are interchangeable with or equivalent to one another, such items may be utilized in the same applications and in the same manner, and marketed and sold together as interchanges or equivalents. Such items may be identified as interchangeable with or equivalent to one another based on a qualitative or quantitative score, which may consider any available information or attributes regarding the items, and may increase or decrease over time as the confidence in a determination of interchangeability or equivalence improves or declines. Moreover, such information or attributes may be identified from any source, such as sellers, vendors or manufacturers of the items, and qualitative or quantitative scores indicative of the accuracy or reliability of such information or attributes may be assigned to such sources, as well. | 10-09-2014 |
20140310249 | DATABASE COST TRACING AND ANALYSIS - Web services hosted at a data center may employ architectural patterns that tend to obfuscate the source of queries made against databases and other resources in the data center. The queries may be the source of performance, capacity or utilization problems, and may contribute to the cost of hosting the web service. Web service invocations may be associated with identifiers that can be included in modified queries sent to databases and other resources. Summarized cost information may be calculated based on recorded associations between the identifiers and query performance information. | 10-16-2014 |
20140310390 | ASYMMETRIC PACKET FLOW IN A DISTRIBUTED LOAD BALANCER - A distributed load balancer in which a router receives packets from at least one client and routes packet flows to multiple ingress servers. For unknown packet flows, an ingress server cooperates with primary and secondary flow trackers to establish connections to server nodes. For known packet flows, the ingress server sends the packets to target server nodes. The server nodes randomly select egress servers for outgoing packets of the packet flows. The ingress servers, flow trackers, and egress servers are implemented by multiple load balancer nodes in a load balancer node layer. The ingress and egress servers for a given packet flow may be on different load balancer nodes. The load balancer nodes may use a consistent hash function to compute a consistent hash ring for the nodes according to packet flow client/public endpoint pairs so that nodes associated with given packet flows can be located. | 10-16-2014 |
20140310391 | MULTIPATH ROUTING IN A DISTRIBUTED LOAD BALANCER - A distributed load balancer in which a router receives packets from at least one client and routes packet flows to multiple load balancer nodes. The router exposes a public IP address and the load balancer nodes all advertise the same public IP address to the router. The router may implement a per-flow hashed multipath routing technique, for example an equal-cost multipath (ECMP) routing technique, to distribute the flows across the load balancer nodes. Thus, the multiple load balancer nodes may service a single public endpoint. The load balancer nodes may advertise to the router according to the Border Gateway Protocol (BGP). Rather than advertising itself, however, a load balancer node may be advertised to the router by one or more neighbor load balancer nodes; the neighbor nodes may terminate the BGP sessions with the router in response to determining that the load balancer node has failed. | 10-16-2014 |
20140310417 | CONNECTION PUBLISHING IN A DISTRIBUTED LOAD BALANCER - A connection publishing method for a distributed load balancer in which a router receives packets from at least one client and routes packet flows to multiple load balancer (LB) nodes, which in turn distribute the packet flows among multiple server nodes. A load balancer (LB) module on each server node determines and publishes a list of active connections between client(s) and the server (a connection publishing packet) back to the LB nodes. The LB module may randomly select a LB node to receive the packet. Upon receiving the packet, the LB node processes the connection information in the packet, distributing the connection information among appropriate LB nodes. Receiving the connection publishing information from the server nodes refreshes leases for the connections on the LB nodes. | 10-16-2014 |
20140310418 | DISTRIBUTED LOAD BALANCER - A distributed load balancer in which a router receives packets from at least one client and routes packet flows to multiple load balancer (LB) nodes according to a per-flow hashed multipath routing technique. For a given packet flow, the LB nodes randomly select a server node as a target for the packet flow from among multiple server nodes and send a connection request to the server node. A load balancer module on the server node makes the decision on whether to accept or reject the connection based on one or more metrics indicating a respective server's current load. If the module accepts the connection request, a connection is established between the server and the client. Otherwise, the load balancer nodes may select another server node and try again. The connections established between clients and servers pass through the load balancer nodes, but are not terminated at the load balancer nodes. | 10-16-2014 |
20140310509 | HOST RECOVERY USING A SECURE STORE - Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network. | 10-16-2014 |
20140310510 | REMOTE ATTESTATION OF HOST DEVICES - Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network. | 10-16-2014 |
20140324785 | EFFICIENT READ REPLICAS - A database system may receive a write request that specifies a modification to be made to a particular data record stored by the database system. A log record representing the modification to be made to the particular data record may be sent to a storage service of the database system. An indication (e.g., log record or other indication) that indicates a cached version of the particular data record stored in a read replica's cache is stale may be sent to a read replica. For a subsequent read of the particular data record received by the read replica, the read replica may request the particular data record from the storage service. | 10-30-2014 |
20140325037 | Automated Creation of Private Virtual Networks in a Service Provider Network - Data may be collected regarding the configuration of a network, such as a customer network operated by a customer of a service provider operating a service provider network. An appropriate interface, such as a user interface, may be provided to allow a user to add, delete, or otherwise modify the collected network configuration data. The collected, and possibly modified, network configuration data may then be utilized to create a private virtual network in the service provider network. The private virtual network may be implemented such that it has the same, or similar, network configuration as the customer network. | 10-30-2014 |
20140325116 | SELECTIVELY PERSISTING APPLICATION PROGRAM DATA FROM SYSTEM MEMORY TO NON-VOLATILE DATA STORAGE - Application program data stored in system memory may be selectively persisted. An indication may be provided to an application program that an application data object or a range of application data stored in system memory may be treated as persistent. Data backup may be enabled for the application data object or range of application data in the event of a system failure, copying the application data object or range of application data from system memory to non-volatile data storage. Upon recovery from a system failure, further data backup for the application data object or the range of application data may be disabled. In some embodiments, at least some of the application data object or range of application data may be recovered for the application program to access. Data backup for the application data object or the range of application data may also be re-enabled. | 10-30-2014 |
20140325345 | Consistent Scaling of Web-Based Content Across Devices Having Different Screen Metrics - Concepts and technologies are described herein for consistent scaling of web content across devices having different screen metrics. According to some of the concepts and technologies disclosed herein, a computing device may receive web content and select a scaling factor for scaling the web content for presentation on a screen component associated with the computing device. The computing device may select a scaling factor for scaling the web content and utilize the scaling factor and a screen metric of the screen component to calculate a value, which the computing device may then apply to a font size property of a root document object model (“DOM”) node of the web content. The computing device may then scale the web content for presentation on the screen component based upon the value of the font size property and rem units defined in the web content. | 10-30-2014 |
20140327624 | RESIN-ENCAPSULATED PORTABLE MEDIA DEVICE - Portable multimedia devices, and techniques for their manufacture, are provided that feature functional parts embedded with a resin matrix that obviates the need for traditional structural components such as midframes and/or outer casings. The resin matrix may be provided through the use of a flowable liquid resin that is flowed around the functional components within a mold cavity. The liquid resin may then be cured into the resin matrix. | 11-06-2014 |
20140331205 | Program Testing Service - A service provider network includes host computers that have various computing devices connected thereto. In order to test the operation of a program, a developer creates a program and one or more test cases for use in testing the program. The developer also identifies devices in the service provider network for use in testing the program. Once this selection has been made, a test request is submitted to the service provider network. When the service provider network receives the test request, the program is installed on the devices upon which testing is to be performed. The supplied test case is then utilized to test various aspects of the operation of the program on the devices. Once the testing of the program has completed, the results of the testing may be transmitted to the developer. A similar process might be utilized to test a program on a variety of device emulators. | 11-06-2014 |
20140331209 | Program Testing Service - A service provider network includes host computers that have various computing devices connected thereto. In order to test the operation of a program, a developer creates a program and one or more test cases for use in testing the program. The developer also identifies devices in the service provider network for use in testing the program. Once this selection has been made, a test request is submitted to the service provider network. When the service provider network receives the test request, the program is installed on the devices upon which testing is to be performed. The supplied test case is then utilized to test various aspects of the operation of the program on the devices. Once the testing of the program has completed, the results of the testing may be transmitted to the developer. A similar process might be utilized to test a program on a variety of device emulators. | 11-06-2014 |
20140333761 | AUTOMATED ITEM RETURN MACHINES - Automated return machines may receive items to be returned to an electronic marketplace by a customer, or repurchased by the electronic marketplace, within one or more designated chambers. The machines may gather one or more attributes of the item and utilize such attributes to confirm an identity of the item or to evaluate its condition, and to generate an offer for the repurchase of the item based on an anticipated demand for the item as well as a strategy or plan to distribute the item, either directly from the automated return machine or from a facility designated by an electronic marketplace. If the offer is declined, the item may be returned to the customer. If the offer is accepted, a credit for the item may be remitted to the customer, and the item may be added to the inventory at the electronic marketplace and made available for resale to other customers. | 11-13-2014 |
20140337393 | TRANSACTION ORDERING - Nodes of a database service may receive a read request to perform a read of a record stored by the database service and a transaction request to perform a transaction to the record. First and second indications of time may be associated with the read and transaction, respectively. A potential read anomaly (e.g., fuzzy read, read skew, etc.) may be detected based, at least in part, on a determination that the first indication of time is within a threshold value of the second indication of time. In response to detecting the potential read anomaly, the read may be performed after the transaction specified by the transaction request, regardless of whether the first indication of time is indicative of an earlier point in time than the second indication of time. | 11-13-2014 |
20140337832 | User-Influenced Placement of Virtual Machine Instances - A service provider network includes functionality for allowing a customer to influence the placement of virtual machine instances on server computers by specifying a placement strategy. Placement strategies may be shared among customers of the service provider network, and the placement strategies and the publishers of the placement strategies might be rated. Vendor-agnostic placement strategies might also be utilized to identify a service provider network for executing a virtual machine instance. A placement strategy that includes dynamically evaluated parameters might also be utilized to modify virtual machine instances in a customer fleet on an ongoing basis. | 11-13-2014 |
20140337833 | User-Influenced Placement of Virtual Machine Instances - A service provider network includes functionality for allowing a customer to influence the placement of virtual machine instances on server computers by specifying a placement strategy. Placement strategies may be shared among customers of the service provider network, and the placement strategies and the publishers of the placement strategies might be rated. Vendor-agnostic placement strategies might also be utilized to identify a service provider network for executing a virtual machine instance. A placement strategy that includes dynamically evaluated parameters might also be utilized to modify virtual machine instances in a customer fleet on an ongoing basis. | 11-13-2014 |
20140337834 | User-Influenced Placement of Virtual Machine Instances - A service provider network includes functionality for allowing a customer to influence the placement of virtual machine instances on server computers by specifying a placement strategy. Placement strategies may be shared among customers of the service provider network, and the placement strategies and the publishers of the placement strategies might be rated. Vendor-agnostic placement strategies might also be utilized to identify a service provider network for executing a virtual machine instance. A placement strategy that includes dynamically evaluated parameters might also be utilized to modify virtual machine instances in a customer fleet on an ongoing basis. | 11-13-2014 |