Abstract: Technologies are provided for increasing electronic noise of a memory device during an initialization of the memory device and performing initialization operations, such as memory access centering operations, for the memory device while the electronic noise of the memory device is increased. The electronic noise of the memory device can be increased by increasing a level of ground bounce (or ground noise) during a training phase of the memory device. Increasing the ground noise can comprise increasing an inductance across a memory of the memory device during the training phase. The inductance can be increased by deactivating one or more ground connections of the memory during the memory's training phase. Additionally or alternatively, the inductance can be increased by activating one or more inductors connected to one or more ground connections of the memory during the memory's training phase.
Abstract: This disclosure describes, in part, techniques for collecting image data representing item identifiers, such as barcodes. For instance, system(s) may receive image data representing images, where the images depict at least a portion of an identifier located on an item. The system(s) may then identify a first portion of the image data representing an image that that is associated a low confidence level. Next, the system(s) may identify a second portion of the image data representing additional images that are associated high confidence levels. Using results for this the second portion of the image data, the system(s) may determine a ground truth result for the first portion of the image data. The system(s) may then store, in one or more databases, data representing the ground truth result in association with the first portion of the image data.
Abstract: Methods and integrated circuit devices for recording memory-side page activity are provided. Memory systems typically have a combination of faster memory devices and slower memory devices. Frequently accessed memory pages (hot pages) should be maintained in the faster memory devices while less frequently accessed memory pages (cold pages) should be maintained in the slower memory devices. To determine the memory pages that should be moved between the faster memory devices and the slower memory devices, counters may be implemented to count transactions to the memory pages. The counter values may be periodically checked to identify memory pages that can be moved from faster memory devices to slower memory devices, and vice-versa.
Type:
Grant
Filed:
September 30, 2019
Date of Patent:
September 17, 2024
Assignee:
Amazon Technologies, Inc.
Inventors:
Ali Ghassan Saidi, Adi Habusha, Roland Paterson-Jones, Ohad Gdalyahu
Abstract: A metric monitor may obtain data that measures network traffic of a network, through which a host may be accessed by clients, over one or more time windows. The metric monitor may determine one or more metrics based on the data obtained from the network over the time windows, which may represent performance of the network to the host. The metric monitor may provide the metrics to a workload management system to determine placement of a particular workload at the host.
Type:
Grant
Filed:
December 10, 2020
Date of Patent:
September 17, 2024
Assignee:
Amazon Technologies, Inc.
Inventors:
Fabien Chraim, Antonio Gomariz Penalver, Irina Lopatina
Abstract: Techniques are described for providing emulation software used to emulate voice assistant-enabled devices, and further for a platform used to perform and monitor large scale load tests against fleets of voice assistant-enabled device emulators. The emulation software broadly provides a collection of software libraries for creating emulated instances of a wide range of voice assistant-enabled device types capable of interacting with voice assistant services provided by a cloud provider network. The emulation software further includes software interfaces and observable data streams that enable developers to configure and extend emulated device capabilities, to obtain debugging and performance information, and the like. The described load testing platform further enables developers to test the performance of voice assistant-related technologies (including e.g., device features, voice assistant apps, third-party services, etc.) at scale.
Abstract: In a network environment, access to network devices is controlled using a multi-leveled locking mechanism. A method of applying the locking mechanism may include managing device locks configured to control access of a plurality of tools to a memory of a network device, where the device locks include a first level of device lock associated with a first priority and a second level of device lock associated with a second priority that is higher than the first priority. The method may further include generating an interleaved signal responsive to issuing the second level of device lock to a second tool while a first tool has an active first level of device lock. The interleaved signal may be communicated to the first tool and the first tool may coordinate subsequent changes to the network device in accordance with changes to the network device that are made by the second tool after the interleaved signal is generated.
Abstract: Online block parsing techniques are performed that use anchor tokens. When a log entry of a log stream is received, the log entry may be tokenized into an ordered series of log units. The log units may be matched with anchor tokens in previously initialized log templates to determine a matching log template. A log template based on the matching log template may be provided with the tokenized log entry to a destination for a parsed version of the log stream.
Abstract: Systems and methods for selectively ignoring an occurrence of a wakeword within audio input data is provided herein. In some embodiments, a wakeword may be detected to have been uttered by an individual within a modified time window, which may account for hardware delays and echoing offsets. The detected wakeword that occurs during this modified time window may, in some embodiments, correspond to a word included within audio that is outputted by a voice activated electronic device. This may cause the voice activated electronic device to activate itself, stopping the audio from being outputted. By identifying when these occurrences of the wakeword within outputted audio are going to happen, the voice activated electronic device may selectively determine when to ignore the wakeword, and furthermore, when not to ignore the wakeword.
Type:
Grant
Filed:
September 6, 2023
Date of Patent:
September 17, 2024
Assignee:
Amazon Technologies, Inc.
Inventors:
James David Meyers, Kurt Wesley Piersol
Abstract: High-fidelity measurements of qubits are achieved by increasing a number of measurements taken by use of a swap operation and a readout qubit, deflating a bosonic qubit for which measurement outcomes are affected by single photon/phonon loss events, deflating a bosonic qubit enabling readout in other basis, and evolving the qubit under a Hamiltonian that couples a mode to be measured to another mode where the Hamiltonian is selected from a three wave mixing interaction, and/or a combination of these techniques.
Type:
Grant
Filed:
November 13, 2020
Date of Patent:
September 17, 2024
Assignee:
Amazon Technologies, Inc.
Inventors:
Harald Esko Jakob Putterman, Kyungjoo Noh, Christopher Chamberland, Amir Safavi-Naeini, Oskar Jon Painter, Patricio Arrangoiz Arriola
Abstract: An electronic signature service of a provider network may specify a virtual electronic signing device (ESD) to be used by user accounts (e.g., retail sales businesses) to generate digital signatures for documents (e.g., sales receipts). The electronic signature service may establish an isolated virtual network (IVN) on behalf of the client (e.g., taxing authority or other entity), which is managed by the client via a client interface. The electronic signature service may instantiate, on behalf of a user account, an ESD compute instance based on the virtual ESD specification. In response to receiving a request for a digital signature of a document, the ESD compute instance generates a digital signature based on the document and sends the digital signature to the user account. The service may store the signature and associated document data, which can subsequently be used for auditing (e.g., tax auditing).
Abstract: A customer of a computing resource provider is associated with a key provided by a key management system. When the key is generated, a value is generated and encrypted with the key. In response to a detection of a trigger to re-encrypt the customer's key, the encrypted value is used to verify validity of the re-encrypted customer's key before committing it to storage and made available for use.
Type:
Grant
Filed:
September 30, 2019
Date of Patent:
September 17, 2024
Assignee:
Amazon Technologies, Inc.
Inventors:
Matthew J. Campagna, Jin Peng, Jason Wrang
Abstract: A memory access tracking agent detects an access request directed to an in-memory representation of a target data structure. The agent obtains run-time context information pertaining to the request, including thread stack information. Indications of the occurrence of the access request and the context information are provided to a destination.
Abstract: A configuration policy applicable to one or more target resources is identified. An indication of a non-compliance remediation workflow corresponding to the policy, indicating an automated action, is obtained via a programmatic interface. In response to detecting that a particular target resource does not comply with the configuration policy, implementation of the automated action is initiated.
Type:
Grant
Filed:
December 3, 2021
Date of Patent:
September 17, 2024
Assignee:
Amazon Technologies, Inc.
Inventors:
Boo Boon Khoo, Lisa A. Winn, Archana Sridhar Mungara, Dennis Ono Tjandra, Thomas Smith, Jamie Layne White
Abstract: A technology is described for resolving device credentials for a device. An example method may include receiving device credentials for management by a service provider. The device credentials may include authentication credentials and a device policy document that specifies permissions used to authorize resource actions requested by the device. In response to receiving a message requesting that a resource perform a resource action associated with the device, the device may be authenticated using the authentication credentials, and the resource action may be authorized using the permissions specified in the device policy document.
Type:
Grant
Filed:
March 22, 2017
Date of Patent:
September 17, 2024
Assignee:
Amazon Technologies, Inc.
Inventors:
Rameez Loladia, Ashutosh Thakur, William Alexander Stevenson, Ramkishore Bhattacharyya
Abstract: A container may be created, and a plurality of domain name system (DNS) configuration objects may be added to the container. The plurality of DNS configuration objects may comprise at least one of private DNS zones, outbound forwarding rules, DNS query log configurations, and firewall rule groups. The container may be associated with a plurality of private logical networks. The container may also be across a plurality of customer accounts. Based on the plurality of DNS configuration objects, a plurality of DNS operations associated with the plurality of private logical networks may be performed. The plurality of DNS operations may comprise at least one of DNS query resolution, DNS query outbound forwarding, configuring a query log, or configuring a firewall.
Type:
Grant
Filed:
September 29, 2021
Date of Patent:
September 17, 2024
Assignee:
Amazon Technologies, Inc.
Inventors:
Matthew Engskow, Vikram Saurabh, Yu Wang, Huida Tao, Daniel Bradley, Bing Xia, Mekias Mebrahtu Yohannes, Abhinav Punj, Jeffrey J. Damick