Abstract: A computing system for adjusting voltage regulation including a main processing module, a secondary processing module that executes requested computation tasks, and a voltage regulation module connected to the secondary processing module that regulates its output voltage according to a regulation law depending on at least one regulation parameter. The system also includes a first digital bus that transfers requested computation tasks from the main processing module to the secondary processing module and transfers results of the requested computation tasks from the secondary processing module to the main processing module. The system also includes a second digital bus that transfers regulation parameters from the main processing module to the voltage regulation module.
Abstract: The invention relates to a method (200) for authenticating a user in a first device comprising the following steps: sending (212), by an authentication client of said first device or said application, to an authentication server (308), an authentication request, in response to said authentication request, sending (216) by the authentication server (308) a first message comprising an authentication URL and a transaction identifier, opening (218) said URL in a web browser running on a second user device (310), previously enrolled with said authentication server (308), verifying (222) the identity of said user by said second user device (310), and when said verification is successful, providing (224) by said second user device (310) to said authentication server (308), a proof of enrollment stored in said second device (310) during the enrollment of said second device (310), in order to authenticate said user. The invention also relates to a computer program and a system implementing such a method.
Abstract: A method for optimizing the run parameters of a software application on an information processing platform, consisting of iteratively optimizing said parameters on each execution of said application, wherein, for each execution of said application (11), a set of said parameters is determined and a run time of said application with said parameters is determined, and an association between said set and said run time is stored in order to create a history (25); and wherein said set is determined by implementing a genetic optimization algorithm comprising a step (21) consisting of selecting two sets of parameters from said history; a step (22) consisting of creating a new set of parameters by recombining said two sets of parameters; and a step (23) of random mutation of said new set of parameters.
Type:
Grant
Filed:
June 26, 2020
Date of Patent:
June 11, 2024
Assignee:
BULL SAS
Inventors:
Sophie Robert, Gaël Goret, Soraya Zertal
Abstract: A connecting module that includes a body to engage with a computing resource, a first lever having a first end pivotally coupled to a first side of the body, and a second lever having a first end pivotally coupled to a second side of the body, second ends of both levers being latched with a front side of the body. The connecting module includes an actuator disposed on the front side of the body to allow disengagement of the module from the computing resource upon actuation, and to unlatch the second ends of each of the first lever and the second lever from the front side of the body. The first lever and the second lever are manually deflected with respect to first ends to allow travel of the module in a direction inward and outward with respect to the computing resource.
Abstract: The invention includes a method for calibrating at low frequency and in-flight a goniometry apparatus including an antenna array, on board an air carrier. The method includes for an angular position of reception, calibrating the airborne goniometry apparatus at a given frequency, comprising transmitting, by means of a calibration transmitter, at the given frequency and in the direction of the goniometry apparatus, at least two calibration signals, with polarizations orthogonal to each other. The method also includes measuring a response of the antenna array for each of the signals. The invention also includes a system implementing such a method.
Abstract: An extension for a supercomputer rack, the extension including a reinforcement frame, defining a rectangular through-opening, and at least one fluidic connection support mounted to the reinforcement frame. The at least one fluidic connection support includes an upstream circuit, configured to convey a refrigerant liquid to a plurality of connectors configured to be each connected via a cold flexible manifold to a cooling circuit of a compute blade of a server, and a downstream circuit, configured to collect the heated refrigerant liquid having passed through a compute blade of a server via a hot flexible manifold and a plurality of collection connectors. The extension is configured to be positioned at a rear end of the rack.
Type:
Application
Filed:
November 14, 2023
Publication date:
May 23, 2024
Applicant:
BULL SAS
Inventors:
Christophe CHAMPIGNY, Fabien DEMANGE, Antoine ROCHEREAU, Tom SIEG
Abstract: A computer implemented method for managing fuel stocks of at least one gas station including a fuel tank. The method includes, for each gas station, calculating an expected stock-out time, including predicting forecast fuel sales from a current starting date, determining a current net available stock based on a fuel stock in the fuel tank, based on the net available stock and the forecast fuel sales, calculating the expected stock-out time as the date at which the cumulated forecast fuel sales, from the current starting date, exceed the net available stock. The method also includes, for each gas station, predicting a lead duration, as a duration between a generation of a fuel purchase order and a corresponding fuel delivery at said gas station; and, for each gas station, generating a supply instruction based on the calculated expected stock-out time and the corresponding predicted lead duration.
Abstract: This invention relates to a computer implemented method (10) for processing a video file, said video file comprising audio content and visual content, the visual content comprising text content, wherein the method comprises: (S11) extracting the text content in the visual content; (S12) generating a context information for the audio content based on the text content extracted from said visual content; and (S13) converting the audio content into text by using the context information generated based on the text content extracted from the visual content of the video file.
Abstract: A method for determining at least one machine involved in an anomaly detected in a computing infrastructure comprising a plurality M of machines. This determination is performed by associating with each machine a state vector constructed using metrics and logs. Each vector is also associated with a time window. The monitoring of these vectors makes it possible to detect an anomaly that is then explained via an explanation method that makes it possible to assign an involvement indicator to each machine. The use of this indicator makes it possible to determine the machine most involved.
Type:
Grant
Filed:
January 25, 2022
Date of Patent:
May 21, 2024
Assignee:
BULL SAS
Inventors:
Pierre Seroul, Emeric Dynomant, Maxence Menager
Abstract: A method for calculating, using a non-quantum computer, a value of an observable sampled out of a quantum state is over-optimized for reducing memory size and calculation time. It may be useful for emulating a quantum circuit that produces the quantum state. The method uses implementations of Pauli rotations and Pauli operators that are simple and cheap, based on coordinate-switching operations.
Abstract: A method for authenticating a user on a user device with an authentication phase that includes: displaying a page of an authentication server in an internet browser, initiating an authentication process via this page to authenticate the user to a server remote from the user device, supplying to the user device a proof of authentication from the remote server, and opening an access session to the user device using this proof of authentication. Embodiments of the invention may include a computer program and an authentication system implementing such a method.
Abstract: A system (1) for examining an object (2) for errors comprises a monitoring device (3), a processing module (5), a capturing device (4) and a recognition module (6). The monitoring device (3) is designed to monitor at least one parameter. A specified range of the parameter defines a context within which a result of a recognition of at least parts of the object (2) is expected. The processing module (5) is designed to prove whether the monitored parameter is within the specified range and in this case to trigger the capturing device (4) which is designed to capture input data associated with the object (2). The recognition module (6) is pre-trained for recognizing the object (2) and to perform the recognition based on the input data. The recognition module (6) is designed to detect an error if a result of the recognition is not corresponding to the expected result.
Abstract: A computer-implemented method for memory management in a computer system configured for generating a signature of a binary data message m using a key B of a predetermined lattice-based structure is proposed, which comprises: determining coefficients of a 2×2 signature generation matrix SG, wherein the non-diagonal coefficients of the signature generation matrix SG are complex polynomials with a non-zero imaginary part, and the diagonal coefficients of the signature generation matrix SG are real polynomials; and determining a LDL representation of the signature generation matrix SG according to which SG is represented by a matrix product L.D.
Type:
Application
Filed:
October 5, 2023
Publication date:
May 9, 2024
Applicants:
BULL SAS, UNIVERSITE GRENOBLE ALPES, CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE
Inventors:
Etienne MARCATEL, Kevin LEBRET, Philippe ELBAZ-VINCENT
Abstract: The invention relates to an access management method comprising, in response to a request to access a local application (23) hosted on a second network (10): if the second network (10) is connected to a first network (8): receiving the access request by a master module (4) connected to the first network (8); determining, by the master module (4), access confirmation or denial data for access to the local application; and transmitting the determined access confirmation or denial data from the master module to the local application (23) otherwise: receiving the access request by a satellite module (6) connected to the second network (10); determining, by the master module (6), access confirmation or denial data for access to the local application (23); and transmitting the determined access confirmation or denial data from the satellite module to the local application (23).
Type:
Application
Filed:
October 19, 2023
Publication date:
April 25, 2024
Applicant:
BULL SAS
Inventors:
Christophe GUIONNEAU, Emmanuel DE SAINT STEBAN
Abstract: Method for supervising an additive manufacturing process performed by an additive manufacturing device (1), comprising providing a set of data to a supervision system (6), said set of data comprising product geometry data, production data, production history data, and measurements (7) from said additive manufacturing device (1), and, at said supervision system (6): predicting the occurrence of a defect (S1) from said set of data, when an occurrence of a defect is predicted, determining a type of defect (S2), and deciding for stopping (8, 5) or not (S3) said additive manufacturing process according to said type of defect and of a seriousness level.
Abstract: Method for providing a ledger of verified nodes for a network of nodes in a quantum internet, comprising: /a/ sending (101), by a central node (N-CH), first qubits (qb1) to a first node (N-U1) and second qubits (qb2) to a second node (N-U2), wherein each first qubit (qb1) is entangled with a second qubit (qb2); /b/ sending (102), by the central node (N-CH), digital coins to each first node (N-U1) and each second node (N-U2); /c/ saving (103) to a ledger: information regarding identities of the first, second and central nodes (N-U1, N-U2, N-CH), and information regarding a comparison of first information determined from the first qubits (qb1) to second information determined from the second qubits (qb2); and /d/ if the first information corresponds to the second information, sending (105), by the first and second nodes (N-U1, N-U2), said digital coins back to the central node (N-CH).
Abstract: A method for analyzing a simulation of the execution of a quantum circuit comprises: a step of post-selecting (S2) one or more particular values of one or more qubits at one or more steps of the simulation, a step of retrieving (S5), by an iterator (7), all or some of the quantum states of the quantum state vector(s) derived from the post-selection(s) of qubits, a step of analyzing (S6) the part of the simulation that corresponds to the post-selection(s) of qubits and to the quantum state vector(s) retrieved.
Abstract: A computing unit configured to be mounted in a HPC cabinet, the computing unit comprising an external body, and an internal body comprising secondary electronic components. The internal body is releasably coupled with the external body in order to allow extraction of the internal body when the external body is secured fixedly to the HPC cabinet. The internal body includes a bottom tray, comprising bottom secondary electronic components, a top tray comprising at least one duct for conducting an air flow from the front to the rear, and a plurality of manual coupling members, accessible from the top of the top tray, releasably coupling the top tray with the bottom tray.
Abstract: Heat sink for a network card of a compute blade, said compute blade comprising a cold plate wherein a cooling liquid circulates, said heat sink comprising a body comprising two main faces of which a so-called “hot” face and a so-called “cold” face, opposite said hot face, said cold face being configured to be interfaced with the cold plate, the hot face comprising at least one housing configured to receive at least one heat generating component of the network card.
Type:
Application
Filed:
September 19, 2023
Publication date:
April 4, 2024
Applicants:
BULL SAS, Le Commissariat à l’énergie atomique et aux énergies alternatives (CEA)
Abstract: A device and method for analyzing a performance of an n-tier application capable of carrying out on-the-fly anonymization processing of production data. The production data is generated following a performance test request message transmitted to the n-tier application. The anonymization processing is implemented by an anonymization module that identifies, from a sensitive data identification repository, data to be anonymized in the response message. The anonymization processing also includes generating, from an anonymization repository, anonymized data from the previously identified data to be anonymized, and generating an anonymized response message from the anonymized data and the response message.
Type:
Grant
Filed:
July 14, 2020
Date of Patent:
April 2, 2024
Assignee:
BULL SAS
Inventors:
Damien Aiello, Wajih Chaabane, Bruno Demeilliez