Us 2019 / 0319868 A1

Total Page:16

File Type:pdf, Size:1020Kb

Us 2019 / 0319868 A1 US 20190319868A1 ( 19) United States (12 ) Patent Application Publication ( 10) Pub . No. : US 2019 /0319868 A1 Svennebring et al. ( 43 ) Pub . Date : Oct. 17 , 2019 ( 54 ) LINK PERFORMANCE PREDICTION (52 ) U . S . CI. TECHNOLOGIES CPC .. .. H04L 43/ 0882 (2013 . 01 ); H04W 24 /08 ( 2013 . 01 ) (71 ) Applicant : Intel Corporation , Santa Clara , CA (57 ) ABSTRACT (US ) Various systems and methods for determining and commu nicating Link Performance Predictions (LPPs ), such as in ( 72 ) Inventors : Jonas Svennebring , Sollentuna (SE ) ; connection with management of radio communication links, Antony Vance Jeyaraj, Bengaluru ( IN ) are discussed herein . The LPPs are predictions of future network behaviors /metrics ( e . g . , bandwidth , latency , capac (21 ) Appl . No. : 16 /452 , 352 ity , coverage holes , etc . ) . The LPPs are communicated to applications and /or network infrastructure, which allows the applications/ infrastructure to make operational decisions for ( 22 ) Filed : Jun . 25 , 2019 improved signaling / link resource utilization . In embodi ments , the link performance analysis is divided into multiple layers that determine their own link performance metrics, Publication Classification which are then fused together to make an LPP. Each layer (51 ) Int . Cl. runs different algorithms, and provides respective results to H04L 12 / 26 ( 2006 .01 ) an LPP layer /engine that fuses the results together to obtain H04W 24 / 08 (2006 .01 ) the LPP . Other embodiments are described and / or claimed . 700 Spatio - Temporal History Data Tx1 : C1 TIDE _ 1, DE _ 2 . .. Txt : C2 T2 DE _ 1 , DE _ 2 , . .. win Txs : C3 122 T : DE _ 1, DE _ 2 , .. TN DE _ 1 , DE _ 2 .. TxN : CN CELL LOAD MODEL 710 Real- Time Data 744 704 Patent Application Publication Oct. 17 , 2019 Sheet 1 of 19U S 2019 /0319868 A1 150 100 D WHA! .IN - 155 CN 142 155 1407 CLOUD BACKEND LAYER 1135 DATA . 136a 1366 DATA 1366 DATA 1366 130 ACCESS /EDGE NODES LAYER 132 103 103 739 1200 GATEWAYS / 121a INTERMEDIATE NODES LAYER 1210 96- - - 105 -wy ENDPOINTS / SENSORS/ THINGS 110 111- 10) LAYER Figure 1 112 Patent Application Publication Oct. 17 , 2019 Sheet 2 of 19U S 2019 /0319868 A1 PredictionLayer225-N 206 www 206 PredictionLayer225-3 Figure2 Environment100 LPPlayer202 206 PredictionLayer225-2 206 PredictionLayer225-1 LPPservice200 Patent Application Publication Oct. 17 , 2019 Sheet 3 of 19U S 2019 /0319868 A1 3401 TEE330 306 POWER RADIOFRONTEND MODULE315 CIRCUITRY335 !-.-.-.-.-.-.-.3Figure NETWORK CONTROLLER PMIC325 306 RADIOFRONTEND MODULE315 BASEBAND CIRCUITRY310 APPLICATION CIRCUITRY305 MEMORY CIRCUITRY320 306 POSITIONING CIRCUITRY345 USERINTERFACE CIRCUITRY350 . 300 Patent Application Publication Oct . 17 , 2019 Sheet 4 of 19 U S 2019 /0319868 A1 400 Mm4 wwww MEApprules Mgmt431b4310 &Reqts.Lifecycle ww OperationsSupportSystem422 MECorchestrator421 Mm3 MECPLATFORMMANAGER431 Mm6 VIM432 MEManagement430 wwww w wwwwwwwwwwwww w ME Mgmt.431a Platform Element . Mm2 Amy . -Mmgumum . 437-10 mMp2 MECHost136-1 variousAPIS453-1 MECLPPAPI451-1 Handling MECPlatform437-1 Mm8 LPP-IS4521 437-1d . ServiceRegistry 437-16 VirtualizationInfrastructure438-1 Figure4 . FilteringRules WWWWWWWWWWW DataPlane439-1 Control W . WA Awit frommMx UserAppLCMproxy425 . Mp1 437-1a VA MECApp436-1 WA . Mp3, . +Mp2 437-2¢ * . DNS MECHost136-2 variousAPIs453-2 MECLPPAPI451-2 Handling * . LPP-S4522 437-20 * . ServiceRegistry * VirtualizationInfrastructure438-2 , 437-26 MECPlatform437-2436-2 * UEApp(s) Filtering Rules Control DataPlane439-2 WWW 405 * CFSPortal 406 , UE420 437-2a MECApp 402 401 Patent Application Publication Oct. 17 , 2019 Sheet 5 of 19U S 2019 /0319868 A1 500 5067 MESH DEVICES / PROCESSOR 502 509 - 511517 FOG 564 INSTRUCTIONS + 510 570 512 CLOUD 501 TRUSTED EXECUTION ENVIRONMENT 590 NETWORK 560 INTERFACE 516 wanitarian abain i wai ght line nainen nainen sairai no irisinin adinin meno diretamente parashikon something MEMORY 504 SENSORS 521 www INSTRUCTIONS EXTERNAL 582 w INTERFACE 518 ACTUATORS 522 STORAGE 508 . LOGIC /MODULES 583 POS 545 www . ww ws com www www more wow . we were more BATTERY 524 INPUT DEVICE 586 PMIC 526 POWER BLOCK OUTPUT DEVICE 528 584 Figure 5 Patent Application Publication Oct. 17 , 2019 Sheet 6 of 19U S 2019 /0319868 A1 winninn weini winnine wwii 605- DataCollectionLayer600 653 - Processed Data652 ????????????????????????????????????????????????????????????????????????????????? EncryptionEngine 624VVV Figure6 ComputeNode602 Pre-Processing EngineandData Reduction623 LPPSApp620 Data651 Patent Application Publication Oct. 17 , 2019 Sheet 7 of 19U S 2019 /0319868 A1 Tx:Ci Txt:C2 Txt:C3 Txn:CN - -700 CELLLOADMODEL710 Figure7 . 744 T2DE_1,2. TNDE_1,2. Tu|DE_1,2. T3DE_1,2. Real-TimeData See Spatio-TemporalHistoryData . 704 1 722 702 Patent Application Publication Oct. 17 , 2019 Sheet 8 of 19U S 2019 /0319868 A1 838B !&i 4 .1. 11 htty * •* - - - -' - - ., -' - ' - - 8328 ' . ' ' - ' '* - - * -: * * * * * *- -', 838A Figure8 ]tttt1 ** 832A 821 Patent Application Publication Oct. 17 , 2019 Sheet 9 of 19U S 2019 /0319868 A1 matenmann 900 Cell Map 901 Cell Transition Prediction Model 902 Cell Transition Predictions 903 T1 : CIDX T2 : CIDY TN : CIDN . Figure 9 sauPatent Applicationorice Publicationalta Octca. 171390 , 2019 Sheetsur 10mes of 19 USesamowoman 2019 /0319868 A1 1000 Previous 1004 1001 -1021 1003 1023 Current 1002 1022 1003 1024 1027 1025 1005 - 1026 1006 1007 1028 1008 1009 Figure 10 Patent Application Publication Oct. 17 , 2019 Sheet 11 of 19 US 2019 /0319868 A1 1116 1104 TOAREA CN bw bw bw .|bw Spatio-Temportal HistorySequence Models . Spatio-Temporal History PredictedBW/timeslot bw CsCz bwbw bw TM|bw SequenceModel To T2 1102 Figure11 1100 CellSequence andanawe Prediction CellBWPrediction m a 11061106 meoma PredictedSequence Ilalal.ON www Short-Term History 1 UES111,121 Patent Application Publication Oct. 17 , 2019 Sheet 12 of 19 US 2019 /0319868 A1 -1202 DataFusionModel 1203[Neural Network) 1200 BWPredictionModel 1201@T3 Figure12 w BWPredictionModel 1201@T2 MYYYYYYY BWPredictionModel 1201@F1 Patent Application Publication Oct. 17 , 2019 Sheet 13 of 19 US 2019 /0319868 A1 1305 1310 LPPSProvider 1 Figure13 request(registration) registered(hash_key,domainname) 1300 LPPSprovisioned ACK(LPPversion,timesettings) LPPSConsumer 1308 LPPSprovisioning 1303) Patent Application Publication Oct. 17 , 2019 Sheet 14 of 19 US 2019 /0319868 A1 LPPSProvider M1405 Figure14 1400 -request(hash_key) -reply(LPP_data) LPPSConsumer 14037 - - - - - - Patent Application Publication Oct. 17 , 2019 Sheet 15 of 19 US 2019 /0319868 A1 1505A LPPSProvider M1505B M1505C Figure15 -subscribe(hash_key) -unsubscribe(hash_key)— -notify(LPP_data) : -LinkStatus() 1500 -notify(LPP_data) -notify(LPP_data) - : LPPSConsumer 4 15034 1508 1510 Patent Application Publication Oct. 17 , 2019 Sheet 16 of 19 US 2019 /0319868 A1 ????????? Endpoint MIMI minning jenni Procedure1400ofFigure14or Procedure1500ofFigure15 Figure16 tell(hash_key,domainname) 1600 LPPSProvider LPPSConsumer 1603 Patent Application Publication Oct. 17 , 2019 Sheet 17 of 19 US 2019 /0319868 A1 Endpoint 11708 171713 request(get_settings) response(settings) reply(set_settings) 705 Figure17 1700 LPPSProvider 1710T request(get_time) response(lpps_time) LPPSConsumer - 17037 Patent Application Publication Oct. 17 , 2019 Sheet 18 of 19 US 2019 /0319868 A1 Probn P-values LPPN Typen Times Figure18 1800m Probo P-valueo LPPO Typeo Timeo Patent Application Publication Oct. 17 , 2019 Sheet 19 of 19 US 2019 /0319868 A1 1900 OBTAIN PREDICTED PERFORMANCE METRICS FROM INDIVIDUAL PREDICTION LAYERS OF A PLURALITY OF A PLURALITY OF PREDICTION LAYERS 14905 FOR EACH LINK IN A RADIO COMMUNICATIONS NETWORK DETERMINE A LINK PERFORMANCE PREDICTION FOR THE LINK BASED ON THE OBTAINED PREDICTED PERFORMANCE METRICS 4915 GENERATE A LINK PERFORMANCE PREDICITION NOTIFICATION INDICATING THE DETERMINED LINK PERFORMANCE PREDICTION 6920 SEND THE LINK PERFORMANCE PREDICITION NOTIFICATION TO LPPS CONSUMER AND /OR ONE OR MORE ENDPOINTS * * 4925 FOR EACH LINK IN A RADIO COMMUNICATIONS NETWORK VO 61930 C ENDEND Figure 19 US 2019 /0319868 A1 Oct . 17 , 2019 LINK PERFORMANCE PREDICTION infrastructure equipment in accordance with various TECHNOLOGIES embodiments . FIG . 4 depicts an example Multi -access Edge Computing (MEC ) system architecture in which any one or TECHNICAL FIELD more of the techniques ( e . g ., operations , processes , methods , [0001 ] Embodiments described herein generally relate to and methodologies ) discussed herein may be performed data processing , network communication , and communica according to various embodiments . FIG . 5 depicts example tion system implementations, and in particular, to techniques components of a computer platform in accordance with for determining and utilizing link performance predictions various embodiments . (LPPs ) and /or link quality predictions (LQPs ) . [0007 ] FIG . 6 depicts example data collection layer in accordance with various embodiments . FIG . 7 illustrates an BACKGROUND example cell load prediction layer according to various embodiments . FIG . 8 illustrates an example scenario involv [0002 ] Emerging wireless network technologies ( e . g . , ing intra -cell characteristic predictions according to various Fifth Generation (5G ) or New Radio (NR ) ) are expected to embodiments . FIG . 9 illustrates an example cell transition provide increased improvements in data rates, device den prediction layer according to various embodiments . FIG . 10 sity , latency , and power consumption . Some new services illustrates
Recommended publications
  • Real-Time, Safe and Certified OS
    Real-Time, Safe and Certified OS Roman Kapl <[email protected]> drivers, customer projects, development Tomas Martinec <[email protected]> testing and certification © SYSGO AG · INTERNAL 1 Introduction • PikeOS – real-time, safety certified OS • Desktop and Server vs. • Embedded • Real-Time • Safety-Critical • Certified • Differences • Scheduling • Resource management • Features • Development © SYSGO AG · INTERNAL 2 Certification • Testing • Analysis • Lot of time • Even more paper • Required for safety-critical systems • Trains • Airplanes © SYSGO AG · INTERNAL 3 PikeOS • Embedded, real-time, certified OS • ~150 people (not just engineers) • Rail • Avionics • Space • This presentation is not about PikeOS specifically © SYSGO AG · INTERNAL 4 PikeOS technical • Microkernel • Inspired by L4 • Memory protection (MMU) • More complex than FreeRTOS • Virtualization hypervisor • X86, ARM, SPARC, PowerPC • Eclipse IDE for development © SYSGO AG · INTERNAL 5 Personalities • General • POSIX • Linux • Domain specific • ARINC653 • PikeOS native • Other • Ada, RT JAVA, AUTOSAR, ITRON, RTEMS © SYSGO AG · INTERNAL 6 PikeOS Architecture App. App. App. App. App. App. Volume Syste m Provider Partition PikeOS Para-Virtualized HW Virtualized File System (Native, POSIX, Guest OS PikeOS Native ARINC653, ...) Guest OS Linux, Android Linux, Android Device Driver User Space / Partitions Syste m PikeOS System Software ExtensionSyste m Extension PikeOS Microkernel Kernel Space / Hypervisor Architecture Platform Kernel Level Support Package Support Package Driver SoC /
    [Show full text]
  • Sistemi Operativi Real-Time Marco Cesati Lezione R13 Sistemi Operativi Real-Time – II Schema Della Lezione
    Sistemi operativi real-time Marco Cesati Lezione R13 Sistemi operativi real-time – II Schema della lezione Caratteristiche comuni VxWorks LynxOS Sistemi embedded e real-time QNX eCos Windows Linux come RTOS 15 gennaio 2013 Marco Cesati Dipartimento di Ingegneria Civile e Ingegneria Informatica Università degli Studi di Roma Tor Vergata SERT’13 R13.1 Sistemi operativi Di cosa parliamo in questa lezione? real-time Marco Cesati In questa lezione descriviamo brevemente alcuni dei più diffusi sistemi operativi real-time Schema della lezione Caratteristiche comuni VxWorks LynxOS 1 Caratteristiche comuni degli RTOS QNX 2 VxWorks eCos 3 LynxOS Windows Linux come RTOS 4 QNX Neutrino 5 eCos 6 Windows Embedded CE 7 Linux come RTOS SERT’13 R13.2 Sistemi operativi Caratteristiche comuni dei principali RTOS real-time Marco Cesati Corrispondenza agli standard: generalmente le API sono proprietarie, ma gli RTOS offrono anche compatibilità (compliancy) o conformità (conformancy) allo standard Real-Time POSIX Modularità e Scalabilità: il kernel ha una dimensione Schema della lezione Caratteristiche comuni (footprint) ridotta e le sue funzionalità sono configurabili VxWorks Dimensione del codice: spesso basati su microkernel LynxOS QNX Velocità e Efficienza: basso overhead per cambi di eCos contesto, latenza delle interruzioni e primitive di Windows sincronizzazione Linux come RTOS Porzioni di codice non interrompibile: generalmente molto corte e di durata predicibile Gestione delle interruzioni “separata”: interrupt handler corto e predicibile, ISR lunga
    [Show full text]
  • Performance Study of Real-Time Operating Systems for Internet Of
    IET Software Research Article ISSN 1751-8806 Performance study of real-time operating Received on 11th April 2017 Revised 13th December 2017 systems for internet of things devices Accepted on 13th January 2018 E-First on 16th February 2018 doi: 10.1049/iet-sen.2017.0048 www.ietdl.org Rafael Raymundo Belleza1 , Edison Pignaton de Freitas1 1Institute of Informatics, Federal University of Rio Grande do Sul, Av. Bento Gonçalves, 9500, CP 15064, Porto Alegre CEP: 91501-970, Brazil E-mail: [email protected] Abstract: The development of constrained devices for the internet of things (IoT) presents lots of challenges to software developers who build applications on top of these devices. Many applications in this domain have severe non-functional requirements related to timing properties, which are important concerns that have to be handled. By using real-time operating systems (RTOSs), developers have greater productivity, as they provide native support for real-time properties handling. Some of the key points in the software development for IoT in these constrained devices, like task synchronisation and network communications, are already solved by this provided real-time support. However, different RTOSs offer different degrees of support to the different demanded real-time properties. Observing this aspect, this study presents a set of benchmark tests on the selected open source and proprietary RTOSs focused on the IoT. The benchmark results show that there is no clear winner, as each RTOS performs well at least on some criteria, but general conclusions can be drawn on the suitability of each of them according to their performance evaluation in the obtained results.
    [Show full text]
  • Security Target Pikeos Separation Kernel V4.2.2
    Security Target PikeOS Separation Kernel v4.2.2 Document ID Revision DOORS Baseline Date State 00101-8000-ST 20.6 N.A. 2018-10-10 App Author: Dominic Eschweiler SYSGO AG Am Pfaffenstein 14, D-55270 Klein-Winternheim Notice: The contents of this document are proprietary to SYSGO AG and shall not be disclosed, disseminated, copied, or used except for purposes expressly authorized in writing by SYSGO AG. Doc. ID: 00101-8000-ST Revision: 20.6 This page intentionally left blank Copyright 2018 Page 2 of 47 All rights reserved. SYSGO AG Doc. ID: 00101-8000-ST Revision: 20.6 This page intentionally left blank Copyright 2018 Page 3 of 47 All rights reserved. SYSGO AG Doc. ID: 00101-8000-ST Revision: 20.6 Table of Contents 1 Introduction .................................................................................................................... 6 1.1 Purpose of this Document ........................................................................................... 6 1.2 Document References ................................................................................................ 6 1.2.1 Applicable Documents......................................................................................... 6 1.2.2 Referenced Documents ....................................................................................... 6 1.3 Abbreviations and Acronyms ....................................................................................... 6 1.4 Terms and Definitions................................................................................................
    [Show full text]
  • Engineered Computer Appliance
    Network Video Recorder (NVR) DATASHEET Engineered Computer Appliance Even small businesses deserve top-of-the-line CCTV technology that is durable, feature- packed and cost efficient. The MX Series performs like a pro, yet is easy on your pocket. Powerful recording and live display tech- nology Up to 32 HD channel inputs Up to 30 days of continuous video storage Active video storage and network protection Supports up to 4 hot-swap dedicated video storage hard disks Automatic daily hard disk drive health check, disk guard and recording activity for potential CCTV no recording monitoring. DATASHEET revision 201407311800 Dedicated Video Storage Video storage configurations Four hot swap HDDs bay for dedicated video storage support 720HD@32CH, 30days: 16TB (4TBx 4unit) four 3.5-inch SATA HDDs. 1080HD@16CH, 30days: 16TB (4TB x 4unit) One internal SSD for OS use only. Max dedicated video storage: 16TB (4TB x 4unit) Triple monitor output supported Live Display Performance (for HDCCTV) DVI* / HDMI / DP 1080HD 16CH (2.86Mbps) 12FPS each CH Max resolution 4096x2304 (4k, HDMI/DP) 720HD 16CH (1.43Mbps) 24FPS each CH Max resolution 1920x1200 (DVI*) 720HD 32CH (1.43Mbps) 07FPS each CH *Supports DVI to VGA Conversion NOTE: Performance may very depend on video surveillance software. Networking Processor, memory, audio Single LAN (RJ45 connector) Intel i5 Quad-core 4 threads processor 10/100/1000Base-T Gigabit Ethernet 4GB system memory, 1600MHz DDR3 Audio line out jack, 3.5mm (Green) Heartbeat Security Key Programmable micro controller for system auto healing and 128-bit Blowfish encryption algorithms. monitoring. Digital I/O. connectable to CMS Alarm.
    [Show full text]
  • Embedded Operating Systems
    7 Embedded Operating Systems Claudio Scordino1, Errico Guidieri1, Bruno Morelli1, Andrea Marongiu2,3, Giuseppe Tagliavini3 and Paolo Gai1 1Evidence SRL, Italy 2Swiss Federal Institute of Technology in Zurich (ETHZ), Switzerland 3University of Bologna, Italy In this chapter, we will provide a description of existing open-source operating systems (OSs) which have been analyzed with the objective of providing a porting for the reference architecture described in Chapter 2. Among the various possibilities, the ERIKA Enterprise RTOS (Real-Time Operating System) and Linux with preemption patches have been selected. A description of the porting effort on the reference architecture has also been provided. 7.1 Introduction In the past, OSs for high-performance computing (HPC) were based on custom-tailored solutions to fully exploit all performance opportunities of supercomputers. Nowadays, instead, HPC systems are being moved away from in-house OSs to more generic OS solutions like Linux. Such a trend can be observed in the TOP500 list [1] that includes the 500 most powerful supercomputers in the world, in which Linux dominates the competition. In fact, in around 20 years, Linux has been capable of conquering all the TOP500 list from scratch (for the first time in November 2017). Each manufacturer, however, still implements specific changes to the Linux OS to better exploit specific computer hardware features. This is especially true in the case of computing nodes in which lightweight kernels are used to speed up the computation. 173 174 Embedded Operating Systems Figure 7.1 Number of Linux-based supercomputers in the TOP500 list. Linux is a full-featured OS, originally designed to be used in server or desktop environments.
    [Show full text]
  • Parallel Processing with the MPPA Manycore Processor
    Parallel Processing with the MPPA Manycore Processor Kalray MPPA® Massively Parallel Processor Array Benoît Dupont de Dinechin, CTO 14 Novembre 2018 Outline Presentation Manycore Processors Manycore Programming Symmetric Parallel Models Untimed Dataflow Models Kalray MPPA® Hardware Kalray MPPA® Software Model-Based Programming Deep Learning Inference Conclusions Page 2 ©2018 – Kalray SA All Rights Reserved KALRAY IN A NUTSHELL We design processors 4 ~80 people at the heart of new offices Grenoble, Sophia (France), intelligent systems Silicon Valley (Los Altos, USA), ~70 engineers Yokohama (Japan) A unique technology, Financial and industrial shareholders result of 10 years of development Pengpai Page 3 ©2018 – Kalray SA All Rights Reserved KALRAY: PIONEER OF MANYCORE PROCESSORS #1 Scalable Computing Power #2 Data processing in real time Completion of dozens #3 of critical tasks in parallel #4 Low power consumption #5 Programmable / Open system #6 Security & Safety Page 4 ©2018 – Kalray SA All Rights Reserved OUTSOURCED PRODUCTION (A FABLESS BUSINESS MODEL) PARTNERSHIP WITH THE WORLD LEADER IN PROCESSOR MANUFACTURING Sub-contracted production Signed framework agreement with GUC, subsidiary of TSMC (world top-3 in semiconductor manufacturing) Limited investment No expansion costs Production on the basis of purchase orders Page 5 ©2018 – Kalray SA All Rights Reserved INTELLIGENT DATA CENTER : KEY COMPETITIVE ADVANTAGES First “NVMe-oF all-in-one” certified solution * 8x more powerful than the latest products announced by our competitors**
    [Show full text]
  • A Security Architecture for Accessing Health Records on Mobile Phones
    A SECURITY ARCHITECTURE FOR ACCESSING HEALTH RECORDS ON MOBILE PHONES Alexandra Dmitrienko, Zecir Hadzic, Hans Lohr,¨ Marcel Winandy Horst Gortz¨ Institute for IT Security, Ruhr-University Bochum, Bochum, Germany Ahmad-Reza Sadeghi Fraunhofer-Institut SIT Darmstadt, Technische Universitat¨ Darmstadt, Darmstadt, Germany Keywords: Health records, Mobile computing, Smartphone, Security architecture, Trusted computing. Abstract: Using mobile phones to access healthcare data is an upcoming application scenario of increasing importance in the near future. However, important aspects to consider in this context are the high security and privacy requirements for sensitive medical data. Current mobile phones using standard operating systems and software cannot offer appropriate protection for sensitive data, although the hardware platform often offers dedicated security features. Malicious software (malware) like Trojan horses on the mobile phone could gain unautho- rized access to sensitive medical data. In this paper, we propose a complete security framework to protect medical data (such as electronic health records) and authentication credentials that are used to access e-health servers. Derived from a generic archi- tecture that can be used for PCs, we introduce a security architecture specifically for mobile phones, based on existing hardware security extensions. We describe security building blocks, including trusted hardware features, a security kernel providing isolated application environments as well as a secure graphical user in- terface, and a trusted wallet (TruWallet) for secure authentication to e-health servers. Moreover, we present a prototype implementation of the trusted wallet on a current smartphone: the Nokia N900. Based on our architecture, health care professionals can safely and securely process medical data on their mobile phones without the risk of disclosing sensitive information as compared to commodity mobile operating systems.
    [Show full text]
  • ONVIF PTZ Device Test Specification V17.06
    ONVIF PTZ Device Test Specification Version 17.06 ONVIF™ PTZ Device Test Specification Version 17.06 June 2017 www.onvif.org ONVIF PTZ Device Test Specification Version 17.06 © 2017 ONVIF, Inc. All rights reserved. Recipients of this document may copy, distribute, publish, or display this document so long as this copyright notice, license and disclaimer are retained with all copies of the document. No license is granted to modify this document. THIS DOCUMENT IS PROVIDED "AS IS," AND THE CORPORATION AND ITS MEMBERS AND THEIR AFFILIATES, MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR TITLE; THAT THE CONTENTS OF THIS DOCUMENT ARE SUITABLE FOR ANY PURPOSE; OR THAT THE IMPLEMENTATION OF SUCH CONTENTS WILL NOT INFRINGE ANY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. IN NO EVENT WILL THE CORPORATION OR ITS MEMBERS OR THEIR AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE OR CONSEQUENTIAL DAMAGES, ARISING OUT OF OR RELATING TO ANY USE OR DISTRIBUTION OF THIS DOCUMENT, WHETHER OR NOT (1) THE CORPORATION, MEMBERS OR THEIR AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR (2) SUCH DAMAGES WERE REASONABLY FORESEEABLE, AND ARISING OUT OF OR RELATING TO ANY USE OR DISTRIBUTION OF THIS DOCUMENT. THE FOREGOING DISCLAIMER AND LIMITATION ON LIABILITY DO NOT APPLY TO, INVALIDATE, OR LIMIT REPRESENTATIONS AND WARRANTIES MADE BY THE MEMBERS AND THEIR RESPECTIVE AFFILIATES TO THE CORPORATION AND OTHER MEMBERS IN CERTAIN WRITTEN POLICIES OF THE CORPORATION. 2 www.onvif.org ONVIF PTZ Device Test Specification Version 17.06 REVISION HISTORY Vers.
    [Show full text]
  • NEWS RELEASE for IMMEDIATE RELEASE Contact: John Wranovics M: 925.640.6402 [email protected]
    NEWS RELEASE FOR IMMEDIATE RELEASE Contact: John Wranovics M: 925.640.6402 [email protected] Curtiss-Wright Showcases Latest Avionics Solutions at Avionics Expo 2019 AVIONICS EXPO – AEROSPACE TECH WEEK 2019, MOC Event Center, Munich, Germany (Booth A17) – March 12-13, 2019 – Curtiss-Wright’s Defense Solutions division today announced that it will be displaying its latest avionics products at Avionics Expo, Munich Germany, March 12- 13, 2019 (Booth A17). The products featured in Curtiss-Wright’s booth include: DO-254/DO-178 Safety-certifiable 3U and 6U OpenVPX™ single board computers Rugged airborne video management system solutions including a rugged 21'' touchscreen LCD Advance Video Display Unit (AVDU), Video Recorder, Video Switch and Converter Flight Test Instrumentation (FTI) products including the KAM-500 and Axon family of Data Acquisition Units (DAU) The Fortress™ Flight Data Recorder, and… An ultra-compact mission processor system (the Parvus® DuraCOR® 311) and networking system (Parvus DuraNET® 20-11). Live Demonstrations of Curtiss-Wright Products: In addition to a wide range of proven COTS modules and systems, Curtiss-Wright collaborated with other leading technology partners for live demonstrations of open architecture products hosted in the partners’ booths: Featured in Green Hills Software’s Booth - A64 - “Green Hills Software® INTEGRITY-178 tuMPTM for Avionics Systems” The Avionics Systems Demo features Green Hills Software’s INTEGRITY-178 tuMP DO-178B Level A Safety Certified and Future Airborne Capability Environment (FACE™) Conformant RTOS. Curtiss-Wright Corporation Page 2 INTEGRITY-178 will be demonstrated on a Curtiss-Wright’s safety-certifiable VPX3-152 3U OpenVPX NXP® Power Architecture® T2080 SBC and VPX3-716 3U OpenVPX AMD E8860 Graphics Processing Module.
    [Show full text]
  • White Paper Perimeter Security with the Aqueti Camera Ensemble
    White Paper Perimeter Security with the Aqueti Camera Ensemble March 2019 Copyright Notice Copyright 2019 Aqueti™. All rights reserved. Aqueti Incorporated 3333 Durham-Chapel Hill Blvd. Suite D-100 Durham, NC 27707 USA 919-666-7480 www.aqueti.com Disclaimer This document provides information “as is” without warranty of any kind. Aqueti disclaims all warranties, either expressed or implied, including the warranties of merchantability and fitness for a purpose. In no event shall Aqueti be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits, or special damages, even if Aqueti or its suppliers advise of the possibility of such changes. Document Lifecycle Aqueti may occasionally update product documentation between releases of the related software. To ensure you have the most current information, refer to www.aqueti.com. Publication Date Perimeter Security with the Aqueti Camera Ensemble March 2019 Trademarks Aqueti, the “Q” logo, and “Aqueti Reinventing Resolution” are registered trademarks of Aqueti Incorporated. All other brands and product names are registered trademarks or trademarks of their respective holders and are used only for reference where specifically needed without any intent to infringe. All other product and company names may be trademarks or registered trademarks of their respective companies. Getting Help For product information, updates, licensing, documentation, and service, visit www.aqueti.com. For support inquiries, use [email protected]. www.aqueti.com 2 [email protected] Contents Introduction . 4 Aqueti Mantis . 5 Aqueti Pathfinder . 6 Aqueti Camera Ensemble Overview. 7 Aqueti Imaging System vs. Traditional PTZ . 8 Defending Your Perimeter with the Mantis . 9 Aqueti System Data Sheets .
    [Show full text]
  • Department of Finance and Administration
    STATE OF ARKANSAS REVENUE LEGAL COUNSEL Department of Finance Post Office Box 1272, Room 2380 Little Rock, Arkansas 72203-1272 and Administration Phone: (501) 682-7030 Fax: (501) 682-7599 http://www.arkansas.gov/dfa October 25, 2017 RE: Taxability of Computer Service Sales Opinion 20170708 Dear : You have requested a legal opinion concerning the sales tax liability of certain sales made by a computer service company. Your letter dated June 30, 2017, states: has reviewed the Arkansas Gross Receipts Tax Rules, Compensating Use Tax Rules, and Special Excise Tax Rules. The company focused their attention to GR-25 and GR-39 respectively in relation to practices and the established rules. requests a legal opinion on how each of the main practices performed within the company fits within the established rules. Services – Interpretation of NONTAXABLE sales and service This document will discuss at length the following business activities performed by . The activities below constitute the “bulk” of daily technical services performed. ▪Factory Restore ▪Transfer User Data ▪Password Reset ▪Pickup / Delivery / Travel ▪Remote Technical Support ▪Showroom Diagnostics ▪Field Service Call ▪Electronic Software Purchases ▪Offsite Backup Subscription Services ▪Internet Hosting Service Subscription ▪General Services ▪Website Design and Ongoing Website Maintenance You have asked whether sales of certain computing service activities are subject to gross receipts tax in Arkansas? Before addressing the specifics of your request, it is necessary to discuss several points that are applicable to this opinion as a whole. As a preliminary matter, sales and use tax is levied upon the gross proceeds or gross receipts derived from all sales of tangible personal property and certain enumerated services.
    [Show full text]