CLOUD SYSTEMS

Oakland, CA, United States

CLOUD SYSTEMS

Oakland, CA, United States

Time filter

Source Type

A system and method for managing, routing and controlling devices and inter-device connections located within an environment to manage and control the environment using a control client is presented. A user configures a presentation environment into one or more sub-environments, restricts access to one or more devices of a presentation sub-environment, or schedules one or more resources within a presentation sub-environment.


Tan J.,North Carolina State University | Carmon D.,CLOUD SYSTEMS | Baron D.,North Carolina State University
IEEE Transactions on Information Theory | Year: 2014

Compressed sensing typically deals with the estimation of a system input from its noise-corrupted linear measurements, where the number of measurements is smaller than the number of input components. The performance of the estimation process is usually quantified by some standard error metric such as squared error or support set error. In this correspondence, we consider a noisy compressed sensing problem with any additive error metric. Under the assumption that the relaxed belief propagation method matches Tanaka's fixed point equation, we propose a general algorithm that estimates the original signal by minimizing the additive error metric defined by the user. The algorithm is a pointwise estimation process, and thus simple and fast. We verify that our algorithm is asymptotically optimal, and we describe a general method to compute the fundamental information-theoretic performance limit for any additive error metric. We provide several example metrics, and give the theoretical performance limits for these cases. Experimental results show that our algorithm outperforms methods such as relaxed belief propagation (relaxed BP) and compressive sampling matching pursuit (CoSaMP), and reaches the suggested theoretical limits for our example metrics. © 1963-2012 IEEE.


Patent
Cloud Systems | Date: 2011-11-02

A method for conducting a virtual training session with first and second training objectives having first and second validation paths, respectively. The method steps include configuring a virtual machine manipulated by a student to complete the first training objective, configuring a smart agent to execute on the virtual machine including a validator specified by the first validation path, generating a result by performing a first validation check of the virtual training session by at least the validator of the smart agent to identify an event of the virtual machine, identifying, using the smart agent, completion of the first training objective based on the result, and advancing the virtual training session from the first training objective to the second training objective in response to identifying completion of the first training objective.


Patent
Cloud Systems | Date: 2010-04-30

A method for conducting a virtual training session with first and second training objectives having first and second validation paths, respectively. The method steps include configuring a virtual machine manipulated by a student to complete the first training objective, configuring a smart agent to execute on the virtual machine including a validator specified by the first validation path, generating a result by performing a first validation check of the virtual training session by at least the validator of the smart agent to identify an event of the virtual machine, identifying, using the smart agent, completion of the first training objective based on the result, and advancing the virtual training session from the first training objective to the second training objective in response to identifying completion of the first training objective.


Patent
Cloud Systems | Date: 2015-03-11

According to one embodiment, a system includes one or more memory units and one or more processors. The processors are configured to receive a plurality of data elements. The processors are also configured to, for a first data element of the plurality of data elements, generate a first token for the first data element, and transmit the first token to a device. The processors are further configured to individually encrypt the first data element, and break the first encrypted data element into a plurality of encrypted data portions including a first encrypted data portion and a second encrypted data portion. The processors are further configured to transmit the first encrypted data portion of the first encrypted data element for storage in a first data storage device, and transmit the second encrypted data portion of the first encrypted data element for storage in a second data storage device.


A system and method for managing, routing and controlling devices and inter-device connections located within an environment to manage and control the environment using a control client is presented. A user configures a presentation environment into one or more sub-environments, restricts access to one or more devices of a presentation sub-environment, or schedules one or more resources within a presentation sub-environment.


A system and method for managing, routing and controlling devices and inter-device connections located within an environment to manage and control the environment using a control client is presented. A user provides commands via the control client to a server that maintains a representation of the environment and the devices within the environment. The server provides commands to devices present within the environment in response to user commands and other events, including events from the environment. The commands cause the devices in the environment to adopt specific desired states thereby causing the environment and the devices within the environment to create desired connections by and between the devices and to otherwise control and effect the environment.


Trademark
Cloud Systems and Storiant | Date: 2015-01-06

Downloadable software for storage, retrieval and migration of electronic and magnetically encoded data, files, documents, images and text.


Patent
Cloud Systems | Date: 2016-03-17

According to one embodiment, a system includes one or more processors configured to determine an instruction to be performed by a remote device. The remote device includes a plurality of preloaded instructions, and the plurality of preloaded instructions includes a preloaded instruction that matches the instruction. The processors are further configured to determine a token associated with the instruction. The remote device further includes a plurality of preloaded tokens associated with the plurality of preloaded instructions. The plurality of preloaded tokens includes a preloaded token that matches the token, and the preloaded token is associated with the preloaded instruction. The processors are further configured to transmit the token to the remote device. The remote device is configured to match the token to the preloaded token. Based on the match, the remote device is further configured to determine the preloaded instruction and perform the preloaded instruction.


Loading CLOUD SYSTEMS collaborators
Loading CLOUD SYSTEMS collaborators