Data transmission management

ABSTRACT

Methods, apparatuses, and non-transitory machine-readable media associated with data transmission are described. Data transmission management can include receiving, from an edge device via a radio at a first device, instructions associated with data transmission between a second device in communication with the first device and a cloud service in communication with the first device. Data transmission management can also include managing, at the first device and based on the instructions from the edge device, data received from a memory resource of the second device for transmission to the cloud service and data received from the cloud service for transmission to the memory resource of the second device. Data transmission management can further include enabling transmission of some, none, or all of the data between the cloud service and the memory resource of the second device and vice versa based on the management of the data.

PRIORITY INFORMATION

This application is a Divisional Application of U.S. application Ser.No. 17/236,183 filed on Apr. 21, 2021, the contents of which areincorporated herein by reference.

TECHNICAL FIELD

The present disclosure relates generally to apparatuses, non-transitorymachine-readable media, and methods associated with data transmissionmanagement.

BACKGROUND

Memory resources are typically provided as internal, semiconductor,integrated circuits in computers or other electronic systems. There aremany different types of memory, including volatile and non-volatilememory. Volatile memory can require power to maintain its data (e.g.,host data, error data, etc.). Volatile memory can include random accessmemory (RAM), dynamic random-access memory (DRAM), static random-accessmemory (SRAM), synchronous dynamic random-access memory (SDRAM), andthyristor random access memory (TRAM), among other types. Non-volatilememory can provide persistent data by retaining stored data when notpowered. Non-volatile memory can include NAND flash memory, NOR flashmemory, and resistance variable memory, such as phase change randomaccess memory (PCRAM) and resistive random-access memory (RRAM),ferroelectric random-access memory (FeRAM), and magnetoresistive randomaccess memory (MRAM), such as spin torque transfer random access memory(STT RAM), among other types.

Electronic systems often include a number of processing resources (e.g.,one or more processing resources), which may retrieve instructions froma suitable location and execute the instructions and/or store results ofthe executed instructions to a suitable location (e.g., the memoryresources). A processing resource can include a number of functionalunits such as arithmetic logic unit (ALU) circuitry, floating point unit(FPU) circuitry, and a combinatorial logic block, for example, which canbe used to execute instructions by performing logical operations such asAND, OR, NOT, NAND, NOR, and XOR, and invert (e.g., NOT) logicaloperations on data (e.g., one or more operands). For example, functionalunit circuitry may be used to perform arithmetic operations such asaddition, subtraction, multiplication, and division on operands via anumber of operations.

Artificial intelligence (AI) can be used in conjunction memoryresources. AI can include a controller, computing device, or othersystem to perform a task that normally requires human intelligence. AIcan include the use of one or more machine learning models. As describedherein, the term “machine learning” refers to a process by which acomputing device is able to improve its own performance throughiterations by continuously incorporating new data into an existingstatistical model. Machine learning can facilitate automatic learningfor computing devices without human intervention or assistance andadjust actions accordingly.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a functional diagram representing a system for datatransmission management in accordance with a number of embodiments ofthe present disclosure.

FIG. 2 is a system diagram including a first device in communicationwith a cloud service and a second device for data transmissionmanagement in accordance with a number of embodiments of the presentdisclosure.

FIG. 3 is another functional diagram representing a processing resourcein communication with a memory resource having instructions writtenthereon in accordance with a number of embodiments of the presentdisclosure.

FIG. 4 is a flow diagram representing an example method for datatransmission management in accordance with a number of embodiments ofthe present disclosure.

DETAILED DESCRIPTION

Systems, devices, and methods related to data transmission managementare described. In a shared memory multiprocessor system with a separatecache memory for each processor, it may be possible to have many copiesof shared data. For instance, there may be one copy in a main memory andone in a local cache of each processor that requested it. When one ofthe copies of data is changed, the other copies may reflect that change.Cache coherence ensures that the changes in the values of shared dataare propagated throughout the system with a desired timeliness. However,cache coherence may result in sharing of sensitive data, for instance,as data is shared throughout the system.

Examples of the present disclosure can allow for selective cachecoherence such that some direct communication is enabled while sensitivedata is isolated, for instance from a cloud service and/or publicinternet. Put another way, examples of the present disclosure allow forintentional splitting of cache coherence within the system using agatekeeper-like device.

Examples of the present disclosure can include a method for datatransmission management including receiving, from an edge device via aradio at a first device, instructions associated with data transmissionbetween a second device in communication with the first device and acloud service in communication with the first device. The method caninclude managing, at the first device and based on the instructions fromthe edge device, data received from a memory resource of the seconddevice for transmission to the cloud service and data received from thecloud service for transmission to the memory resource of the seconddevice. The method can also include enabling transmission of some, none,or all of the data between the cloud service and the memory resource ofthe second device and vice versa based on the management of the data.

In the following detailed description of the present disclosure,reference is made to the accompanying drawings that form a part hereof,and in which is shown by way of illustration how one or more embodimentsof the disclosure can be practiced. These embodiments are described insufficient detail to enable those of ordinary skill in the art topractice the embodiments of this disclosure, and it is to be understoodthat other embodiments can be utilized and that process, electrical, andstructural changes can be made without departing from the scope of thepresent disclosure.

It is also to be understood that the terminology used herein is for thepurpose of describing particular embodiments only and is not intended tobe limiting. As used herein, the singular forms “a,” “an,” and “the” caninclude both singular and plural referents, unless the context clearlydictates otherwise. In addition, “a number of,” “at least one,” and “oneor more” (e.g., a number of memory devices) can refer to one or morememory devices, whereas a “plurality of” is intended to refer to morethan one of such things. Furthermore, the words “can” and “may” are usedthroughout this application in a permissive sense (i.e., having thepotential to, being able to), not in a mandatory sense (i.e., must). Theterm “include,” and derivations thereof, means “including, but notlimited to.” The terms “coupled,” and “coupling” mean to be directly orindirectly connected physically or for access to and movement(transmission) of commands and/or data, as appropriate to the context.

The figures herein follow a numbering convention in which the firstdigit or digits correspond to the figure number and the remaining digitsidentify an element or component in the figure. Similar elements orcomponents between different figures can be identified by the use ofsimilar digits. For example, 100 can reference element “00” in FIG. 1 ,and a similar element can be referenced as 200 in FIG. 2 . As will beappreciated, elements shown in the various embodiments herein can beadded, exchanged, and/or eliminated so as to provide a number ofadditional embodiments of the present disclosure. In addition, theproportion and/or the relative scale of the elements provided in thefigures are intended to illustrate certain embodiments of the presentdisclosure and should not be taken in a limiting sense.

FIG. 1 is a functional diagram representing a system 102 for datatransmission management in accordance with a number of embodiments ofthe present disclosure. FIG. 1 illustrates a first device 100 incommunication with a second device 104 and also in communication with acloud service 108. While one first device 100, one second device 104,one switch 116, one edge device 106, and one cloud service 108 areillustrated in FIG. 1 , more than one of the elements may be present inthe system 102. The system 102 can maintain cache coherence with theexception of transmission of sensitive data; for instance, cachecoherence can be intentionally split such that sensitive data is notshared with each element of system 102.

In such an example, the first device 100 can filter data transmissionand act as a gatekeeper with respect to sensitive data. Put another way,the first device 100 can enable direct communication between the seconddevice 104 and the cloud service 108, but sensitive data can be isolatedfrom the cloud service 108. As used herein, sensitive data can includedata considered to be classified information to be protected andinaccessible to outside parties unless specifically granted permission.Examples include personally identifiable information and protectedhealth information. Other sensitive data may include sensormeasurements, privileged server data (e.g., a baby monitor server), key,data associated with firmware (e.g., boot loaders), certain images,videos, words, or phrases. In some examples, sensitive data can bedetermined based on input from a user in communication with the firstdevice 100 via the edge device 106.

The edge device 106, in some examples, may be a computing device havingan application accessible by an authorized user such as a parent orcaregiver of a user interacting with the second device 104. The firstdevice 100 can receive input from the edge device 106 regardingsensitivity of data and machine learning at the second device 104, amongothers. For example, the authorized user may not want the user of thesecond device 104 hearing profanities coming from the cloud service 108or public internet 110, or the authorized user may not want the user ofthe second device 104 exposing personal information to the cloud service108 or public internet 110. The edge device 106 may receive prompts, insome instances, from the first device 100 requesting classification ofparticular data as sensitive or not sensitive. The authorized user, forinstance, can receive and respond to the prompts via an application on amobile device acting as the edge device 106. The first device 100 canmanage the data (e.g., allow or prohibit transmission) based on theclassification received.

An edge device, as used herein, includes a device (e.g., physicaldevice) used for communication and interaction between devices on anetwork. Edge devices can mediate data in a network. Example edgedevices include switching devices (also known as “switches”), routers,router/switching device combinations, models, access points, gateways,networking cables, network interface controllers, mobile devices, andhubs, among others. In some instances, an edge device can be or caninclude a controller. An edge device, in some examples of the presentdisclosure, can be a combination of hardware and instructions fortransmitting instructions to a first device 100 that is part of the samenetwork as the edge device (e.g., edge device 106). The hardware, forexample can include a processing resource and/or a memory resource(e.g., MRM, computer-readable medium (CRM), buffer memory resource, datastore, etc.).

The first device 100 can comprise a processing resource, a memoryresource, a buffer memory resource 114, or any combination thereof. Thefirst device 100, for instance, can receive data from the second device104 and determine if it is sensitive data or non-sensitive data. Thefirst device 100 can transmit non-sensitive data to the cloud service108, but the first device 100 can prohibit sensitive data received fromthe second device 104 from being transmitted to the cloud service 108and/or the public Internet 110. The sensitive data received at the firstdevice 100 can be written to the buffer memory resource 114, while othernon-sensitive data may be written as overflow data 112. The first device100 can prohibit sensitive data from being written as overflow data 112to protect the sensitive data from potential vulnerabilities.

The cloud service 108 can also receive from and/or transmit data to thefirst device 100 or other sources such as the public Internet 110. Thefirst device 100 can determine if data received from the cloud service108 is sensitive data or non-sensitive data. The first device 100 cantransmit non-sensitive data to the second device 104, but the firstdevice 100 can prohibit sensitive data received from the cloud service108 from being transmitted to the second device 104. Data received atthe first device 100 from the cloud service 108 that is deemed sensitivemay be written to buffer memory resource 114, in some examples, orreturned to the cloud service 108.

The second device 104, which in some examples is a system-on-a-chip(SoC) device, can receive from and/or transmit data to the first device100 or a third party (not illustrated) such as a user interacting withsecond device 104. For example, the second device 104 can receive inputto its hardware (e.g., a processing resource, a memory resource, etc.)and/or associated sensors. For instance, the second device 104 caninclude an interactive graphical user interface (e.g., a touchscreen), acamera, a microphone, and/or sensors such as voice, touch, sound,weather, temperature, health, motion, battery, or other sensors forreceipt of data from the third party.

In some examples, the second device 104 can include a buffer memoryresource 118 as the memory resource or as an additional, separate memoryresource. Sensitive material (e.g., shown as triangles) received at thesecond device 104 can be written to the buffer memory resource andtransmitted to the first device 100 via the switch 116.

In some examples, machine learning can be performed at the second device104, for instance to improve accuracy of data the second device 104outputs (e.g., information provided to a user of the second device 104).For example, the second device 104 may receive input data from a userinteracting with the second device 104, from the cloud service 108 viathe first device 100, from the edge device 106 via the second device104, or any combination thereof. As the input data is received, thesecond device 104 may be updated using a machine learning model andoutput to the user may be improved. For example, a student using thesecond device 104 as a social cue advisor may benefit from the seconddevice 104 updating itself via machine learning (e.g., supervisedmachine learning) with new social norms, phrases, etc. using input datareceived from the cloud service, while also updating based on progressof the student and input from a parent controlling the edge device 106who has indicated additional norms the parent wants the student tolearn.

The switch 116 can be opened or closed, for instance in response toinstructions by the first device 100 to allow or prohibit transmissionof data. The switch 116 can be part of a secure connection between thefirst device 100 and the second device 104. For instance, single-basederror correction code (ECC) or double-based ECC (e.g., error detectionand correction (EDC)) may be used to enable reliable transmission ofdata between the first device 100 and the second device 104. As noted,the second device 104 may be a system on a chip device including anintegrated circuit (e.g., a “chip”) that integrates all or mostcomponents of the second device 104. The ECCs can be, in some examples,inserted on the integrated circuit of the second device 104 and used asa signature to protect sensitive data. In some examples, reliabletransmission of the data can be performed using a secure connection thatincludes a sensor located in a memory resource of the first device 100.

In a non-limiting example, the second device 104 can be a robot thatinteracts with a user (e.g., a child). For instance, the robot can helpthe user learn a second language, improve social skills, help withhomework, provide cognitive assistance, provide motivation and/or moralsupport, or other assist with other learning. The robot can improveaccuracy and efficiency with respect to teaching the user throughmachine learning (e.g., supervised machine learning). To enable machinelearning, the robot accesses information from the cloud service 108and/or the public Internet such as language information, social skillinformation, homework help, data associated with child development(e.g., growth charts, educational statistics, etc.), or any combinationthereof. Additional data may also be accessed to enable machinelearning. Data collected from the user may also be used in machinelearning (e.g., current age, grade level, etc.).

Machine learning within the robot can personalize data for the user andimprove the robot's performance. For instance, using data acquired fromthe cloud (e.g., big data), data acquired from the user, and inputreceived via the edge device 106 (as will be discussed further herein),the robot can learn how the user is developing (e.g., as compared toaverage capabilities of a same age user), limitations of a user'slearning, social norms, etc. In such an example, a parent or othercaregiver may be concerned what the user is exposed to or what the userdiscloses to the robot. For instance, a child may inadvertently providesensitive data to the robot such as a passcode or personallyidentifiable information. In response, the first device 100 can receivethis sensitive data from the robot and filter it, such that thesensitive data is prohibited from transmission to the cloud service 108or the public Internet 110. In some examples, if the robot has notlearned that the data is sensitive, the robot can write the data to thebuffer memory resource 118, for transmission to the first device 100 viathe switch 116.

In an example, the cloud service 108 may transmit data meant for therobot via the first device 100 that includes inappropriate content for auser of the robot. In such examples, if the robot was to receive thedata, the robot may be exposed to the potentially harmful data of thecloud service 108 (e.g., big data) and may detect patterns in data notdetectable to the user. The robot may begin to learn manipulative or badbehavior from the data, and/or hackers may use the robot for maliciouspurposes. For instance, data received at the first device 100 fortransmission to the robot may include an obscenity to which a parent maynot want a child exposed. In such an example, the first device 100 candetermine the data is sensitive and prohibit transmission to the robotand protect the system 102. For instance, the switch 116 between thefirst device 100 and the robot can be closed prohibiting transmission ofsensitive data to (and from) the robot. The sensitive data can be storedat the buffer memory resource 114 to avoid threats exposed whensensitive data is stored as overflow data at 112 such as stolen oraltered communication, tampering of memory, stolen sensitive data,altering firmware, impersonation of valid devices, etc.

The first device 100 can be in communication with an edge device 106such as a mobile device in the robot example. The first device 100 canreceive instructions, for instance via an application installed on theedge device 106, associated with teachings performed by the robot. Forinstance, a parent may instruct the first device 100 to teach the childa second language, but to omit swear words both in the child's firstlanguage and the second language being taught. The first device 100 mayalso receive instructions with respect to data not to be shared with thecloud service 108, such as passwords, addresses, or other potentiallysensitive data. In such examples, cloud training or machine learning forthe robot is controlled via the edge device 106.

The edge device 106, in some examples, may receive prompts from thefirst device 100 when the robot is unsure about a particular input data.For instance, the cloud service 108 may send a term the robot does notknow, or the user may input data the robot indicates may be sensitive(e.g., an address). In such an example, the first device 100 can promptthe edge device 106 for a decision on the input data with respect toallowing or prohibiting its transmission. Such responses can be used fortraining a machine learning model used by the robot.

In some examples, the edge device 106 can receive reports associatedwith the user of the robot. For instance, a parent may receive an updateof a child's learning curve with respect to the second language learning(e.g., progression of development) as compared to other children,updates on the child's interest, reports on how the child best learns,intellectual and emotional maturity updates, or an updated lesson planbased on the robot's machine learning. The machine learning can besupervised, for instance, using input data from the cloud service 108,input from the user, and additional input submitted via the edge device106. The robot, in some examples, may include base settings associatedwith baseline behaviors such as prohibiting encouragement of illegalactivities.

FIG. 2 is a system diagram including a first device 200 in communicationwith a cloud service 208 and a second device 204 for data transmissionmanagement in accordance with a number of embodiments of the presentdisclosure. The system 222 can include the first device 200 incommunication with the second 220 via a switch 216. While one firstdevice 200, one second device 204, one cloud service 208, and one switch216 are illustrated in FIG. 2 , more of each device may be present as apart of the system 222.

The first device 200 can include a processing resource 220 and a memoryresource 224 having instructions written thereon and executable by theprocessing resource 220. The first device 200 can be a gatekeepingdevice for managing data transmission between the second device 204 andthe cloud service 208. For instance, the first device 200 can receivedata from the cloud service 208, the second device 204, and/or an edgedevice 206 and determine whether or not to transmit the data and towhere the data can be transmitted.

In some examples, the instructions can be executable by the processingresource 220 to receive from an edge device 206, instructions associatedwith data transmission between a second device 204 in communication withthe first device 200 and the cloud service 208. The edge device 206, forinstance, can include a computing device in communication with the firstdevice 200 via an application installed on the computing device. Forinstance, the second device 204 may interact with a user foreducational, companionship, or other purposes. In such an example, thefirst device 200 can receive instructions from the edge device 206associated with data that can and cannot be transmitted to and from thesecond device 204. For instance, if the user is a small child, a parentmay access the edge device 206 (e.g., via an application on a mobiledevice) and provide instructions associated with what the child can beexposed to and what data the child can share for transmission to thecloud service 208.

The instructions, in some examples, can be executable to manage, basedon the instructions from the edge device 206, data received from thememory resource 228 of the second device 204 for transmission to thecloud service 208 and data received from the cloud service 208 fortransmission to the memory resource 228 of the second device 204. Forinstance, the first device 200 may receive data from the cloud service208 for transmission to the second device 204. The first device 200 mayrecognize the data as safe and transmit the data to the second device204. Alternatively, the first device 200 may recognize the data assensitive and prohibit transmission of the data to the second device204. The first device 200 may recognize the data as safe or sensitive,for instance, based on instructions received from the edge device 206.In the previous example, this may include a parent previouslyrestricting transmission of data containing swear words via the edgedevice 206. In such an instance, the first device 200 may write thesensitive data to a buffer memory resource to protect it.

In some examples, the first device 200 may not recognize the data assafe or sensitive. In such an example, the first device 200 may requestclassification from the edge device 206. The edge device 206 can prompta user (e.g., a parent) for the classification. Upon receiving aclassification response from the edge device 206, the first device 200can allow or prohibit transmission of the data from the cloud service208 to the memory resource 228 of the second device 204.

In a similar example, the first device 200 may receive data from thesecond device 204 for transmission to the cloud service 208, and thefirst device 200 can determine whether or not to allow or prohibittransmission of the data. Put another way, the instructions can beexecutable by the processing resource 220 to enable transmission ofsome, none, or all of the data between the cloud service 208 and thememory resource 228 of the second device 204 and vice versa based on themanagement of the data.

The second device 204, which in some instances can be an SoC device, anInternet of Things device, or a remote device, can be in communicationwith the first device 200 via a switch 216. The switch 216 can be partof a secure connection between the first device 200 and the seconddevice 204. For instance, single-based ECC or double-based ECC (e.g.,EDC) may be used to enable reliable transmission of data between thefirst device 100 and the second device 204. The ECCs can be, in someexamples, inserted on an integrated circuit of the second device 204 andused as a signature to protect sensitive data. In some examples,reliable transmission of the data can be performed using a secureconnection that includes a sensor located in the memory resource 224 ofthe first device 200.

The second device can include a processing resource 226 and a memoryresource 228 having instructions written thereon and executable by theprocessing resource 226. The instructions, for example, can beexecutable by the processing resource 226 to determine content of theinput data received at the processing resource 226, the memory resource228, or both, and transmit output data to the first device 200, a userof the second device 204, or both based on the determined content of theinput data using a machine learning model.

For example, a user may interact with the second device 204 via verbalcommunication, a touchscreen, or other sensors or communicationtechniques. The second device 204 can determine the content of inputreceived during the interaction based on a machine learning model builtand updated using data from the user, the cloud service 208, and theedge device 206.

For instance, the user may ask the second device 204 what a particularword means. If the second device 204 recognizes the particular word, itcan transmit it to the first device 200 via an open switch 216. Thesecond device 204 may have stored in the memory resource 228 or otherstorage (e.g., buffer storage) a definition of the particular word, andthe second device 204 can output that definition to the user. The firstdevice 200 can retrieve from the cloud service 208 additional dataassociated with the particular word, filter the content of theadditional data, and send appropriate data to the second device 204 viathe open switch 216.

Using the same example, if the second device 204 recognizes theparticular word as a prohibited word, the second device 204 can outputcommunication suggesting the user not speak that particular word. Thesecond device 204 can include a buffer memory resource, a cache device,or both, and the memory resource 228 can execute instructions to writethe particular word to the buffer memory resource or the cache devicefor storage locally at the second device 204.

Using the same example, if the second device 204 does not recognize theparticular word, the second device 204 can write the particular word toa buffer memory resource and transmit the particular word to the firstdevice 200. The first device 200 can request from the edge device 206permission to transmit the particular word or a request for definitionof the particular word to the cloud service 208. If the particular wordis allowed based on a response to the request, the first device 200 canallow transmission to the cloud service 208 and filter the returningdata before transmitting the definition to the second device via theswitch 216. If the particular word is denied based on the response, thefirst device 200 can write the associated data to a buffer memoryresource, and the machine learning model can be updated with theparticular word, so it is blocked in the future. The first device 200can also act as a gatekeeper in a similar manner with respect to datacoming from the cloud service 208 for transmission to the memoryresource 228 of the second device 204.

In such an example, the memory resource 228 can include executableinstructions to temporarily disable the second device 204 responsive tothe first device 200 determining data received from the second device204 comprises at least a portion of data of unknown content. Forinstance, if the second device 204 does not recognize the particularword and the first device 200 does not recognize the particular word,the second device 204 can be temporarily disable, so the user cannotinteract with the second device 204 until a decision is reachedregarding the particular word.

In some examples, the machine learning model can be updated using theinput data received at the processing resource 226, the memory resource228, or both, additional input data received at the processing resource226, the memory resource 228, or both, the instructions received by thefirst device 200 from the edge device 206, additional instructionsreceived by the first device 200 from the edge device; and data receivedat the first device 200 from the cloud service and transmitted to thesecond device 204. Such input data can include for instance, input datareceived from a user at the processing resource 226, the memory resource228, or both (e.g., address, phone number, questions from the user,etc.), instructions from a parent or caregiver regarding types ofinformation to share with the user or allowed to be shared by the user(e.g., banned subjects or words, additional manners to be taught,additional cognitive data, etc.), addition instructions from the parentor caregiver such as responses to requests from the first device 200,and big data and/or other data from the cloud service 208 that isassociated with instructing the user and updating the machine learningmodel.

In some examples, the memory resource 228 can include executableinstructions to compare input data received at the processing resource226, the memory resource 228, or both to associated data received at thefirst device 200 from the cloud service 208 and transmitted to thesecond device 204. The results of the comparison can be transmitted tothe first device 200 for transmission to the edge device 206. Forinstance, a parent may wonder how their child is developing compared toother children of the same age. The instructions can be executed tocompare child development data received at the first device 200 from thecloud service 208 to input data received from the child. For instance,the second device 204 can track the child's reading skills and comparethose skills to data from the cloud device 208. The second device 204can then transmit results of the comparison to the first device 200 forreporting to the edge device 206 (e.g., and the parent operating theedge device 206).

In some examples, the memory resource 224 of the first device 200 caninclude executable instructions to determine a sensitivity level of thedata received from the cloud service 208 for transmission to the memoryresource 228 of the second device 204. Similar, the memory resource 224can include executable instructions to determine a sensitivity level ofthe data received from the memory resource 228 of the second device 204for transmission to the cloud service 208. In such examples, the switch216 can be opened or closed to allow or prohibit transmission of thedata based on the determined sensitivity level(s). As used herein, asensitivity level can include a classification of sensitive the data tobe transmitted is.

For instance, with respect to a young child, an image of a kitten mayhave a low sensitivity level, while violent imagery may have a highsensitivity level. These sensitivity levels may be determined based oninput received at the second device 200 via the edge device (e.g.,parent/caregiver input), data received at the second device 200 from thecloud service 208 (e.g., movie age ratings, video game age ratings,etc.), or as default settings on the second device 204 (e.g., criminalactivities banned in manufacturer settings). A particular thresholdsensitivity level may be determined and transmitted to the second device200, for instance from the edge device 206, and used as a filter forallowing or prohibiting transmission of data between the first device200 and the second device 204.

For instance, the switch 216 can be opened to allow transmission of thedata to the memory resource 228 responsive to the sensitivity levelbeing below a particular threshold, and the switch 216 can be closed toprohibit transmission of the data to the memory resource 228 responsiveto the sensitivity level being at or above the particular threshold.Similar, the switch 216 can be opened to allow transmission of the datato the cloud service 208 responsive to the sensitivity level being belowa particular threshold, and the switch 216 can be closed to prohibittransmission of the data to the cloud service responsive to thesensitivity level being at or above the particular threshold. In someexamples, the determination of the sensitivity level can be made at thesecond device 204.

FIG. 3 is another functional diagram representing a processing resource320 in communication with a memory resource 324 having instructions 330,332, 334, 336, 338, 340, 342, 344 written thereon in accordance with anumber of embodiments of the present disclosure. In some examples, theprocessing resource 320 and the memory resource 324 comprise a device300 such as a device 100 or 200 illustrated in FIGS. 1 and 2 ,respectively.

The system 330 illustrated in FIG. 3 can be a server or a computingdevice (among others) and can include the processing resource 320. Thesystem 330 can further include the memory resource 324 (e.g., anon-transitory MRM), on which may be stored instructions, such asinstructions 330, 332, 334, 336, 338, 340, 342, 344. Although thefollowing descriptions refer to a processing resource and a memoryresource, the descriptions may also apply to a system with multipleprocessing resources and multiple memory resources. In such examples,the instructions may be distributed (e.g., stored) across multiplememory resources and the instructions may be distributed (e.g., executedby) across multiple processing resources.

The memory resource 324 may be electronic, magnetic, optical, or otherphysical storage device that stores executable instructions. Thus, thememory resource 324 may be, for example, non-volatile or volatilememory. In some examples, the memory resource 324 is a non-transitoryMRM comprising RAM, an Electrically-Erasable Programmable ROM (EEPROM),a storage drive, an optical disc, and the like. The memory resource 324may be disposed within a controller and/or computing device. In thisexample, the executable instructions 330, 332, 334, 336, 338, 340, 342,344 can be “installed” on the device. Additionally, and/oralternatively, the memory resource 324 can be a portable, external orremote storage medium, for example, that allows the system to downloadthe instructions 330, 332, 334, 336, 338, 340, 342, 344 from theportable/external/remote storage medium. In this situation, theexecutable instructions may be part of an “installation package”. Asdescribed herein, the memory resource 324 can be encoded with executableinstructions for data transmission management.

The instructions 330, when executed by a processing resource such as theprocessing resource 320 can include instructions to receive, via aradio, first input data from an edge device. As used herein, the use ofa radio can include the transmission and/or reception of informationthrough intervening media (e.g., air, space, nonconducting materials,etc.). This can include, for instance, radio waves or other wirelesscommunication and/or signaling including but not limited to cellularcommunication, one-way communication, two-way communication, radar,radiolocation, radio remote control, satellite communication, Wi-Fi, 3G,4G, 5G, and/or other communication standards, among others. The firstinput data can include instructions regarding operation of an SoC devicein communication with the device 300. For instance, the SoC device maybe used to assist in the education of a child or other user, and theinstructions from the edge device can include education paths andexpectations set by parents, teachers, caregivers, etc.

The instructions 332, when executed by a processing resource such as theprocessing resource 320, can include instructions to receive, via theradio, second input data from a cloud service. The second input data caninclude data associated with the education of the child or other user.For instance, if the instructions are to teach the child or other userFrench, the second input data can include data associated with theFrench language and teaching the French language, among other data.

The instructions 334, when executed by a processing resource such as theprocessing resource 320, can include instructions to receive, via theradio, third input data from an SoC device. The third input data mayinclude, for instance, input from the child or other user and/or datastored at the SoC device associated with the child or other user (e.g.,previously received data from the child or other user).

The instructions 336, when executed by a processing resource such as theprocessing resource 320, can include instructions to determine asensitivity level of the second input data and a sensitivity level ofthe third input data using the first input data and based on acomparison of the second input data and the third input data to adatabase. For example, using the French language example, the firstinput data may indicate French swear words are not to be taught to thechild or other user. Sensitivity levels can be determined based on thoseinstructions (e.g., filter any second or third input data includingswear words), using the database as reference (e.g., a database of swearwords for comparison to the second and third input data).

The instructions 338, when executed by a processing resource such as theprocessing resource 320, can include instructions to allow transmissionof the second input data to the SoC device responsive to the sensitivitylevel of the second input data being below a particular threshold. Inthe French language example, this may include the second input data fromthe cloud service including safe French words, and thus being allowedtransmission to the SoC device. The particular threshold can be based onsensitivity threshold data within the first input data, so in theaforementioned example, because the first input data instructionsrestricted swear words, only non-swear words may be allowedtransmission.

The instructions 340, when executed by a processing resource such as theprocessing resource 320, can include instructions to allow transmissionof the third input data to the cloud service responsive to thesensitivity level of the third input data being below the particularthreshold. Using the French language example, the third input data mayinclude the child or other user speaking a sentence in French thatincludes the name of the state in which they reside. This third inputdata may fall below the sensitivity level particular threshold and canbe allowed transmission to the cloud service.

The instructions 342, when executed by a processing resource such as theprocessing resource 320, can include instructions to prohibittransmission of the second input data to the SoC device and write thesecond input data to the memory resource 324 or a buffer memory resourceof the device 300 responsive to the sensitivity level of the secondinput data being at or above the particular threshold. Staying with theFrench language example, the second input data from the cloud servicemay include French profanities. The device 300 can determine thesensitivity levels of the profanities are too high, and can prohibittransmission of the profanities, while writing the data associated withthe profanities to the memory resource 324 or the buffer memoryresource. This stored data can be used to update a machine learningmodel at the SoC device to improve accuracy and efficacy of the SoCdevice's performance.

The instructions 344, when executed by a processing resource such as theprocessing resource 320, can include instructions to prohibittransmission of the third input data to the cloud service and write thethird input data to the memory resource 324 or a buffer memory resourceof the device 300 responsive to the sensitivity level of the third inputdata being at or above the particular threshold. Staying with the Frenchlanguage example, the third input data may include the child or otheruser speaking a sentence in French that includes the home address atwhich they reside. This third input data may be too sensitive and mayexceed the sensitivity level particular threshold. As such, transmissionis prohibited, and the third input data can be written to the memoryresource 324 or a buffer memory resource of the device 300. This storeddata can be used to update a machine learning model at the SoC device toimprove accuracy and efficacy of the SoC device's performance.

In some examples, the memory resource 324 can include instructionsexecutable to enable transmission of additional data between the cloudservice and the SoC device to facilitate supervised machine learning atthe SoC device. For example, transmission of statistical data,educational approaches, or other data applicable to the learning of thechild or other user may be enabled to update and improve a machinelearning model used at the SoC device.

The memory resource 324, in some examples, can include instructionsexecutable to maintain cache coherence between the device 300, the SoCdevice, and the cloud service excepting the second and the third inputdata having sensitivity levels at or above the particular threshold. Forinstance, cache coherence can allow for changes in the values of shareddata between the device 300, the SoC device, and the cloud service arepropagated throughout the system with a desired timeliness. However, thesecond and the third input data having sensitivity levels at or abovethe particular threshold are excluded and intentionally split from thecache coherence to protect the child or the other user, for example.

FIG. 4 is a flow diagram representing an example method 450 for datatransmission management in accordance with a number of embodiments ofthe present disclosure. The method 450 may be performed, in someexamples, using a system such as systems 102 and 222 and/or a devicesuch as device 300 as described with respect to FIGS. 1-3 .

At 452, the method 450 includes receiving, from an edge device via aradio at a first device, instructions associated with data transmissionbetween a second device in communication with the first device and acloud service in communication with the first device. For example, theinstructions associated with the data transmission can includeinstructions regarding operation and allowed communication to and fromthe second device in communication with the first device. For instance,the second device may be used to assist in the education of a child orother user, and the instructions from the edge device can includeeducation paths and expectations set by parents, teachers, caregivers,etc., and/or restrictions on transmission of data between the cloudservice and the second device.

At 454, the method 450 includes managing, at the first device and basedon the instructions from the edge device, data received from a memoryresource of the second device for transmission to the cloud service anddata received from the cloud service for transmission to the memoryresource of the second device. Managing the data, for instance, caninclude determining how and what data received at the first device canbe transmitted to the cloud service and/or the second device.

For example, managing the data can include determining the datacomprises a protected portion of data, writing the protected portion ofdata to a memory resource of the first device, and maintaining cachecoherence between the first device, the second device, and the cloudservice excepting the protected portion of data. The protected portionof data can include sensitive data not to be shared with the cloudservice or with the child or other user. For instance, instructions fromthe edge device may restrict particular reading materials that may beexposed to the child or other user and/or the instructions from the edgedevice may restrict sensitive data that the child or other user inputsto the second device (e.g., address, birthday, Social Security Number,etc.). To maintain security of the protected portion of data, it can bewritten to the memory resource (e.g., buffer memory), while avoidingwriting the protected portion of data as overflow data so as to reduceattacks on the data. Cache coherence is maintained excepting theprotected portion of data to maintain security of the sensitive data.

Managing the data, in some examples, can include identifying andfiltering protected data from the data received from the memory resourceof the second device for transmission to the cloud service and datareceived from the cloud service for transmission to the memory resourceof the second device. For instance, using the aforementioned examples,protected data such as a child's address may be filtered from datareceived at the second device, while remaining, non-protected data istransmitted to the cloud service. Similar, protected data such asrestricted reading material data received from the cloud service isfiltered, while other non-protected data is allowed transmission. Insome examples, the method 450 can include the first device transmittingand receiving data to and from the second device via a secure connectioncomprising a sensor located in a memory resource of the first device, asingle-based ECC a double-based ECC (e.g., EDC), or any combinationthereof. For instance, protected data may be transmitted in such a wayto maintain security of the data.

Managing the data, in some examples, can include determining the datacomprises a portion of data of unknown content, transmitting the portionof data of unknown content to the edge device via the radio or adifferent radio, and transmitting the portion of data of unknown contentto the cloud service, to the memory resource of the second device, orwriting the portion of data of unknown content to a memory resource ofthe first device. Unknown content, for instance may include datareceived at the second device that is not recognized. For instance, achild or other user may ask the definition of a word that the seconddevice does not know. Data associated with the word may be received andtransmitted to the edge device for instructions on how to proceed. Dataassociated with an allowed word may be transmitted to the cloud service,while data associated with a prohibited word may be written to thememory resource and prohibited from being transmitted to the clouddevice.

The method 450, at 456, includes enabling transmission of some, none, orall of the data between the cloud service and the memory resource of thesecond device and vice versa based on the management of the data. Forinstance, non-protected (e.g., non-sensitive) data can be transmitted,while protected (e.g., sensitive) data is not transmitted. In someexamples, data received from the cloud service and/or from the seconddevice may be a combination of protected and no-protected data, suchthat a portion of the data is allowed transmission, while remaining datais denied transmission.

Although specific embodiments have been illustrated and describedherein, those of ordinary skill in the art will appreciate that anarrangement calculated to achieve the same results can be substitutedfor the specific embodiments shown. This disclosure is intended to coveradaptations or variations of one or more embodiments of the presentdisclosure. It is to be understood that the above description has beenmade in an illustrative fashion, and not a restrictive one. Combinationof the above embodiments, and other embodiments not specificallydescribed herein will be apparent to those of skill in the art uponreviewing the above description. The scope of the one or moreembodiments of the present disclosure includes other applications inwhich the above structures and processes are used. Therefore, the scopeof one or more embodiments of the present disclosure should bedetermined with reference to the appended claims, along with the fullrange of equivalents to which such claims are entitled.

In the foregoing Detailed Description, some features are groupedtogether in a single embodiment for the purpose of streamlining thedisclosure. This method of disclosure is not to be interpreted asreflecting an intention that the disclosed embodiments of the presentdisclosure have to use more features than are expressly recited in eachclaim. Rather, as the following claims reflect, inventive subject matterlies in less than all features of a single disclosed embodiment. Thus,the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separateembodiment.

What is claimed is:
 1. A method, comprising: receiving, from an edgedevice via a radio at a first device, instructions associated with datatransmission between a second device in communication with the firstdevice and a cloud service in communication with the first device;managing, at the first device and based on the instructions from theedge device, data received from a memory resource of the second devicefor transmission to the cloud service and data received from the cloudservice for transmission to the memory resource of the second device;and enabling transmission of some, none, or all of the data between thecloud service and the memory resource of the second device and viceversa based on the management of the data.
 2. The method of claim 1,wherein managing the data comprises: determining the data comprises aprotected portion of data; writing the protected portion of data to amemory resource of the first device; and maintaining cache coherencebetween the first device, the second device, and the cloud serviceexcepting the protected portion of data.
 3. The method of claim 1,wherein managing the data comprises identifying and filtering protecteddata from the data received from the memory resource of the seconddevice for transmission to the cloud service and data received from thecloud service for transmission to the memory resource of the seconddevice.
 4. The method of claim 1, wherein managing the data comprises:determining the data comprises a portion of data of unknown content;transmitting the portion of data of unknown content to the edge devicevia the radio or a different radio; and transmitting the portion of dataof unknown content to the cloud service, to the memory resource of thesecond device, or writing the portion of data of unknown content to amemory resource of the first device.
 5. The method of claim 1, furthercomprising the first device transmitting and receiving data to and fromthe second device via a secure connection comprising a sensor located ina memory resource of the first device.
 6. The method of claim 1, furthercomprising the first device transmitting and receiving data to and fromthe second device via a secure connection comprising a single-basederror correction.
 7. The method of claim 1, further comprising the firstdevice transmitting and receiving data to and from the second device viaa secure connection comprising a double-based error correction.
 8. Asystem, comprising: an edge device in communication with a first deviceconfigured to send instructions associated with data transmissionbetween a second device in communication with the first device and acloud service in communication with the first device; the first device,comprising: a first processing resource; and a first memory resourcehaving instructions written thereon and executable by the firstprocessing resource to: receive the instructions associated with datatransmission; manage, based on the instructions associated with datatransmission from the edge device, data received from a second memoryresource of the second device for transmission to the cloud service anddata received from the cloud service for transmission to the secondmemory resource of the second device; and enable transmission of some,none, or all of the data between the cloud service and the second memoryresource of the second device and vice versa based on the management ofthe data.
 9. The system of claim 8, further comprising the first memoryresource having instructions written thereon and executable by the firstprocessing resource to: determine the data comprises a protected portionof data; write the protected portion of data to a memory resource of thefirst device; and maintain cache coherence between the first device, thesecond device, and the cloud service excepting the protected portion ofdata.
 10. The system of claim 8, further comprising the first memoryresource having instructions written thereon and executable by the firstprocessing resource to identify and filter protected data from the datareceived from the second memory resource for transmission to the cloudservice and data received from the cloud service for transmission to thesecond memory resource of the second device.
 11. The system of claim 8,further comprising the first memory resource having instructions writtenthereon and executable by the first processing resource to: determinethe data comprises a portion of data of unknown content; transmit theportion of data of unknown content to the edge device via the radio or adifferent radio; and transmit the portion of data of unknown content tothe cloud service, to the second memory resource, or write the portionof data of unknown content to the first memory resource.
 12. The systemof claim 8, further comprising the first device to transmit and receivedata to and from the second device via a secure connection comprising asensor located in the first memory resource.
 13. The system of claim 8,further comprising the first device to transmit and receive data to andfrom the second device via a secure connection comprising a single-basederror correction.
 14. The system of claim 8, further comprising thefirst device to transmit and receive data to and from the second devicevia a secure connection comprising a double-based error correction. 15.The system of claim 8, further comprising the second device incommunication with the first device via a switch and comprising: asecond processing resource; and the second memory resource havinginstructions written thereon and executable by the second processingresource to: determine content of the input data received at the secondprocessing resource, the second memory resource, or both; and transmitoutput data to the first device, a user of the second device, or bothbased on the determined content of the input data using a machinelearning model.
 16. The system of claim 15, further comprising thesecond memory resource having instructions written thereon andexecutable by the second processing resource to update the machinelearning model using: the input data received at the second processingresource, the second memory resource, or both; additional input datareceived at the second processing resource, the second memory resource,or both; the instructions received by the first device from the edgedevice; additional instructions received by the first device from theedge device; and data received at the first device from the cloudservice and transmitted to the second device.
 17. A device, comprising:a processing resource; and a memory resource having instructions writtenthereon and executable by the processing resource to: receive, via aradio, first input data from an edge device; receive, via the radio,second input data from a cloud service; receive, via the radio, thirdinput data from a system-on-a-chip (SoC) device; determine a sensitivitylevel of the second input data and a sensitivity level of the thirdinput data using the first input data and based on a comparison of thesecond input data and the third input data to a database; allowtransmission of the second input data to the SoC device responsive tothe sensitivity level of the second input data being below a particularthreshold; allow transmission of the third input data to the cloudservice responsive to the sensitivity level of the third input databeing below the particular threshold; prohibit transmission of thesecond input data to the SoC device and write the second input data tothe memory resource or a buffer memory resource of the device responsiveto the sensitivity level of the second input data being at or above theparticular threshold; and prohibit transmission of the third input datato the cloud service and write the third input data to the memoryresource or a buffer memory resource of the device responsive to thesensitivity level of the third input data being at or above theparticular threshold.
 18. The device of claim 17, further comprising thememory resource having instructions written thereon and executable bythe processing resource to enable transmission of additional databetween the cloud service and the SoC device to facilitate supervisedmachine learning at the SoC device.
 19. The device of claim 17, furthercomprising the memory resource having instructions written thereon andexecutable by the processing resource to maintain cache coherencebetween the device, the SoC device, and the cloud service excepting thesecond and the third input data having sensitivity levels at or abovethe particular threshold.
 20. The device of claim 17, wherein theparticular threshold is based on sensitivity level threshold data withinthe first input data.