摘要:
Embodiments of apparatuses, articles, methods, and systems for intra-partitioning components within an execution environment are generally described herein. Other embodiments may be described and claimed.
摘要:
A composition comprises a sulphur free reaction product of: (a)(i) a hydrocarbyl substituted aromatic compound containing an acidic group selected from the group consisting of a carboxylic group, a hydroxyl group and mixtures thereof and (a)(ii) an organic nitrogen-containing base reacted with acidic group. The composition is obtained by a preparatory process and is useful in a method for lubricating an internal combustion engine to include where the lubricant has reduced levels of sulphur, phosphorus and sulphated ash.
摘要:
Provided are a techniques for storing information in a packet. A data integrity operation is performed over one portion of the packet to calculate an integrity check value using a secret key. The data transformation operation is performed over another selectable portion of the packet to store the integrity check value in the other portion of the packet, without increasing a size of the packet. Other embodiments are described and claimed.
摘要:
Method, apparatus, and system for isolating potentially vulnerable nodes of a network. In one embodiment a network is partitioned into subnets of varying levels of security. A client device may be assigned a network access assignment through one of the subnets based on a level of vulnerability assessed for the client device. The level of vulnerability may be determined based on compliance of the client device with available upgrades and/or patches.
摘要:
According to one embodiment a computer system is disclosed. The computer system includes a central processing unit (CPU), a memory control device coupled to the CPU, a main memory device coupled to the memory control device, a bus coupled to the memory control device, and one or more devices, coupled to the bus. A physical segment of the main memory device is remapped to a bus device region of the main memory for exclusive use by the one or more devices.
摘要:
A method and apparatus for cross validation of data using multiple subsystems are described. According to one embodiment of the invention, a computer comprises a first subsystem and a second subsystem; and a memory, the memory comprising a first memory region and a second memory region, the first memory region being associated with the first subsystem and a second memory region being associated with the second subsystem; upon start up of the computer, the first subsystem to validate the second memory region and the second subsystem to validate the first memory region.
摘要:
A method, apparatus and system monitor and verify software during runtime on a data processing device. According to embodiments of the invention, a monitoring module on an auxiliary system independent of the data processing device may monitor software during runtime on the data processing device. The monitoring module may utilize a variety of information to verify the integrity of the software running on the data processing system. In one embodiment, software signatures, checksums and image sizes may be used to verify that the software has not be tampered with and/or altered. In addition and/or alternatively, the software configuration data and/or packet statistics may be used to verify the software. In one embodiment, a remote device may be used to manage and configure the auxiliary system.
摘要:
Embodiments of switching between multiple operating systems (OSes) using sleep state management and sequestered re-baseable memory are generally described herein. Embodiments of the invention allow one OS to be suspended into S3 or sleep mode, saving its state to memory and turning off its devices. Then, another sleeping OS can be resumed from another location in memory by switching a memory base addressed to a sequestered memory region and restoring its device state. Other embodiments may be described and claimed.
摘要:
Embodiments of an invention for generating multiple address space identifiers per virtual machine to switch between protected micro-contexts are disclosed. In one embodiment, a method includes receiving an instruction requiring an address translation; initiating, in response to receiving the instruction, a page walk from a page table pointed to by the contents of a page table pointer storage location; finding, during the page walk, a transition entry; storing the address translation and one of a plurality of address source identifiers in a translation lookaside buffer, the one of the plurality of address source identifiers based on one of a plurality of a virtual partition identifiers, at least two of the plurality of virtual partition identifiers associated with one of a plurality of virtual machines; and re-initiating the page walk.
摘要:
A measurement engine performs active platform observation. A program includes an integrity manifest to indicate an integrity check value for a section of the program's source code. The measurement engine computes a comparison value on the program's image in memory and determines if the comparison value matches the expected integrity check value. If the values do not match, the program's image is determined to be modified, and appropriate remedial action can be triggered. The integrity manifest can include a secure signature to verify the validity of the integrity manifest.