Abstract:
An apparatus, system, and method are disclosed for protecting hard disk data in multiple operating system environments. The present invention restricts access of a hard file to a range of logical addresses using a controller module configured to access a hard file in response to a request for a logical address, a set zero module configured to add an offset value to each request for a logical address on a hard file, and a set max module configured to set a maximum logical address accessible on a hard file. The invention limits access to a lower protected area with logical addresses below the range of logical address and a host protected area with logical address above the range of logical addresses.
Abstract:
A method and system for remotely isolating faults in computer network devices coupled to a computer network. A plurality of first computer units are coupled to the computer network. The plurality of first computer units are located on a user side of the computer network. A plurality of second computer units are coupled to the computer network. The plurality of second computer units are located on a service provider side of the network. One of the plurality of second computer units is designated to provide computing services to one of the plurality of first computer units. One of the plurality of first computer units experiencing a fault communicating with its designated second computer unit uses another of the plurality of first computer units as a proxy computer unit to remotely isolate the fault.
Abstract:
The present invention relates to a method for method or system which is able to control access to a new computer user password reset. The system is preloaded with a random password that does not needed to be known by anyone. There are two main situations in which this method will be used. The first situation involves a locally managed password and account where the user does not log in to a domain. The second situation involves remote management, where the user logs in to a domain.
Abstract:
An apparatus for managing a data rate based on an amount of available data for a predetermined time period includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a target data rate for data communication over a network by a network device. The target data rate is based on an amount of available data for a predetermined time period and an amount of time remaining in the predetermined time period. The machine-readable code includes a data rate module maintaining the data rate at or below the target data rate in response to the determination module determining the target data rate.
Abstract:
A highly efficient and effective method for deciding, in the context of a distributed computer network, how many computers will participate in an initial vote if multiple computers are started in the same general time frame.
Abstract:
Systems, methods and products are described that provide homepage re-assignment. One aspect includes displaying a default homepage desktop view from among a plurality of scrollable desktop views; receiving user input via a user input device; opening a homepage re-assignment utility responsive to receiving said user input, said homepage re-assignment utility including a display indicating one or more desktop views selectable as a new homepage; and responsive to receiving a user input indicating a selection of a desktop view as a new homepage, changing a default homepage setting to a desktop view selected as a new homepage. Other embodiments are described.
Abstract:
Described is a technology by which a user is able to determine the content of a storage device, including when the storage device is non-operational. A user may use a device and/or program to provide a wirelessly-read identifier to query a repository that maintains cataloged data for the user's storage device. The query to the repository returns the cataloged data for that storage device in response, which is output to the user and the user knows the storage device's contents. Alternatively, the user may obtain a list of storage devices from the repository, and select one to view its cataloged data. When the storage device is operational, the persistent repository is updated with any changes to keep the cataloged data synchronized with the stored content.
Abstract:
An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The payment instrument electronically transacts payments and includes a transaction restriction. An authentication module receives an authentication from a user of the payment instrument. The security module validates the authentication with a first encryption key. In addition, the security module authorizes a change to the transaction restriction using a second encryption key if the authentication is valid. The security module resides on a computer that the user designates as authorized to validate the authentication.
Abstract:
An exemplary apparatus includes one or more processors, volatile memory, a storage drive and circuitry configured to establish a network connection and to attempt to send credentials via an established network connection. Such an apparatus further includes circuitry configured, responsive to authentication failure after an attempt to send credentials, to release an implemented security policy and load an operating system stored on the storage drive, and, responsive to an attempt to send credentials, to maintain an implemented security policy and to use an operating system exposed via an established network connection and associated with the sent credentials Such an apparatus optionally includes circuitry configured to implement a security policy that isolates at least a portion of a local storage drive. Various other apparatuses, systems, methods, etc., are also disclosed.
Abstract:
An aspect provides a method, comprising: detecting an incoming voice call at an information handling device; detecting one or more external notification extension conditions at the information handling device; and in response to detecting one or more external notification extension conditions at the information handling device, extending a notification of the incoming voice call at the information handling device. Other aspects are described and claimed.