摘要:
A method and system is described for selectively downloading antidotes onto a client computer. The client computer is connected via a network interface card (NIC) to a network that contains an anti-virus server. The NIC is initially logically isolated from the client computer, thus permitting the NIC to autonomously examine packets to and from the client computer and the network. The NIC selectively accepts packets only from trusted Internet Protocol (IP) addresses that conform to a security format such as Internet Protocol Security (IPSec).
摘要:
A computer tablet includes a wireless receiver, and a pen is configured to be manipulated by a person to ride against the computer tablet and thereby provide input to the computer tablet. The pen includes a wireless transmitter. A processor associated with the computer tablet outputs an alarm when a signal from the transmitter of the pen is not sensed by the computer tablet within a time period.
摘要:
Fingertip-sized discrete areas are provided on a slate computer and have different tactile characteristics than the remainder of the surface on which they are disposed. The discrete areas are arranged to mimic home keys of a keyboard and each discrete area corresponds to a respective home key. In this way, a user is given tactile feedback of when fingers are properly placed in the home position, with home key finger placement triggering the presentation of a full keyboard on screen. Other embodiments do not use tactilely distinct keys, with simultaneous placement of two or more fingers on the computer triggering display of the virtual keyboard.
摘要:
An approach is provided that receives a user identifier from a user of the information handling system. The user identifier can include a username as well as a user authentication code, such as a password. Hardware settings that correspond to the user identifier are retrieved from a nonvolatile memory. Hardware devices, such as ports (e.g., USB controller), network interfaces, storage devices, and boot sequences, are configured using the retrieved hardware settings. After the hardware devices have been configured to correspond to the identified user, an operating system is booted.
摘要:
A method and system for accessing a remote real communication port (“COM port”) from a server blade in a server blade chassis by creating a virtual COM port in the server blade. A basic input/output system (BIOS) controller monitors an internal COM port in the server blade for communication traffic. Upon detecting the communication traffic, the BIOS controller reroutes the traffic to a virtual USB COM port created by the BIOS controller chipset. The virtual USB COM port directs the communication traffic to an internal universal serial bus (USB) device in the server blade. The USB device then forwards the traffic to an Ethernet media access controller (MAC) input/output (I/O) on a sideband channel to a remote system, which passes the communication traffic to a real COM port in the remote system.
摘要:
Prior to disabling itself in response to a disable command, a lost or stolen portable computer first constructs a log of data that has been accessed recently and sends the log to the rightful owner's address, so the owner knows specifically what data might have been compromised.
摘要:
A system, method, and program product is provided that receives and processes a firmware update at a computer system. The computer system is executing a hypervisor and one or more guest operating systems, and the firmware update corresponds to a hardware device accessible by the computer system. The hardware device is a type that is programmed using an updateable firmware. The hypervisor operating in the computer system processes the received firmware update by first inhibiting use of the device by each of the guest operating systems. After the guest operating systems have been inhibited from using the device, the firmware in the device is upgraded by the hypervisor using the received firmware update. After the firmware has been upgraded, each of the guest operating systems is allowed use of the device.
摘要:
A client computer is connected via a network to an anti-virus server and polls the server for indication that an anti-virus needs to be immediately downloaded from the anti-virus server. The client computer disengages from the network, and re-establishes a link with only the trusted anti-virus server. The anti-virus fix is installed, the client computer re-booted, and the client computer is then allowed to reconnect to the full network. If the client's primary operating system (OS) is infected, a secondary OS in the client computer performs the anti-virus download and execution. The disengagement from the network is performed by applying a filter in a network interface card (NIC) driver by the primary OS, the secondary OS, a service processor (SP), or by a virtual machine manager (VMM), depending on which is available at the client computer.
摘要:
An apparatus, system, and method are disclosed for autonomically disposing a computer such as a workstation. The computer's local persistent storage medium is configured with pre-boot image which is configured with a set of functional modules that facilitate disposal or recycling of the computer to the next user. The disposal and recycle methods are automated, require minimal user intervention, and facilitate moving configuration options and data to a different computer. The entire process may execute from the pre-boot image on the computer's local persistent storage medium without ever booting the primary operating system.
摘要:
A method and system for configuring an operating system in a computer system including language selection during bootup rather than at manufacture. A first aspect of the method and system comprises providing a plurality of operating system images in the computer system, each of the plurality of operating system images being based upon a particular language, selecting one of the plurality of operating system images based on the language supported by the computer system and loading the selected operating system image into the computer system. A second aspect of the method and system comprises providing a language-independent operating system image in the computer system, determining a language supported by the computer system, loading the language-independent operating system image into the computer system, and associating the language supported by the computer system with the language-independent operating system image.