摘要:
A hypervisor-based system and method for downloading device driver updates that prevents confusion on the part of the driver update software as to which driver, physical or virtual, is being updated.
摘要:
Serial presence data in the EEPROM of a DIMM is encrypted with the private key of the motherboard with which the DIMM is intended to be used, so that only BIOS of the intended motherboard can decrypt the SPD to complete booting.
摘要:
A system, method, and computer readable medium are disclosed. The method includes automatically generating a set of security data. The security data is stored in non-volatile memory. The set of security data is also programmed into the data storage device as a security code.
摘要:
When a first blade server that is servicing a client computer becomes congested, service is transferred to a second blade server potentially in a different blade center by freezing the first blade and client and then sending, to the second blade server, a pointer to the currently addressed location in the client's virtual storage and an exact memory map in the first blade server that is associated with the client computer, along with the client's IP address. These are used to reconstruct the state of the first blade in the second blade, at which time the second blade resumes service to the client.
摘要:
A screen saver is run from the deskside device of a workstation used by a first user, rather than from a blade being used by the first user. Screen saver software and the necessary hardware to run the screen saver are located on the deskside device, thereby making the screen saver independent from the blade. This enables the blade to be reallocated for use by a second user, in a manner that is transparent to the idle first user. When the first user wants to resume use of the computer system, a new blade (or the same blade, if available) is allocated to the first user, and the newly-allocated blade is restored to the status of the first blade at the time it entered its suspended state. From the perspective of the first user, nothing appears different, i.e., to the first user everything looks as though he or she is on the same blade as when they entered the idle state.
摘要:
A method, system, and computer-usable medium for implementing a cluster network including a collection of clients that further include a client operating system and a server operating system, wherein the server operating system caches data retrieved from the cluster network from prior successful access to the cluster network, removing at least one client among the collection of clients from the cluster network, and in response to detecting the removal of at least one client from the cluster network, intercepting and re-routing at least one request targeted to the cluster network to the server operating system, wherein the server operating system emulates the cluster network by providing at least one response to the at least one request from the at least one client to the cluster network utilizing the cached data.
摘要:
An apparatus, system, and method are disclosed for managing response latency. An identification module identifies a computation module that may communicate with a client through one or more communication modules. A calculation module calculates the number of communication modules that transceive a packet between the computation module and the client as a hop count. An association module associates the client with the first computation module in response to the hop count satisfying a count range of a response policy. In one embodiment, a trouble ticket module generates a trouble ticket in response to a specified number of clients having a hop count greater than the count range.
摘要:
A system and method that restores a computer system is provided. An image is created of a primary drive that includes an operating system and one or more applications. A copy of the image is stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. Patches are received for the operating system and the applications and applied to the corresponding operating system or applications. A copy of the patch files is stored in the second nonvolatile storage area. When the system is restored, the primary drive is reformatted and the image stored on the second nonvolatile storage area is copied to the primary drive. The patches stored on the second nonvolatile storage area are then applied to the operating system and applications included in the image that was copied to the primary drive.
摘要:
A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
摘要:
A method and system for downloading software according to an identity of a user. Upon booting up a client computer, the user is automatically directed to a deployment server, which contains a listing of software to which the user is authorized to download and use. The directions to the deployment server are provided by a domain name server, or a domain controller. The software initially loaded onto the client computer is minimal, such that it is easily appended with additional features and programs.