Abstract:
A hypervisor intercepts a reduced power mode call from a guest operating system (GOS) and executes reduced power scripts, prior to passing control back to BIOS for entry into the reduced power mode.
Abstract:
A system and method for autonomically configuring a router are presented. An agent is installed on a client that tracks resource authorizations for particular applications. The agent sends a configuration request to a router that requests the router to change one or more router parameters, such as assigning a port to the client. The router compares the configuration request against its router policies, and changes router parameters (assigns resources) based upon the configuration request. Once the agent and the router authorize the resources, the application uses the resources to communicate with a computer network through the client resource and the router resource. When the application is terminated, the router and the client disable their respective resources.
Abstract:
A call from a user operating system (UOS) to BIOS to configure a connected device into a reduced energy consumption mode is routed through a virtual machine monitor (VMM). The VMM determines whether a service O.S. (SOS) is in need of the device and if so the VMM informs the UOS that the device has been configured as ordered, while allowing the SOS to complete its task with the device. If the SOS is not in need of the device, or at the completion of the SOS task with the device, the VMM passes the call to ACPI/BIOS to configure the device in the demanded energy consumption mode.
Abstract:
A hypervisor intercepts a reduced power mode call from a guest operating system (GOS) and executes reduced power scripts, prior to passing control back to BIOS for entry into the reduced power mode.
Abstract:
An apparatus, system, and method are disclosed for identifying structural stress conditions for computer hardware. The apparatus includes a plurality of modules configured to functionally execute the necessary steps of monitoring a physical condition affecting a computer hardware component, recognizing a potential damage condition based on a threshold, and responding to the potential damage condition. These modules in the described embodiments include a monitoring module, a recognition module, and a response module. Beneficially, such an apparatus, system, and method would identify potential damage conditions and alert a user to the potential damage condition before physical damage to the computer hardware component occurs. The user can then alleviate the physical condition affecting the computer component and avoid component damage.
Abstract:
A system and method for hybrid virtual machine monitor system is provided. A first operating system uses a file system to manage data storage and retrieval within a data storage area. A second operating system, which is not compatible with the first operating system's file system, executes a management application backup utility. The first operating system includes a filter driver that sends logical block addresses, which correspond to data reads/writes, to the management application backup utility. In turn, the management application backup utility uses the logical block addresses to perform operations on the data storage locations. In one embodiment, the management application backup utility performs actions on the data storage area, such as a disk defragmentation, and subsequently sends data location changes to the filter driver. In this embodiment, the filter driver instructs the first operating system's file system to update its translation tables based upon the data location changes.
Abstract:
When a contact in an electronically-stored phone book has more than one telephone number associated with the contact's name, a user is permitted to define times (and if desired day/dates) for which each number is to serve as the default number for the contact, so if the user selects the contact's name from a list or enters the contact's speed dial shortcut number, the number called by default changes depending on the time of day/date.
Abstract:
A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
Abstract:
The number of concurrent instant messaging sessions at a given time is limited. A user may configure the number of instant messaging sessions that are allowed at a given time. When a new request for an instant messaging session is received, a determination is made as to whether there are already the maximum number of allowed sessions. If the maximum number of sessions has been reached, the requestor receives a message indicating that the user is currently busy with other instant messaging sessions and inviting the requestor to join the queue. If the requestor joins the queue, then the requestor moves up in the queue when one of the user's instant messaging sessions terminate.
Abstract:
A system and method that gathers activity level from users and provides a “busy gauge” to others that indicates the user's activity level. In one embodiment, the user's activity is computed automatically based upon the user's interaction with their computer system. In the automatic method, an input tracking routine records the user's input frequency, such as mouse clicks, voice inputs, keyboard inputs, and other inputs in order to determine the user's activity level. The recorded activity data is compared with activity level thresholds that can be either default thresholds or user-specified. The user can select to use a manual input level in which the user specifies the user's activity level despite the number of input actions received at the user's computer.