摘要:
A data processing system and method are described for remotely accessing a client computer system's individual initialization settings. The client computer system is coupled to a server computer system to form a local area network. The server computer system transmits a command to the client computer system to access a selected one of the client computer system's initialization settings. In response to a receipt of this command by the client computer system, the client computer system accesses only selected ones of the initialization settings. The client computer system may be powered off while the initialization setting is accessed.
摘要:
Described is a computer system which is operable to allow configuration to occur on the system unit without removing the system unit from its packaging. The computer system is coupled to a remote computer via a data communication link. The system is operative to detect whether it is in a configuration mode when a power source and a network connection are made through the packaging. If the configuration mode is detected by the system, the system powers on and places itself in the configuration mode to allow (1) the remote computer to transfer signals to the system via the communication link to set up data transfers to the memory of the system, and (2) the remote computer to transfer data to the memory of the system for storage therein, whereby the system is configured at least in part in its packaging.
摘要:
A system and method for storing adapter card Option ROM BIOS extensions on the system's DASD and, more particularly, on a partition of the DASD that is generally inaccessible to the operating system. The system may partition the system DASD into a user partition and a hidden partition where the hidden partition is preferably inaccessible to the operating system. BIOS extensions files are stored in the hidden partition. The system BIOS, when executed, identifies the peripheral devices on the system and interrogates the hidden partition for BIOS extension files corresponding to each of the identified devices. If the hidden partition contains a BIOS extension file corresponding to an identified peripheral device, the file is verified for authenticity. If the verification completes successfully, the BIOS extension file is copied into shadow RAM and control is passed to it. In one embodiment, each BIOS extension file are downloaded to the system's DASD using a standards-based update process that is independent of the vendor or adapter card type.
摘要:
A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point selectively dissociates clients on the wireless network. In order to select which clients are dissociated first, a predetermined client dissociation policy is established. The policy can include account priority, bandwidth utilization, elapsed time since last transfer, and, amongst other criteria, whether the client is currently transferring in peer-to-peer mode on the wireless network. Upon detecting the degraded condition, either immediately or after a predetermined delay to ensure that the degraded condition is not temporary, clients on the wireless network are dissociated according to the preestablished policy.
摘要:
An approach is provided that identifies when a wireless keyboard unit is connected to an information handling system that includes a display screen that is partially blocked when the keyboard is attached. A determination is made as to the size of the visible portion of the display screen. Items are displayed on the visible portion of the display screen. The approach refrains from displaying items on the blocked portion of the display screen. The user is able to move the wireless keyboard, the movement of the keyboard resulting in a changed size of the visible portion of the display screen. After the keyboard is repositioned, the visual items are re-displayed on the visible portion of the display screen so that the items fit in the changed size of the visible portion of the display screen.
摘要:
A method and corresponding network interface device for communicating between devices connected to a LAN includes attempting to communicate between the network devices over an initial subset of the network media wires. If the communication fails, a subsequent subset of media wires is selected. The wires of this subsequent subset differ from the wires of the initial subset. If the attempted communication succeeds, the current subset of network media wires is used as the media over which subsequent network data is transmitted. Attempting to communicate over the media may include sending an initialization sequence such as an Ethernet Auto-negotiate sequence. In one embodiment, the network media is implemented as 8 wires of CAT 5 cabling suitable for use with a Gigabit Ethernet. In this embodiment, any subsequent subsets of the network media wires may consist of 4 of the 8 wires over which 100 Mbps Ethernet operation may occur.
摘要:
A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point transmits or broadcasts a reassociation request to one or more clients associated with the access point. In addition, the rate at which new associations are made is halted or reduced during the degraded backbone condition. In one embodiment, the association rate is reduced by increasing the interval between beacons transmitted by the access point which identify the access to the backbone network.
摘要:
When an authenticated wireless computer loses connectivity to a wireless access point of a network and roams to another access point, the wireless computer (e.g., a hypervisor in the computer) determines whether the new access point is authorized for secure communication and if so, releases access to secure data on the network through the new access point.
摘要:
A system, method, and program product is provided that initializes a counter maintained in a nonvolatile memory of a security module to an initialization value. The security module receives requests for a secret from requesters. The security module releases the secret to the requesters and the released secrets are stored in memory areas allocated to the requesters. A counter is incremented when the secret is released. Requestors send notifications to the security module indicating that the requestor has removed the secret from the requestor's memory area. The security module decrements the counter each time a notification is received. When the computer system is rebooted, if the counter is not at the initialization value, the system memory is scrubbed erasing any secrets that remain in memory.
摘要:
A first battery assembly is in a first battery housing that is mechanically engageable with a portable computer, and a second battery assembly is in a second battery housing that is mechanically couplable to the first battery housing. A switch has a first configuration in which communication is established between the portable computer and the first battery assembly and a second configuration in which communication is established between the portable computer and the second battery assembly.