摘要:
A method and system for providing a timed power-on of logical partitions in a logical partition computer system is disclosed. An operator is allowed to enter a timed power-on value (TPO) value representing a time to boot one or more of the logical partitions. The TPO value for each of the logical partitions is then stored in nonvolatile memory. The system time is then periodically compared with each of the TPO values, and the corresponding partition is booted when the system time is greater than or equal to the TPO value.
摘要:
A method, system and apparatus for dynamically reconfiguring partitions of a partitioned computer system are provided. Here, dynamically reconfiguring a partition is defined as being able to reconfigure the partition while the partition is operational. Using a graphical user interface (GUI), a user may indicate a plurality of resources that are to be involved in a partition reconfiguration. However, the partition is actually reconfigured one resource at a time. If one of the resources is memory, then memory is allocated to the partition or de-allocated from the partition one logical memory block (LMB) at a time. In reconfiguring partitions, resources may be removed, added or moved from one partition to another. Moving resources from one partition to another entails removing the resources from one partition and adding it to the other partition. After a partition re-configuration, a resource allocation table is updated. All this is done transparently to the user.
摘要:
A system and method are provided to allow a user to update a computer system without having to interact with an initialization, or configurator software utility, or program. More particularly, the present invention allows a system provider, manufacturer, or service provider to create an installation file that, when provided to a user, will configure a system to accommodate newly added/removed hardware automatically. A base model and a new model of the system are maintained. The new model will include one or more different configurations, such as new graphics adapters, communications adapters, I/O controllers, or the like. The provider will have created a recovery/install image to be used with the base model. An operating system including a configurator program will be running on both the base model system and new model system. Software, such as device drivers, to be used with the new model's changed hardware configuration is installed on the new model system and initialized using its configurator program. A file for the new model is created using vital product data for the base model system. This new model configuration file is then installed on the base model machine and its configurator program is run. The configuration information (including the new model configuration data) is then stored as a system image and a script file is added to this system image. This new model image is then made available to end users, by a CD or the like, having a new model system. The script file in the new model image will specify a start priority that will allow it to be called before the configurator program and it will proceed to initialize the system with the appropriate software captured from the system provider's new model machine.
摘要:
A method and apparatus for improving security for a workstation accessing network resources through a web browser interface. A three step procedure is provided on the workstation for testing the origin and filetype extensions of command files, retrieved by a web browser, to determine whether they may be executed on the workstation. Step one of the invention consists of creating a non-standard command filetype extension on the workstation to be protected. This is followed by step two which isolates specific network or system resources for all approved command files. Finally, step three protects the command file contents and sub-directory locations on the protected workstation. The invention grants execute permission for an application file command files only when all three conditions of the above steps are met.