Abstract:
In an embodiment, a computing device may include a control unit. The control unit may acquire a request from a central processing unit (CPU), contained in the computing device, that may be executing a basic input/output system (BIOS) associated with the computing device. The request may include a request for a value that may represent a maximum authorized storage size for a storage contained in the computing device. The control unit may generate the value and send the value to the CPU. The CPU may generate a system address map based on the value. The CPU may send the system address map to the control unit which may acquire the system address map and configure an address decoder, contained in the computing device, based on the acquired system address map.
Abstract:
In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are authenticated. Images to be authenticated include the operating system (OS) loader. The policy engine utilizes a certificate database to hold valid certificates for third party images, according to platform policy. Images that are not authenticated are not loaded at boot time. Other embodiments are described and claimed.
Abstract:
Systems and methods of mobile communication roaming where a subscriber's home network and a roaming network used by the subscriber do not have a roaming agreement. Roaming between an alliance of coordinated operators having bilateral roaming relationships and operators who do not have roaming agreements with the alliance is provided. By subscribing to the system, a non-alliance operator can gain roaming access to alliance networks having existing bilateral roaming relationships. An authentication message is received from a roaming network in which a subscriber is roaming and the message is authenticated if there is a roaming relationship. The authentication message is forwarded to the home network via an alliance network and responsive to the indication that the authentication message was received at a roaming network, roaming transactions are enabled for the subscriber within the roaming network.
Abstract:
A firmware assisted error handling scheme in a computer system has been disclosed. In one embodiment, firmware is used to access one or more hardware-specific error registers within the computer system in response to a system management interrupt (SMI) trap. Using the firmware, an error record in a common error record format is constructed. The error record is made available to an operating system (OS) within the computer system.
Abstract:
A composition for the prevention or treatment of type I diabetes in a subject, said composition comprising a fusion protein selected from the group consisting of GLP-1/IgG or variant or fragment thereof and an Ex4/IgG or variant or fragment thereof and an autoimmune suppressor for silencing an autoimmune response against islet beta cells.
Abstract:
A system and method of mobile communication roaming where a subscriber's home network and a roaming network used by the subscriber do not have a roaming agreement. The roaming network sends a “Send Authentication/Parameters” request to the home network via an intelligent roaming system on or attached to the backbone. The home network sends an authentication response to the “Send Authentication/Parameters” request from the home network to the roaming network via the backbone and intelligent roaming system. The roaming network sends a “Update Location” request from the roaming network to the intelligent roaming system. The visitor locator register (VLR) address in the “Update Location” request is replaced with the VLR address of the intelligent roaming system to create a modified update request. The modified update request is sent from the intelligent roaming system to the home network. The home network sends an update response to the modified update request to the roaming network via the backbone and intelligent roaming system.
Abstract:
In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are authenticated. Images to be authenticated include the operating system (OS) loader. The policy engine utilizes a certificate database to hold valid certificates for third party images, according to platform policy. Images that are not authenticated are not loaded at boot time. Other embodiments are described and claimed.
Abstract:
A system for processing e-mail messages receives, from an e-mail repository, a transactional e-mail message comprising message attribute data. The system places the transactional e-mail message in an e-mail thread in response to the message attribute data of the transaction e-mail message. The system determines whether one or more derived e-mail messages are included in the transactional e-mail message. If one or more derived e-mail messages are included, the system determines derived message attribute data of the one or more derived e-mail messages. The system then places the derived e-mail message in the e-mail thread in response to the derived message attribute data of the derived e-mail message.
Abstract:
A method and apparatus are described that allows a wireless device to detect and initiate communications with a selected second wireless device in a multi-device environment. Initiation of communications with a chosen second device is accomplished by generating a list of all available devices in sequential order according to device identifier and then communicating with each device in a sequential fashion until communications have been established with the selected second device.
Abstract:
In some embodiments, a PPM interface may be provided with functionality to facilitate to an OS RAS services for one or more hardware components, regardless of a particular platform hardware configuration, as long as the platform hardware and OS are in conformance with the PPM interface.