摘要:
A device can include a processor; a display operatively coupled to the processor; a battery having a battery length; a chassis that includes a bay having a bay length, the bay length being of sufficient length to allow translation of the battery along the bay length; a translation mechanism to translate the battery in the bay; and communication circuitry operatively coupled to the processor and the translation mechanism. Various other apparatuses, systems, methods, etc., are also disclosed.
摘要:
An apparatus for associated search terms with a downloaded file includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a reference module that references one or more search terms for a file selected for download. The file is retrieved by a search engine searching with the one or more search terms. The machine-readable code includes an embedding module that embeds the one or more search terms into data associated with a file copy. The file copy includes a copy of the file for saving on a storage device.
摘要:
This present invention relates to a method for using hypervisors to enable stable wireless network connections. The crux of the invention involves pushing the control of the networking devices from the Operating System level down to a networking front end hypervisor level. The hypervisor will control all networking devices, the authentication for these devices, and the selection of which connection to use. The hypervisor will also perform Network Address Translation (NAT) to the Operating System. Thus, the Operating System will receive a single, private IP address for use with the Operating System's applications. The hypervisor will handle the change of the IP address when roaming between networks and hide it from the Operating System through the use of the NAT.
摘要:
Hypervisors are a new technology in the industry that enable multiple Operating Systems to co-exist on a single client. The use of a hypervisor provides a novel approach to thermal fan control. The hypervisor is able to fire up a maintenance Operating System on demand or have it running from the powering of the computer. The maintenance Operating System continuously monitors the status of the user Operating System and determines if the system is within the desired fan noise profile by measuring noise levels using means well known in the art. If the system seems to be drifting out of the desired profile, the maintenance Operating System will determine what type of action is required and choose the most appropriate course of action. These actions can be performed by either the maintenance Operating System or the hypervisor, as appropriate.
摘要:
Solutions which address a growing and compelling need recognized in connection with rendering VOIP systems on laptops, or even on other mobile devices, even more versatile and user-friendly so as to even better replicate the advantages of cell phones. Broadly contemplated herein two modes of network access and two modes of user interface, which modes can be combined in any way as deemed suitable or appropriate. Preferably, a commonality between the contemplated network access and user interface modes is the use of a low-powered secondary processor, a secondary operating system, and non volatile storage applications which could be networking applications (e.g., an Always On subsystem).
摘要:
A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
摘要:
An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash in a secure register; load an operating system; validate a certificate associated with the core root of trust measurement code and validate a certificate associated with the system management code; based on the validated certificates, provide an expected hash associated with the core root of trust measurement code and the system management code; decide if the expected hash matches the hash stored in the register; and, if the expected hash matches the hash stored in the register, commence a dynamic root of trust measurement session. Various other apparatuses, systems, methods, etc., are also disclosed.
摘要:
A method for preventing unauthorized modifications to a rental computer system is disclosed. During boot up of the rental computer system, a determination is made whether or not a time-day card is bound to the rental computer system. If the time-day card is bound to the rental computer system, another determination is made whether or not a time/date value on the time-day card is less than a secure time/date value stored in a secure storage location during the most recent power down. If the time/date value on the time-day card is not less than the secure time/date value, yet another determination is made whether or not the secure time/date value is less than an end time/date rental value. If the secure time/date value is less than the end time/date rental value, the rental computer system continues to boot.
摘要:
A method and system are disclosed in which a management module (MM) designates an idle blade in a client blade farm to be an “administrative blade” that has administrator access to the virtual images of all users. The MM identifies when a particular user image is, or is not, in use and conveys this information to the administrative blade. The administrative blade performs virus scans, backups, defrags, patch installs, software upgrades, and other such maintenance functions on user images when they are inactive, thereby eliminating the performance impact to active users.
摘要:
Hypervisors are a new technology in the industry that enable multiple Operating Systems to co-exist on a single client. The use of a hypervisor provides a novel approach to thermal fan control. The hypervisor is able to fire up a maintenance Operating System on demand or have it running from the powering of the computer. The maintenance Operating System continuously monitors the status of the user Operating System and determines if the system is within the desired fan noise profile by measuring noise levels using means well known in the art. If the system seems to be drifting out of the desired profile, the maintenance Operating System will determine what type of action is required and choose the most appropriate course of action. These actions can be performed by either the maintenance Operating System or the hypervisor, as appropriate.