摘要:
A technique for providing a software patch to an associated computer system includes receiving, at a wireless communication device, a communication. Next, it is determined, at the wireless communication device, whether the communication is associated with a software patch available for the associated computer system. When the communication is associated with the software patch, a notification is sent from the wireless communication device to the associated computer system that the software patch is available.
摘要:
An apparatus, system, and method are disclosed for gesture mode selection. An apparatus for gesture mode selection includes a detection module, a gesture mode module, and a gesture recognition module. The detection module detects a triggering event. The gesture mode module sets a gesture mode from an idle mode to an enhanced mode based on the detection of the triggering event. The gesture recognition module processes data from a non-contact input device to detect gestures according to the gesture mode set by the gesture mode module.
摘要:
A method computer usable medium and computer system circuitry are disclosed for starting or “booting up” a computer from a remote location using a remote command device such as a cellular telephone. The method and system includes a secure means for remotely storing and transmitting security passwords.
摘要:
A system and method for installing a type-1 hypervisor onto a secondary storage of a computer while a user operating system is already installed and executing in main memory.
摘要:
Apparatus, methods and program products by which the user of a computer system is notified of the desirability or urgency of initiating an interval during which the user leaves the system idle to permit some communication or update from a network with which the system is in communication.
摘要:
Mechanical stress on solder joints that hold BGA modules to computer motherboards is reduced by adding to the motherboard a topmost layer, and forming V-shaped channels into the layer next to the BGA module so that stress is shielded from the BGA module and its solder joints.
摘要:
A “setmax” command is issued in BIOS to hide the service area (HPA) of a HDD during normal operation, so that the HPA cannot be accessed or erased inadvertently by the user or by a virus. Pressing a special key (e.g., F11) during booting permits access to the HPA.
摘要:
Various methods are disclosed for ensuring compliance with operating system license requirements in a server blade center environment in which a server blade may have plural images of an O.S., one for each of plural thin clients serviced by the blade.
摘要:
A method, computer program product and system for enabling a client device in a client device/data center environment to resume from sleep state more quickly. The resource in the server blade used for suspending the activity of the computing state of the client device in order to enter the client device in a sleep state is not reallocated for a period of time. If the client device indicates to the server blade to resume the client device from sleep state prior to the ending of that period of time, then the server blade reinitializes the computing state using the same resource as used in suspending the computing state of the client device. By using the same resource, steps traditionally implemented in resuming the client device from sleep state are avoided thereby reducing the time in resuming the client device from sleep state.
摘要:
The boot-time required for a log-on to a desktop blade system is improved, and a more streamlined process for performing maintenance operations, such as software updates, across an enterprise desktop blade system is facilitated. All activities being performed by a user are cached, in an off-blade storage location, on an ongoing basis. The caching is performed using “divided caching”, that is, different elements of the user image are stored in different locations. The specific divisions utilized are based upon classifications of the information to be cached, e.g., a first class of information used by all users of the system; a second class of information utilized by a certain class of users; a third class of information utilized only by a particular individual, etc.