摘要:
A method and system for managing a secure network boot of a secondary server (server blade). The server blade sends a request, via an Ethernet switch, for a boot program to multiple Dynamic Host Configuration Protocol (DHCP) servers. One of the DHCP servers responds with an address of at least one Pre-boot Execution Environment (PXE) server that can upload a boot program to the server blade. Only if the responding DHCP server is on a list of known trusted DHCP servers will the Ethernet switch allow the server blade to receive the response from the responding DHCP server, thus allowing the download of a boot program from a PXE server.
摘要:
A method and system for managing a secure configuration of a server blade on a network. The server blade has a Remote Supervisor Adapter (RSA) card, which contains a list of trusted Dynamic Host Configuration Protocol (DHCP) servers. A remote manager, which communicates with the RSA card via a hyper-secure network, maintains the list of trusted DHCP servers on the RSA card. When the server blade broadcasts a request for configuration parameters to join the network, a response offer is returned from a DHCP server. If the responding DHCP server is not on the list of trusted DHCP servers contained in the RSA card, then the offer is refused, and another DHCP server's offer is evaluated.
摘要:
This invention is comprised of a data processing system containing at least one main processor connected to a system bus, a system memory connected to the system bus and accessible to each of the main processors, a tamper mechanism, and a local service processor. The tamper mechanism is configured to change state each time the system is inserted into a slot in a rack enclosure. The local service processor is connected to the tamper mechanism and configured to update an insertion log upon detecting a change in state of the tamper mechanism. The insertion log provides a count and a history of rack insertions to which the system has been subjected. The system may include a non-volatile storage element which is updated exclusively by the local service processor that contains the insertion log. The insertion log may include an insertion counter. In this embodiment, the local service processor is configured to increment the insertion counter upon each insertion. The local service processor may be further configured to issue an alert if the insertion counter exceeds a predetermined value. In one embodiment, the system further includes a battery backed real-time clock connected to the local service processor. The local service processor is configured to include real-time information corresponding to each insertion event in the insertion log. Each entry in the insertion log may include the identity of the rack enclosure and the geographical address of the slot of the corresponding insertion event. The local service processor may be configured to detect the tamper mechanism state and update the insertion following a power event such that the insertion log update is independent of configuring the data processing system with a boot image.
摘要:
Apparatus for configuring a computer system is adapted to allow configuration to occur on the system unit without removing the system unit from its packaging. By so preparing and operating the unit that it can function to a degree as a network client, it is possible to perform steps for configuring "in the package" that violate normal self test expectations. With this abnormal operating environment and operation the system is placed in condition to be removed from the packaging at the user's location with BIOS and program image customized for the user. This approach provides a freshly configured system and yet eliminates unpacking at a configuration center and then repacking for transfer to the user or the need for refresh configuration at the user site as the system unit is set up for normal use.
摘要:
Embodiments of the invention address deficiencies of the art in respect to load balancing for servers having multiple blades and provide a novel and non-obvious method, system and computer program product for load balancing at the blade level for servers having multiple blades. In one embodiment of the present invention, a blade server for performing load balancing may comprise a plurality of blades, each blade coupled with a plurality of outgoing ports. The blade server may further include a blade management module configured for monitoring throughput performance of the server and the plurality of blades, wherein each blade is coupled with a plurality of outgoing ports, instructing a blade to switch from a first outgoing port to a second outgoing port when throughput performance decreases and instructing the blade to switch from the second outgoing port back to the first outgoing port when throughput performance increases.
摘要:
Method and system for configuring a device that has failed to obtain a network address. In one aspect of the invention, a method for remotely configuring a device includes attempting to obtain a network address from a network server over a network, and receiving a valid network address over the network from a remote device connected to the network in response to failing to obtain the network address from the network server.
摘要:
A method, computer program product, and system for playing a series of discrete digital selections, such a MP3 files, from a selection database selected at least in part on user preference ratings, receiving user preference feedback for a particular selection while the particular selection is playing, and altering the user preference rating for the particular selection based upon the user preference feedback received. The user preference feedback may be provided in the form of a new user preference rating or an instruction to increment or decrement the current user preference rating. Alternatively, the user preference feedback may be determined by user interaction with standard controls, such as an increase in a user preference rating for a selection upon determining that a user has replayed the selection.
摘要:
A method and system for managing a secure network boot of a secondary server (server blade). The server blade sends a request, via an Ethernet switch, for a boot program to multiple Dynamic Host Configuration Protocol (DHCP) servers. One of the DHCP servers responds with an address of at least one Pre-boot Execution Environment (PXE) server that can upload a boot program to the server blade. Only if the responding DHCP server is on a list of known trusted DHCP servers will the Ethernet switch allow the server blade to receive the response from the responding DHCP server, thus allowing the download of a boot program from a PXE server.
摘要:
A method and system for managing a secure network boot of a server blade. The server blade is part of a server blade chassis, which holds multiple server blades that communicate with outside devices via a Pre-boot eXecution Environment (PXE) enabled network interface card. When a server blade receives a response from a PXE boot server offering a boot program download, a Remote Supervisory Adapter (RSA) card, managed by a remote manager, compares the identity of the responding PXE boot server with a list of trusted PXE boot servers. Only if the responding PXE boot server is on the list of trusted PXE boot servers will the server blade be allowed to use a boot program provided by the responding PXE boot server.
摘要:
The present invention is related to a system and method for customizing a computer system. According to a first aspect of the preferred embodiment of the present invention, the method includes providing a configuration mechanism in the computer system and transmitting customization information for the computer system to the configuration mechanism. The customization information in the configuration mechanism is then retrieved by the computer system to customize the computer system. In a second aspect, a computer system includes a central processing unit (CPU), memory coupled to the CPU, and a configuration mechanism coupled to the CPU for storing customization information for the computer system, whereby the CPU retrieves during a first system boot the customization information in the configuration mechanism to automatically customize the computer system.