Abstract:
A system and method for monitoring tamper events in a computer system in accordance with the present invention is disclosed. The system comprises a detector means for detecting at least one tamper event and for providing an indication when the tamper event has occurred for longer than a predetermined time period. The system also includes an adapter means coupled to the detector means for receiving the indication and for disabling the computer system. The present invention is directed to a computer system, which has the ability to functionally determine if a tamper event is authorized and therefore allows the computer to operate after such an event. In a preferred embodiment, the tamper event could be as simple as a toggle switch being activated when the cover of the personal computer is removed.
Abstract:
A client on a network is provided with auxiliary low power logic, at the network adapter, that is always active and simulates network traffic (e.g. Ethernet format) normally sent under control of the main client system processor(s). This logic receives commands from the network manager, even when the system CPU is powered down or the system is not operational; information which allows the network manager to exercise broader control and perform maintenance and upgrades which would otherwise require service call for maintenance and reconfiguration of the client system. The auxiliary logic also can receive and interpret commands from the network that conform to a predefined format.
Abstract:
An apparatus for distance-based network resource discovery includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a distance between an information handling device and a network resource capable of communication with the information handling device. The machine readable code also includes a policy module following a discovery policy according to the distance. The discovery policy is associated with discovery of the network resource.
Abstract:
An apparatus and method are presented for adapting a user interface of a remote desktop host. The apparatus includes a processor, a memory, a detection module and an adaptation module. The detection module detects a remote desktop connection between a remote client and a host. The remote client and the host may have different user interface characteristics. The adaptation module adapts a user interface of the host to accommodate user interface characteristics of the remote client.
Abstract:
A method and apparatus are disclosed for modifying a transition to an altered power state of an electronic device based on accelerometer output. The apparatus includes an electronic device having a display and an accelerometer. The apparatus also includes a determination module, and a modification module. The determination module determines an in-use condition of the electronic device based on accelerometer output for the electronic device. The modification module modifies a transition to an altered power state of the electronic device in response to the determination module determining the in-use condition.
Abstract:
An approach is provided that receives a gesture from a user with the gesture being directed at a graphical user interface element. The gesture is received by the user at a touch-enabled display screen. Emulated physics properties are retrieved that correspond to the selected graphical user interface element. The system detects a speed and a direction from the received gesture and, based on this information, determines an initial trajectory of the selected graphical user interface element. The initial trajectory is adjusted based on the retrieved emulated physics properties with the movement of the element being rendered on the display screen based upon the adjusted trajectory.
Abstract:
An aspect provides a method, including: detecting a selection of an object on a touch screen display using touch based input; providing a visual indication of the object on the touch screen display in response to the detection of a selection; accepting gesture input at the touch screen display to fly out from the underlying document while maintaining the visual indication of the object on the touch screen display, such that during the fly out more of the underlying document is displayed; and moving the visual indication of the object about the underlying document in response to the accepted gesture input at the touch screen display. Other aspects are described and claimed.
Abstract:
An exemplary apparatus includes one or more processors, volatile memory, a storage drive and circuitry configured to establish a network connection and to attempt to send credentials via an established network connection. Such an apparatus further includes circuitry configured, responsive to authentication failure after an attempt to send credentials, to release an implemented security policy and load an operating system stored on the storage drive, and, responsive to an attempt to send credentials, to maintain an implemented security policy and to use an operating system exposed via an established network connection and associated with the sent credentials Such an apparatus optionally includes circuitry configured to implement a security policy that isolates at least a portion of a local storage drive. Various other apparatuses, systems, methods, etc., are also disclosed.
Abstract:
An apparatus for a sleep state video interface of an information handling device includes a storage device storing machine-readable code and a processor executing the machine-readable code. The apparatus includes a notification module receiving a sleep notification to place an information handling device into a sleep state. The information handling device receives a video signal. The apparatus includes a sleep module entering the information handling device into the sleep state in response to the notification module receiving the sleep notification. The video signal passes through the information handling device to a display as the information handling device is in the sleep state.
Abstract:
Systems, methods and products are described that provide secure boot with a minimum number of re-boots. One aspect provides a method including receiving an indication to boot from a power off state at a computing device; responsive to authenticating a user at one or more input devices, releasing a value derived from authenticating the user at the one or more input devices; responsive to releasing the value, unlocking one or more encrypted drives with a previously established alternate credential; and thereafter proceeding to boot from the power off state. By not having to call the non-BIOS software each boot, this minimizes the number of reboots for each boot cycle.