Abstract:
Briefly, system and method for message-based power management which may be used, for example, in computer systems and communications networks. Embodiments of the present invention may include, for example, a device connected to a power management controller (PMC); the device and/or the PMC may send, receive, and/or process power management event (PME) messages. Embodiments of the present invention may operate using links in communicative and/or non-communicative modes. Embodiments of the present invention may include a switch, to send/receive, process, create, re-format and/or route one or more PME message on behalf of various devices, for example, a Peripheral Component Interconnect (PCI) device.
Abstract:
A virtual operator and method for performing authentication and service translation. The virtual operator assigns first and second identifiers to subscribers. The virtual operator updates the second identifier when the service provider corresponding to the second identifier changes. When the virtual operator receives a request for authentication, the virtual operator forwards the authentication request to a serving network for authentication. When the virtual operator receives a service request, the virtual operator selects, using network optimization criteria, a network to provide the requested service. The virtual operator translates network protocols when the network forwarding authentication or service request uses a network protocol different from the network performing authentication or the requested service.
Abstract:
In some embodiments a boot progress of a System Boot Strap Processor in a multi-processor system is monitored and a boot processor failure is detected using an Application Processor. If the boot processor failure is detected at least a portion of the system is reinitialized (and/or the system is rebooted). Other embodiments are described and claimed.
Abstract:
This invention relates to the field of biotechnology or genetic engineering. Specifically, this invention relates to the field of gene expression. More specifically, this invention relates to novel substitution mutant receptors and their use in a nuclear receptor-based inducible gene expression system and methods of modulating the expression of a gene in a host cell for applications such as gene therapy, large scale production of proteins and antibodies, cell-based high throughput screening assays, functional genomics and regulation of traits in transgenic organisms.
Abstract:
In some embodiments, an apparatus includes a processor, an expander memory bridge location, a memory coupled to the expander memory bridge location, and a bus controller including intercept logic to intercept and block communication from the processor to the expander memory bridge location and to emulate an expander memory bridge. In some embodiments, a method includes intercepting and blocking a status request to a device, regardless of whether the device is installed, and responding to the status request.
Abstract:
A “Plug and Play” type dynamic detection and binding capability for wireless peripheral devices is disclosed. The dynamic detection and binding of wireless peripherals is achieved without manual intervention, and without modifications to the host computing device's built-in operating system (BIOS). Dynamic detection and binding of a wireless peripheral device by a host is accomplished by transmitting a Device_Hail message, waiting for a Hail_Response message from a peripheral, and, upon the reception of a Hail_Response message, assigning a Peripheral Address to the responding peripheral and transmitting it to the peripheral in a Peripheral_Address_Allocation message.
Abstract:
The disclosure provides methods of generating a murine model of neonatal necrotizing enterocolitis, whereby the generated murine animal exhibits at least one symptom of neonatal necrotizing enterocolitis. The disclosure also provides methods to measure transfusion effects on anemia and methods for identifying and isolating an agent useful for the treatment or prevention of neonatal necrotizing enterocolitis.
Abstract:
A virtual operator and method for performing authentication and service translation. The virtual operator assigns first and second identifiers to subscribers. The virtual operator updates the second identifier when the service provider corresponding to the second identifier changes. When the virtual operator receives a request for authentication, the virtual operator forwards the authentication request to a serving network for authentication. When the virtual operator receives a service request, the virtual operator selects, using network optimization criteria, a network to provide the requested service. The virtual operator translates network protocols when the network forwarding authentication or service request uses a network protocol different from the network performing authentication or the requested service.
Abstract:
In an embodiment, a computing device may include a control unit. The control unit may acquire a request from a central processing unit (CPU), contained in the computing device, that may be executing a basic input/output system (BIOS) associated with the computing device. The request may include a request for a value that may represent a maximum authorized storage size for a storage contained in the computing device. The control unit may generate the value and send the value to the CPU. The CPU may generate a system address map based on the value. The CPU may send the system address map to the control unit which may acquire the system address map and configure an address decoder, contained in the computing device, based on the acquired system address map.
Abstract:
In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are authenticated. Images to be authenticated include the operating system (OS) loader. The policy engine utilizes a certificate database to hold valid certificates for third party images, according to platform policy. Images that are not authenticated are not loaded at boot time. Other embodiments are described and claimed.