摘要:
A method and system are disclosed for dynamically loading selected BIOS modules and settings from a server computer system to a client computer system according to an identity of a user who is currently utilizing the client computer system. The client computer system is coupled to a server computer system via a network. Selected BIOS modules and settings are associated with a particular user. These BIOS modules and settings are those preferred by the particular user to use in order to customize the client computer system when the client computer system is used by the particular user. The associations among the particular user and the selected BIOS modules and settings are stored in the server computer system. The selected BIOS modules and settings are downloaded from the server computer system to the client computer system when the particular user causes the client computer system to start booting, i.e. when the particular user is the current user. The client computer system is then booted utilizing these downloaded BIOS modules and settings. The client computer system is booted utilizing BIOS modules and settings received from the server computer system in order to customize the client computer system according to the current user's preferences.
摘要:
A data processing system and method are described for providing a dynamically assigned network address to a client computer system. The data processing system includes a server computer system coupled to the network. An access port is provided which is coupled to the network. The computer system is coupled to the network utilizing the access port. The computer system is then powered on. The computer system requires a network address in order to communicate utilizing the network. The computer system initially has no stored network address each time prior to being powered on. A dynamic network address is provided to the computer system utilizing only the access port each time the computer system is powering on.
摘要:
A method and system are described for activating a password requirement in a computer system included within a data processing system. A wireless signal is transmitted to the computer system such that computer system receives the signal. In response to a receipt of the wireless signal, a requirement that a password be entered is activated. Thereafter, a correct entry of a password is required prior to the computer system being fully operable.
摘要:
A client on a network is provided with auxiliary low power logic, at the network adoptor, that is always active and simulates network traffic (e.g., Ethernet format) normally sent under control of the main client system processor(s). This logic collects client status information and reports to the network manager, even when the system CPU is powered down, information which allows the network manager to exercise broader control and perform maintenance and upgrades which would otherwise require a dialog with the user and/or limit maintenance and reconfiguration of the client system to off-hours activity.
摘要:
A method of asset control and workstation computer deployment that utilizes a dual port electronic memory identification RFID tag to hold serial number and hardware and software configuration profiles as well as user information. The RFID tag is mapped into the workstation computer memory space and can also be read and written by radio frequency signalling through a wired plug and access flap in a shipping carton. Serial numbers and MAC address is stored on the tag by the manufacturer. User information, workstation profile and software image information is stored onto the tag while the computer is being received for forwarding to the final workstation destination without the need to unpack and power up the computer. The information stored on the tag is used to allow automated system configuration and software downloading to the computer.
摘要:
A network includes a plurality of wall plates, each of the wall plates couples a network resource such as a computer or a network attached device to the network and includes an RFID circuit to detect proximate devices having an RFID tag. The proximate devices can be network attached devices or non network attached devices such as desks, phones, and artwork. Logic is included within each wall plate which includes wall plate physical location information. The logic is designed to respond to a broadcast signal. In so doing, the physical location of any resource can be determined. The physical location of all known resources are provided to an inventory application in the network, thereby allowing network administrators and users to remotely determine the physical location (room, floor, building, etc.) of any and all known resources attached to the network. Likewise, local computer users are able to identify the network resources located in their vicinity.
摘要:
Apparatus and method provides dynamic load balancing of network bandwidth between access points in an 802.11 wireless LAN. The access point generates and monitors average bandwidth utilization of client devices connected to said access point. The average bandwidth utilization for each client device is aggregated and selected clients are forced to roam to other access points if the aggregate bandwidth is equal or exceeds a threshold.
摘要:
A method and system for providing automatic notification of an end of lease of a computer system and its location within a computer network is disclosed. The computer network includes a server computer system and multiple client computer systems. A message is initially sent from the server computer system to all the client computer systems to inquire the lease status of each of the client computer systems. At each of the client computer systems, a determination is made as to whether or not a current date falls within a predetermined amount of days from the end of lease date for the client computer system. If the current date falls within the predetermined amount of days from the end of lease date for the client computer system, the physical location of the client computer system is obtained from a storage device located at an Ethernet wall plate to which the client computer system is attached. An alert message, which includes the physical location of the client computer system, is then generated by the client computer system. The alert message is subsequently transmitted from the client computer system to the server computer system.
摘要:
Authentication of an entity remotely managing a data processing system is enabled to allow changes by the remote entity to hard-locked critical security information normally accessible only during the POST and only to trusted entities such as the system BIOS. The remote entity builds a change request and generates a hash from the change request with a current password appended. The change request and the hash are stored in a lockable non-volatile buffer which, once locked, requires a system reset to access. During the next POST, a trusted entity such as the system BIOS reads the change request, generates an authentication hash from the change request and the current password within the hard-locked security information, and compares the buffered hash with the generated hash. If a match is determined, the security information is updated; otherwise a tamper error is reported.
摘要:
A data processing system and method are disclosed for automatically recovering from an unsuccessful boot of the system. A boot of the system is initiated utilizing a first boot code stored in a first storage location. A determination is made regarding whether the boot was successful. If a determination is made that the boot was unsuccessful, a boot is reattempted utilizing a second boot code stored in a second storage device.