摘要:
A system, method, and program product is provided that initializes a counter maintained in a nonvolatile memory of a security module to an initialization value. The security module receives requests for a secret from requesters. The security module releases the secret to the requesters and the released secrets are stored in memory areas allocated to the requesters. A counter is incremented when the secret is released. Requestors send notifications to the security module indicating that the requestor has removed the secret from the requestor's memory area. The security module decrements the counter each time a notification is received. When the computer system is rebooted, if the counter is not at the initialization value, the system memory is scrubbed erasing any secrets that remain in memory.
摘要:
A method of selecting a network connection for use with a data processing system includes detecting environmental information indicative of a current environment in which the system is operating, determining whether the current environment is a known environment, and, rapidly selecting a current network connection by identifying a known environment network connection. Detecting environmental information may include detecting time information and detecting whether specified hardware (e.g., docking station, external monitor, printer, external network adapter) is present. The determining may include accessing a network connection data structure containing historical network connection information. The network connection data structure may include a plurality of records, each record identifying an environmental state and a network connection used in conjunction with the respective environmental state. The system may be a laptop system having a dial up modem connection, a wired network interface card (NIC) connection, a wireless connection, and a broadband connection.
摘要:
A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to balance loads by deferring association of new clients and thereby directing clients to associate with alternative access points having improved backbone connectivity. Where the client is unable to find an alternative access point, the client will eventually make a second association request to the access point. The access point, in identifying the second association request of the client, proceeds to associate the client in response to the second association request. Specific time limits can be imposed relative to the second association request.
摘要:
An I/O housing holds an I/O port and is pivotable between a housed position, wherein the I/O housing is held snugly flat in a chassis of the computer, and an extended position, wherein the port end of the housing is distanced from the chassis. The I/O housing can mechanically engage an I/O device with the port establishing communication between the I/O device and the computer processor.
摘要:
A low power processor in a computer is kept energized in a suspend state in which a main processor of the computer is deenergized. The low power processor maintains a network connection by sending keepalive packets as required by the network communication protocol.
摘要:
An apparatus, system, and method are disclosed for protecting a motion-sensitive device. The apparatus includes an identification module, a determination module, and a scheduler. The identification module identifies a use-intensive task involving the motion-sensitive device. The determination module determines a motion forecast that predicts a substantially motionless time interval. The scheduler schedules the use-intensive task such that the use-intensive task executes within the substantially motionless time interval. In this manner, a historical movement pattern is used to schedule future tasks such that the coincidence of task use of the motion-sensitive device and movement of the motion-sensitive device is minimized.
摘要:
A system, method, and program product is provided that initializes a computer system using an initialization process that identifies secrets that were stored in memory and not scrubbed during a prior use of the computer system. During the initialization process, one or more secret indicators are retrieved that identify whether one or more secrets were scrubbed from the computer system's memory during a previous use of the computer system. If the secret indicators show that one or more secrets were not scrubbed from the memory during the prior use of the computer system, then the initialization process scrubs the memory. On the other hand, if the secret indicators show that each of the secrets was scrubbed from the memory during the prior use of the computer system, then the memory is not scrubbed during the initialization process.
摘要:
A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
摘要:
A system and method to avoid disk lube pooling is presented. A track access monitor tracks the number of times that a program accesses a particular track located on a hard drive. When the track access monitor determines that the number of track accesses to a particular track exceed a track access threshold, the track access monitor invokes a sequence of events to scan adjacent tracks in order to uniformly redistribute lubrication over the hard drive. In one embodiment, the track access monitor incrementally performs the adjacent track scanning during hard drive idle periods, such as when the system waits for a password from a user or when the operating system conserves power and idles the hard drive due to lack of activity.
摘要:
An apparatus, system, and method are disclosed for balancing the read and write requirements of applications running in a computerized system against the requirements to protect a motion sensitive device in the system and requirements to protect data. The apparatus includes an application interface, a motion policy module, and a control module. The application interface delivers configuration parameters and system information to the motion policy module which establishes a policy for controlling the motion sensitive devices. The control module is configured to selectively communicate with one or more applications running in the computerized system and motion sensitive devices on the system. The control module executes actions to protect motion sensitive devices and system data and to maintain data read and write rates on the system in accordance with the configured protection policies and inputs from motion sensor devices.