摘要:
Operating parameters and potentially related malfunctions are gathered from end users of computer systems and used to develop a best practices profile. The profile can be used to automatically alter the operating parameters of a user computer.
摘要:
Methods and arrangements for capturing information related to operational conditions are disclosed. Embodiments include volatile memory to quickly record operational parameters via, e.g., basic input output system (BIOS) code, system management interrupt (SMI) code and/or executing applications. Many embodiments provide an alternative power source and a voltage switch to protect against loss of the information between storage in the volatile memory and storage in the non-volatile memory. Some embodiments include a read controller that provides access to the volatile memory when primary power is available. The read controller may also offer direct access to the non-volatile memory in case of a catastrophic failure that renders the processing device substantially non-functional. Further embodiments include a second processing device to generate a usage model and/or to perform diagnostics with the operational parameters.
摘要:
A method and system for accessing a remote real communication port (“COM port”) from a server blade in a server blade chassis by creating a virtual COM port in the server blade. A basic input/output system (BIOS) controller monitors an internal COM port in the server blade for communication traffic. Upon detecting the communication traffic, the BIOS controller reroutes the traffic to a virtual USB COM port created by the BIOS controller chipset. The virtual USB COM port directs the communication traffic to an internal universal serial bus (USB) device in the server blade. The USB device then forwards the traffic to an Ethernet media access controller (MAC) input/output (I/O) on a sideband channel to a remote system, which passes the communication traffic to a real COM port in the remote system.
摘要:
A secure computer system includes a central processing unit in which plural programs reside. The system includes means for verifying whether the at least one program is trusted or not trusted. That means can be an external key device that includes a verification program that can communicate with the programs residing within the central processing unit.
摘要:
An apparatus, method, and system to seal a data repository to a trusted computing platform is described. The data repository may be sealed by encrypting the data on the repository and sealing a cryptographic key to a specific set of platform resources. With the data repository sealed to the platform, the system boot sequence will fail if the system configuration is compromised, for example by insertion of “snoopware” or a modified BIOS. Additionally, if the computer containing the data repository is lost or stolen, the encrypted data remains secure even if the repository is attached to a system modified to bypass normal safeguards.
摘要:
To reduce the thickness of a digital light projector (DLP), a circulating tape having sequences of red, green and blue segments is used instead of a color wheel to produce a color image.
摘要:
A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point selectively dissociates clients on the wireless network. In order to select which clients are dissociated first, a predetermined client dissociation policy is established. The policy can include account priority, bandwidth utilization, elapsed time since last transfer, and, amongst other criteria, whether the client is currently transferring in peer-to-peer mode on the wireless network. Upon detecting the degraded condition, either immediately or after a predetermined delay to ensure that the degraded condition is not temporary, clients on the wireless network are dissociated according to the preestablished policy.
摘要:
A method and system are disclosed for placing a computer in a safe and secure lock down state from a remote location using a remote command device such as a cellular telephone. The method and system includes optional security provisions before restarting the computer.
摘要:
The invention broadly contemplates a safety arrangement that transitions a moving component, for example a cooling fan housed within a chassis of an electronic device, between a first operating mode or condition and a second operating mode or condition. The first operating mode is a normal operating mode, allowing the component (fan) to operate (rotate) at full speed. The second operating mode is a safety or service mode, allowing the component (fan) to operate (rotate) at a reduced speed such that it is compliant with applicable safety regulations.
摘要:
An apparatus includes sensor circuitry configured to sense spatial phenomena; application circuitry configured to respond to sensation of a spatial phenomenon by the sensor circuitry where a pre-existing relationship exists between the spatial phenomenon and the response of the application circuitry; and regulation circuitry configured to regulate the response of the application circuitry to the spatial phenomenon based at least in part on sensation of a different spatial phenomenon by the sensor circuitry. Various other apparatuses, systems, methods, etc., are also disclosed.