摘要:
A data processing system and method are described for remotely controlling execution of a processor utilizing the processor's built-in test access port for debugging the execution of the processor. The client computer system is coupled to a server computer system utilizing a network. The server computer system transmits a signal to said client computer system to control execution of the processor utilizing the test access port. The signal identifies one of a plurality of processor actions. In response to a receipt of the signal, the processor executes the one of the plurality of processor actions such that the server computer system remotely debugs the execution of the processor utilizing the built-in test access port, wherein additional debug hardware is not utilized.
摘要:
A data processing system and method are disclosed for disabling a portable computer in response to the portable computer being moved outside of an authorized area of use. An authorized, geographical area of use is established. The authorized, geographical area is any geographical area capable of being defined. The geographical area is not limited to areas within an enclosure, and is not bounded by a transmitter's broadcast range. A determination is made regarding whether the portable computer is located outside of the authorized area. If the portable computer is moved outside of the authorized area, the portable computer is disabled. The portable computer is inoperable when disabled.
摘要:
Hacking a rental computer to use it beyond purchased rental time is prevented by plugging a time card with internal counter into a DIMM socket of the motherboard and encrypting the register locations of the time card with the private key of the motherboard to bind the time card to the motherboard. Thus, if the time card is not detected at boot or if it is removed during operation the computer is disabled. The counter counts down the rented time period as it receives clocking signals, and at the elapse of the purchased period disables the computer.
摘要:
A hypervisor operating system instantiates a virtual video driver to a main operating system that supports only one type of graphics adapter. The virtual driver handles graphics remapping among plural different display drivers associated with plural different display monitors to enable a computer to output data on multiple different monitors even though the main O.S. supports only one type of display driver.
摘要:
A first battery assembly is in a first battery housing that is mechanically engageable with a portable computer, and a second battery assembly is in a second battery housing that is mechanically couplable to the first battery housing. A switch has a first configuration in which communication is established between the portable computer and the first battery assembly and a second configuration in which communication is established between the portable computer and the second battery assembly.
摘要:
When a disk sector is written to, a bit for the sector is set indicating that the sector will require secure data disposal (SDD) to be run on it. To save time during end of life disposal, SDD is executed only on sectors whose bits indicate that they have been written to. SDD can be executed on each dirty sector in one operation at end of life or incrementally during use as disk activity permits.
摘要:
When a disk sector is written to, a bit for the sector is set indicating that the sector will require secure data disposal (SDD) to be run on it To saw time during end of life disposal, SDD is executed only on sectors whose bits indicate that they have been written to. SDD can be executed on each dirty sector in one operation at end of life or incrementally during use as disk activity permits.
摘要:
A system and method to avoid disk lube pooling is presented. A track access monitor tracks the number of times that a program accesses a particular track located on a hard drive. When the track access monitor determines that the number of track accesses to a particular track exceed a track access threshold, the track access monitor invokes a sequence of events to scan adjacent tracks in order to uniformly redistribute lubrication over the hard drive. In one embodiment, the track access monitor incrementally performs the adjacent track scanning during hard drive idle periods, such as when the system waits for a password from a user or when the operating system conserves power and idles the hard drive due to lack of activity.
摘要:
A method and system is described for selectively downloading antidotes onto a client computer. The client computer is connected via a network interface card (NIC) to a network that contains an anti-virus server. The NIC is initially logically isolated from the client computer, thus permitting the NIC to autonomously examine packets to and from the client computer and the network. The NIC selectively accepts packets only from trusted Internet Protocol (IP) addresses that conform to a security format such as Internet Protocol Security (IPSec).
摘要:
A computer tablet includes a wireless receiver, and a pen is configured to be manipulated by a person to ride against the computer tablet and thereby provide input to the computer tablet. The pen includes a wireless transmitter. A processor associated with the computer tablet outputs an alarm when a signal from the transmitter of the pen is not sensed by the computer tablet within a time period.