摘要:
In embodiments, apparatuses, methods and storage media (transitory and non-transitory) are described that are associated with end-to-end datacenter performance control. In various embodiments, an apparatus for computing may receive a datacenter performance target, determine an end-to-end datacenter performance level based at least in part on quality of service data collected from a plurality of nodes, and send a mitigation command based at least in part on a result of a comparison of the end-to-end datacenter performance level determined to the datacenter performance target. In various embodiments, the apparatus for computing may include one or more processors, a memory, a datacenter performance monitor to receive a datacenter performance target corresponding to a service level agreement, and a mitigation module to send a mitigation command based at least in part on a result of a comparison of an end-to-end datacenter performance level to a datacenter performance target.
摘要:
Examples may include techniques to coordinate the sharing of resources among virtual elements, including service chains, supported by a shared pool of configurable computing resources based on relative priority among the virtual element and service chains. Information including indications of the performance of the service chains and also the relative priority of the service chains may be received. The resource allocation of portions of the shared pool of configurable computing resources supporting the service chains can be adjusted based on the received performance and priority information.
摘要:
In one embodiment, a processor has at least one core to execute instructions, a security engine coupled to the at least one core, a first storage to store a first immutable key associated with a vendor of the processor, and a second storage to store a second immutable key associated with an original equipment manufacturer (OEM) of the system. A first portion of firmware is to be verified based at least in part on the first immutable key and a second portion of firmware is to be verified based at least in part on the second immutable key, the first portion of firmware associated with the vendor and the second portion of firmware associated with the OEM. Other embodiments are described and claimed.
摘要:
A system, method and device may include triggering a direct connection setup based on one or more communication parameters communicated with a mobile device via a fixed device. It may be determined whether the mobile device is a peer. The quality of service with the mobile device via the fixed device may be compared with quality of service of a mobile device via a direct link. A channel for the direct link may be selected and information may be sent to the mobile device over the direct link via the channel.
摘要:
Methods and apparatuses enable maintaining wireless connectivity while the wireless client device is in a power save mode. The system includes a host operating system (OS) that handles wireless connections while the device is executing in normal operation, and an embedded agent that handles the wireless connections when the device switches to power saving operation and the host OS switches to a sleep or standby state. The system detects a change in the power save mode and triggers an exchange of session context information between the host OS and the embedded agent (from the host OS to the embedded agent when the system enters the power save mode, and from the embedded agent to the host OS when the system returns to normal operation from the power save mode). The system also triggers the switching of management consistent with the passing of session context information.
摘要:
A network interface controller of a computing device is disclosed that processes network packets without waking the computing device. The network interface controller may detect that a secured connection with an access point has been disconnected and may reconnect to the access point without waking the computing device. The network interface controller may support roaming between access points without waking the computing device. The network interface controller may also support establishing, re-establishing and maintaining a secured session with another computing device while a computing device is in a sleep state.
摘要:
A method and system to facilitate dynamic service negotiation with a uniform and persistent security control plane in a wireless network. In one embodiment of the invention, a node in the wireless network determines each capability provided by each of one or more virtual nodes that it supports and transmits a frame that has information of each capability provided by each of the one or more virtual nodes. By combining all the information of each capability provided by each of the one or more virtual nodes into one frame, the node reduces the volume of management traffic required and increases the available usable channel bandwidth in one embodiment of the invention.
摘要:
A method, apparatus and system enable security keys to be processed in a dedicated partition on a secure wireless platform. Specifically, embodiments of the present invention may utilize a secure processing area (i.e., a dedicated partition) to generate security keys and to utilize the security keys to perform a 4-way handshake to provide confidentiality and integrity protection for all data communication between the wireless node and an access point.
摘要:
Embodiments of apparatuses, articles, methods, and systems for negotiating quality of service resources in wireless networks are generally described herein. Other embodiments may be described and claimed.
摘要:
Embodiments of apparatuses, articles, methods, and systems for negotiating quality of service resources in wireless networks are generally described herein. Other embodiments may be described and claimed.