Abstract:
Alternative desktop computing solutions provide client devices configured with a local boot image and a connection to a remote storage device having a boot image. The clients are configured to boot either locally or remotely, and furthermore to determine from which image (local or remote) they have booted.
Abstract:
Embodiments provide systems, methods, apparatuses and computer program products configured to provide alternative desktop computing solutions. Embodiments generally provide client devices configured to utilize one of a local base image and a base image stored remotely, with a user-specific overlay image remotely storing user specific data. The clients are configured to download and store the base image locally.
Abstract:
Devices, methods and products are described that provide removable storage device data protection. One aspect provides a method comprising: ascertaining a protected removable storage device connected to an information handling device, said protected removable storage device having a first partition for storing data according to a first file system type, and a second partition for storing user data according to a second file system type; and responsive to said information handling device recognizing said second file system type, querying for user credentials to decrypt a data encryption key used to encrypt said user data of said second partition. Other embodiments are described.
Abstract:
An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash in a secure register; load an operating system; validate a certificate associated with the core root of trust measurement code and validate a certificate associated with the system management code; based on the validated certificates, provide an expected hash associated with the core root of trust measurement code and the system management code; decide if the expected hash matches the hash stored in the register; and, if the expected hash matches the hash stored in the register, commence a dynamic root of trust measurement session. Various other apparatuses, systems, methods, etc., are also disclosed.
Abstract:
Methods and arrangements where clients, in a diskless environment involving a storage area network, communicate to more optimally distribute the amount of disk input/output the individual clients are creating for the shared disk array.
Abstract:
Systems, methods and products are described that provide a dock for favorite applications. One aspect includes providing a dock point on a display device of an information handling device; responsive to user input associated with said dock point, launching a utility organizing a sub-set of user applications installed on said information handling device in a predetermined arrangement of launch points; providing an animated movement of said launch points in said utility responsive to user input; and responsive to user input selecting a launch point in said utility, launching an application associated with said launch point on the information handling device. Other embodiments are described.
Abstract:
An apparatus, method and system are disclosed for touch and gesture detection. A light source array comprises a plurality of light sources. Each light source of the light source array transmits a light beam across a face of a display in response to being activated. A light sensor array comprises a plurality of light sensors. Each light sensor of the light sensor array detects an intensity of each light beam transmitted across the face of the display in response to being activated. A controller concurrently activates each light source of the light source array with each light sensor of the light sensor array as a source/sensor pair during a detection cycle while other light sources of the light source array and other light sensors of the light sensor array are inactive. The controller further determines a location of a pointer relative to the display from a pattern of light beam intensities for each source/sensor pair.
Abstract:
An apparatus, system, and method are disclosed for storage write caching. A storage address translation table is used to overlay a user image and a common image. A storage driver stack module receives a storage access call and generates a storage access request with a requested file path and a requested storage address. A storage mapper module receives the storage access request, accesses the storage address translation table, and looks up a matching entry in the storage address translation table where the requested file path matches a saved file path and the requested storage address matches a saved common storage address, and maps a saved user storage address from the matching entry if a match exists.
Abstract:
A technique for booting a stateless client includes booting a virtual machine (VM) monitor on the client. The VM monitor is stored in a non-volatile memory area of a memory subsystem (of the client) and a first portion of an operating system (which does not include any state information for the operating system) is stored in the non-volatile memory area of the client. Booting of the operating system for the client is initiated and a remote storage (that stores a second portion of the operating system that includes state information for the operating system) is accessed via a communication link. Booting of the operating system for the client is completed using the second portion of the operating system.
Abstract:
Embodiments provide systems, methods, apparatuses and computer program products configured to provide alternative desktop computing solutions. Embodiments generally provide client devices configured with a local cache storing a common base image, with access to a user overlay on a remote storage device. Embodiments provide methods for provisioning a local disk of a client for use as the local cache with minimal IT administrator input.