摘要:
Provided is a method, program and system to update files in a computer system. A patch is received for an installed program in a computer and message from a server over a network. Program files for the installed program are updated with contents of the patch. A determination is made as to whether the message indicates to automatically reboot the computer. Information is generated to a user indicating that the computer will be automatically rebooted. Operations are initiated in the computer to reboot the computer after a delay period to provide the user opportunity to close files and applications before the reboot.
摘要:
The present disclosure relates to a technique or device to allow hardware related drivers to present a centralized configuration program and, more particularly, to a technique or device to allow hardware related drivers to present configuration information to a centralized user interface manager.
摘要:
Methods and apparatus for providing seamless functionality in a computer are disclosed. For example, an encrypted file system manager is included to layer an encoded File Allocation Table on top of a disk and to pass to the operating system an Embedded Root Key to provide access to an encrypted Firmware Interface System Partition.
摘要:
Using radio frequency identification (RFID) tags embedded in processors within a computing system to assist in system initialization processing. The RFID tags provide a separate communication path to other components of the computing system during initialization processing, apart from the system interconnect. When the computing system is powered up, each processor in the system may cause its RFID tag to broadcast data regarding the processor's interconnect location and initialization status. The RFID tags may be sensed by a RFID receiver in the Platform Control Hub (PCH) of the computing system, and each processor's interconnect location and initialization status data may be stored in selected registers within the PCH. When the BIOS executes during system initialization processing, the BIOS may access these PCH registers to obtain the processor's data. The interconnect location and initialization status data may be used by the BIOS to select the optimal routing table and to configure the virtual network within the computing system based at least in part on the optimal routing table and the RFID tag data and without the need for interrogating each processor individually over the system interconnect.
摘要:
A method and system for recovery of a computing environment includes monitoring during a pre-boot phase and a runtime phase of a computing device for selection of a hot key sequence by a user and performing a recovery action in response to the selection of the hot key sequence by the user. The recovery action may be any one of a number of predetermined and/or selectable actions such as restoring system defaults, migrating memory, displaying a menu of options, setting various software flags, restarting or rebooting the computing device, and/or the like.
摘要:
In a computing system having a processor package, an operating system, and a physical I/O device, a partial virtual machine is provided to instantiate a virtual I/O device corresponding to the physical I/O device, the virtual I/O device having a virtual I/O controller. The partial virtual machine includes an I/O port trap to capture an I/O request to the virtual I/O device by the operating system; an I/O controller emulator coupled to the I/O port trap to handle an I/O control request to the virtual I/O controller, when the I/O request comprises an I/O control request; an I/O device emulator coupled to the I/O port trap component to handle an I/O access request to communicate with the virtual I/O device, when the I/O request comprises an I/O access request; and a device driver coupled to the I/O controller emulator and the I/O device emulator to communicate with the physical I/O device based at least in part on the I/O control request and the I/O access request. The partial virtual machine executes within a secure enclave session within the processor package, improving security of I/O transactions by preventing access to the partial virtual machine by the operating system.
摘要:
Embodiments of the invention involve decreasing boot time by utilizing virtualization or partitioning techniques. In an embodiment, a hypervisor/platform partition controls the platform access to the boot target medium. Boot target data is selectively stored in a fast memory. When the system reboots, or an operating system on the platform is reset, boot target information may be retrieved from the fast memory rather than the original, slower boot target medium. Other embodiments are described and claimed.
摘要:
A method, apparatus, system, and computer program product for multi-owner deployment of firmware images. The method includes obtaining a signed firmware image that comprises a first code module signed by a first code owner and a second code module signed by a second code owner. The method further includes obtaining an updated first code module comprising updated code for the first code module, verifying that the updated first code module is signed by the first code owner, and updating the signed firmware image with the updated first code module in response to verifying that the updated first code module is signed by the first code owner. The signed firmware image may further comprise an access control list that authorizes updates to the first code module by the first code owner and updates to the second code module by the second code owner.
摘要:
A peer-to-peer IT (Information Technology) backbone. The system includes at least one IT server and a plurality of client computers arranged in a peer-to-peer IT backbone. Each of the client computers includes an in-band processor, an out-of-band (OOB) microcontroller, and a storage device coupled to the in-band processor and OOB microcontroller. The storage device includes a reserved area for the OOB microcontroller to enable an IT-administration to push IT payloads from the at least one IT server onto the reserved area of at least one of the plurality of client computers. The IT payloads are disseminated throughout the peer-to-peer IT backbone by the OOB microcontroller of the client computers.
摘要:
A method and system for handling a management interrupt, such as a system management interrupt (SMI) and/or a platform management interrupt (PMI), includes sequestering two or more processor cores from a plurality of processor cores to form a group of sequestered processor cores for handling the management interrupt. Generated management interrupts are directed to the group of sequestered processor cores and not to non-sequestered processor cores. At least one of the sequestered processor cores handles the management interrupt without disrupting the current operation of the non-sequestered processor cores.