摘要:
A method for configuring a computer system memory, includes powering on the computer system; retrieving options for initializing the computer system; assigning to a first segment of the memory a first pre-defined setting; assigning to a second segment of the memory a second pre-defined setting; and booting the computer system.
摘要:
In at least some embodiments, a system comprises a plurality of electrical devices and management logic coupled to the electrical devices. While the electrical devices are each in a pre-boot environment, the management logic obtains information from the electrical devices and uses the information to determine electrical compatibility of, and/or configure, the electrical devices.
摘要:
Example methods, apparatus and articles of manufacture to diagnose temperature-induced memory errors are disclosed. A disclosed example method to diagnose a temperature-induced memory error includes detecting a memory error associated with a memory device, and writing a highest measured temperature of the memory device in the memory device when the memory error is detected, the highest temperature measured temporally near the detected memory error.
摘要:
In at least some embodiments, a system comprises a plurality of electrical devices and management logic coupled to the electrical devices. While the electrical devices are each in a pre-boot environment, the management logic obtains information from the electrical devices and uses the information to determine electrical compatibility of, and/or configure, the electrical devices.
摘要:
An apparatus and method to determine if a device error rate equals or exceeds a threshold. In an apparatus embodiment, a system comprises a device, and an interrupt handler executable by a processor. The interrupt handler executes, upon expiration of a time period, to determine if a threshold error rate associated with the device has been equaled or exceeded.
摘要:
Using a cryptographic co-processor in a computing system to encode data parameters determined during initialization, or during operation, or determined from machine specific values or states to bind data optionally to a specific machine, a specific cryptographic co-processor, or a specific operating environment machine state.
摘要:
In at least some embodiments, a computer system includes a processor and a firmware storage medium in communication with the processor. The firmware storage medium stores a default image invoked during a boot process and selectively stores a customized image. If the customized image is stored by the firmware storage medium, the boot process selectively substitutes at least part of the default image with at least part of the customized image.
摘要:
A computer system powers off upon operation of a power switch when the power switch is enabled. A switch mask enables and disables the power switch without intervention by an operating system of the computer system.
摘要:
A system includes a storage subsystem capable of being set in at least a first mode and a second mode. When operating the storage subsystem in the first mode, redundant information is stored in a first portion of the storage subsystem in the first mode. An indication is received to indicate that a mode of the storage subsystem is to be changed from the first mode to the second mode. In response to the indication, the mode of the storage subsystem is changed from the first mode to the second mode. In the second mode, non-redundant information is stored in the first portion of the storage subsystem. The mode of the storage subsystem is changed without resetting the system.
摘要:
A computer system implements hot mirroring for main system memory. That is, the computer system permits a user to hot plug a new memory board into the system and the system will respond by switching to a mirrored memory mode in which write cycles are performed to both memory boards (new and old). Once a new board is hot plugged into the system, the contents of the old board are copied over, in a background mode, to the new board so that both boards will have the same data. Because this background copying process may take a non-trivial amount of time and may detrimentally interfere with other system traffic, the system a user to exert control over the relative speed of the background copying so as to trade-off the time it takes to switch over to the mirroring mode versus the impact on on-going system behavior.