摘要:
In one implementation, a method includes determining first component data by a first aggregation device at a first time, the first aggregation device being associated with a first one of a plurality of device components of a device, the first component data comprising identification data regarding at least a second one of the plurality of device components of the device. The first component data may be stored. A component request may be received storing the first component data; receiving a component request; and providing the first component data via the wireless interface in response to the component request; wherein the determining, storing, receiving, and providing steps are performed when the device is powered off.
摘要:
In one implementation, a method includes determining first component data by a first aggregation device at a first time, the first aggregation device being associated with a first one of a plurality of device components of a device, the first component data comprising identification data regarding at least a second one of the plurality of device components of the device. The first component data may be stored. A component request may be received storing the first component data; receiving a component request; and providing the first component data via the wireless interface in response to the component request; wherein the determining, storing, receiving, and providing steps are performed when the device is powered off.
摘要:
A method and system for remotely configuring and/or provisioning a device that is nonoperational is provided. The device may be, in general, any electronic device that includes at least one setting (“device setting”) that can be programmatically or otherwise established or adjusted to configure and/or provision the device for its operation. The method includes detecting, via a radio frequency identification (“RFID”) tag, a state of a device that is communicatively coupled to the RFID tag; and providing the device setting via the RFID tag when the state signifies that the device is nonoperational.
摘要:
In one implementation, a method includes reading first component data from a first tag associated with a first component of a device. The device may be powered on or off. The first component data indicate components associated with the first component at a first time. The method may involve obtaining second component data from a second tag associated with a support structure. The second component data may indicate components disposed in the support structure at a second time. The method may also involve comparing the first component data with the second component data and determining whether the first component data match the second component data.
摘要:
Mechanisms are provided to inventory groupings of components, e.g., the physical chassis of a networking device as well as the various cards, modules, and/or blades inserted within the chassis. The inventory may be performed remotely. Some implementations also provide mechanisms to determine remotely the physical location of the asset. Preferred implementations of the invention can provide such functionality regardless of whether a main power supply of the physical device is on or off. Some embodiments of the invention employ radio frequency identification (“RFID”) technology.
摘要:
Some implementations of the present invention provide methods and devices for detecting the theft of, and disabling, electronic devices such as computers and network devices. The devices may be disabled when a signal is not detected, e.g., for a predetermined period of time. For example, a radio frequency (“RF”) signal (e.g., a beacon), an Internet Protocol (“IP”) signal or the like may define a space within which the devices may be operated with complete functionality. Outside this space, the devices will be disabled, at least to some degree. The degree of disablement may depend on the length of time since the signal was last detected. Alternatively, the devices may be disabled when a signal is detected: some such implementations define “portals,” “choke points” or the like past which a device may not be transported without some degree of disablement.
摘要:
In one implementation, a method includes reading first component data from a first tag associated with a first component of a device. The device may be powered on or off. The first component data indicate components associated with the first component at a first time. The method may involve obtaining second component data from a second tag associated with a support structure. The second component data may indicate components disposed in the support structure at a second time. The method may also involve comparing the first component data with the second component data and determining whether the first component data match the second component data.
摘要:
Some implementations of the present invention provide methods and devices for detecting the theft of, and disabling, electronic devices such as computers and network devices. The devices may be disabled when a signal is not detected, e.g., for a predetermined period of time. For example, a radio frequency (“RF”) signal (e.g., a beacon), an Internet Protocol (“IP”) signal or the like may define a space within which the devices may be operated with complete functionality. Outside this space, the devices will be disabled, at least to some degree. The degree of disablement may depend on the length of time since the signal was last detected. Alternatively, the devices may be disabled when a signal is detected: some such implementations define “portals,” “choke points” or the like past which a device may not be transported without some degree of disablement.
摘要:
Mechanisms are provided to inventory groupings of components, e.g., the physical chassis of a networking device as well as the various cards, modules, and/or blades inserted within the chassis. The inventory may be performed remotely. Some implementations also provide mechanisms to determine remotely the physical location of the asset. Preferred implementations of the invention can provide such functionality regardless of whether a main power supply of the physical device is on or off. Some embodiments of the invention employ radio frequency identification (“RFID”) technology.
摘要:
Systems and methods for image processing, comprising receiving a video frame, coding a first portion of the video frame at a different quality than a second portion of the video frame, based on an optical property, and displaying the video frame.