摘要:
A printer which includes both high volume printing capabilities such as laser jet printing with photographic quality printing capabilities such as ink jet or dye-sublimation printing within the same printer housing.
摘要:
A printer which includes both high volume printing capabilities such as laser jet printing with photographic quality printing capabilities such as ink jet or dye-sublimation printing within the same printer housing.
摘要:
In a system to configure a replacement motherboard, one or more subsystems are provided to determine whether the replacement motherboard is in a manufacturing mode, determine whether firmware for the replacement motherboard is unlocked, and receive an input from a user to configure the replacement motherboard when the replacement motherboard is determined to be in the manufacturing mode and the firmware is unlocked.
摘要:
Systems and methods are disclosed for providing memory security override protection for improved manufacturability of information handling systems. A security authentication system is added to a software driven security override signal for unlocking programmable memory circuitry, such as flash memory, according to security protection techniques associated with the Intel AMT (Active Management Technology) architecture. This security authentication system disclosed requires authentication of software security override requests before they are allowed. More particularly, the systems and methods disclosed add specific BIOS (Basic Input Output System) code to check the security override status and the software security override request signals on boots of the computer system to make sure these requests are not coming from rogue elements within the computer system. If the authentication is validated, then the programmable memory circuitry is unlocked on the next boot of the system to allow for reprogramming.
摘要:
An apparatus and associated method are disclosed for facilitating the testing of device connections, including functional shock and vibration testing of peripheral card slots or any other desired connector interface. In part, a power supply located on the peripheral device, or some other external power source, is used to power fault detection circuitry. In this way, faults can be identified, such as through visual fault indicators, without the necessity of powering the system. In addition, simulated peripheral cards are provided that include adjustable weights so that the weight distribution of an actual card can be simulated without the necessity of having a functional peripheral in hand.
摘要:
Disclosed are techniques for recovering system configuration settings, such as remote management, of an information handling system following a disorderly shutdown. A restart controller detects a disorderly shutdown of an information handling system and, in response, sets a disorderly shutdown flag and restarts the information handling system. During the restart, the basic input/output system (BIOS) checks the disorderly shutdown flag as part of its power-on housekeeping. In response to determining the disorderly shutdown flag has been set, the BIOS reconfigures the system configuration settings, such as the power management scheme, of the information handling system so as to enable one or more remote wake mechanisms, such as wake-on-LAN or wake-on-ring. The BIOS then performs an orderly shutdown of the information handling system to place the information handling system in a low-power state, from which the information handling system can be awoken via the remote wake mechanism.
摘要:
In a system to configure a replacement motherboard, one or more subsystems are provided to determine whether the replacement motherboard is in a manufacturing mode, determine whether firmware for the replacement motherboard is unlocked, and receive an input from a user to configure the replacement motherboard when the replacement motherboard is determined to be in the manufacturing mode and the firmware is unlocked.
摘要:
Disclosed are techniques for recovering system configuration settings, such as remote management, of an information handling system following a disorderly shutdown. A restart controller detects a disorderly shutdown of an information handling system and, in response, sets a disorderly shutdown flag and restarts the information handling system. During the restart, the basic input/output system (BIOS) checks the disorderly shutdown flag as part of its power-on housekeeping. In response to determining the disorderly shutdown flag has been set, the BIOS reconfigures the system configuration settings, such as the power management scheme, of the information handling system so as to enable one or more remote wake mechanisms, such as wake-on-LAN or wake-on-ring. The BIOS then performs an orderly shutdown of the information handling system to place the information handling system in a low-power state, from which the information handling system can be awoken via the remote wake mechanism.
摘要:
An energy discharge resistance is isolated from storage capacitance containing a voltage charge until power is removed from the storage capacitance. Then the discharge resistance may be coupled to the storage capacitance to drain residual charge therefrom. The discharge resistance is coupled to the storage capacitance when external power is removed and is un-coupled from the storage capacitance when external power is applied to the storage capacitance. In this way, unnecessary power draw during operation or standby of an electronic system is substantially eliminated.
摘要:
Systems and methods are disclosed for providing memory security override protection for improved manufacturability of information handling systems. A security authentication system is added to a software driven security override signal for unlocking programmable memory circuitry, such as flash memory, according to security protection techniques associated with the Intel AMT (Active Management Technology) architecture. This security authentication system disclosed requires authentication of software security override requests before they are allowed. More particularly, the systems and methods disclosed add specific BIOS (Basic Input Output System) code to check the security override status and the software security override request signals on boots of the computer system to make sure these requests are not coming from rogue elements within the computer system. If the authentication is validated, then the programmable memory circuitry is unlocked on the next boot of the system to allow for reprogramming.