摘要:
Described is a computer system which is coupled to a remote computer via a network cable. The computer system has a normally closed enclosure and is capable of securing data retained within the system against unauthorized access and notifying the remote computer when an unauthorized access has occurred. The computer system includes an erasable memory element mounted within the enclosure for selective activation to active and inactive states and for receiving and storing a security password when in the active state. A manually operable option switch is mounted within the enclosure. The option switch is manually settable by a user of the computer system for setting the memory element to the active and inactive states. A tamper detection switch is mounted within the enclosure and operatively connected with the memory element for detecting opening of the enclosure and for generating a tamper alert signal and clearing any stored security password from the memory element in response to any switching of the tamper switch. The computer system further includes a network connector which is operative to receive the tamper alert signal and upon so receiving, transmit an alert packet over the communication line to the remote computer. The alert packet contains an alert message and information which specifically identifies the computer system.
摘要:
Described is a system which includes at least one computer system connected to a main computer system via a data transmission network. The at least one computer system has a network connector for communicating data with the main computer. The network connector is supplied with auxiliary power and is operative to communicate with the main computer regardless of whether the at least one computer system is in a normal operating state. The main computer includes a program for detecting when the at least one computer system has been disconnected from the data transmission network. The program sends a first packet to the at least one computer system via the network. The at least one computer system is operative to receive the first packet and respond by sending a second packet to the main computer. The second packet includes data which specifically identifies the at least one computer system.
摘要:
Disclosed is a computer system which can be powered on by at least a first and a second method wherein the first method is different from the second method. The computer system is operative to allow a user to select which one of at least two different pre-selected ordered lists of initial program load (IPL) devices are to be used depending on whether the system was powered on by the first method or the second method. The system includes a processor coupled to a local bus and an input/output (IO) bus. A non-volatile memory is coupled to the processor and the IO bus. The non-volatile memory has a basic input output system (BIOS) stored therein and the BIOS is effective for responding to the energization of the computer system by initiating a power on self test (POST). The non-volatile memory also stores a first pre-selected ordered list of IPL devices and a second pre-selected ordered list of IPL devices. The POST is operative to determine whether the system was powered on by the first power on method or the second power on method. If the first power on method was used, POST will attempt to boot from the first pre-selected ordered list of IPL devices and if the second power on method was used, POST will attempt to boot from the second pre-selected ordered list of IPL devices.
摘要:
Described is a computer system which is operable to allow configuration to occur on the system unit without removing the system unit from its packaging. The computer system is coupled to a remote computer via a data communication link. The system is operative to detect whether it is in a configuration mode when a power source and a network connection are made through the packaging. If the configuration mode is detected by the system, the system powers on and places itself in the configuration mode to allow (1) the remote computer to transfer signals to the system via the communication link to set up data transfers to the memory of the system, and (2) the remote computer to transfer data to the memory of the system for storage therein, whereby the system is configured at least in part in its packaging.
摘要:
An arrangement which eliminates the need to remove a computer system from its packaging in order to initiate a re-imaging process. Particularly, there is broadly contemplated herein the use of a position-sensitive switching arrangement, such as a mercury switch, that is configured to power selected control circuitry in a computer so as to receive additional information or data as needed to update imaging or other aspects of a computer's operating system.
摘要:
A method and system for managing a secure configuration of a server blade on a network. The server blade has a Remote Supervisor Adapter (RSA) card, which contains a list of trusted Dynamic Host Configuration Protocol (DHCP) servers. A remote manager, which communicates with the RSA card via a hyper-secure network, maintains the list of trusted DHCP servers on the RSA card. When the server blade broadcasts a request for configuration parameters to join the network, a response offer is returned from a DHCP server. If the responding DHCP server is not on the list of trusted DHCP servers contained in the RSA card, then the offer is refused, and another DHCP server's offer is evaluated.
摘要:
A method and system for managing a download of software from an application server to a client computer depending on a physical location of the client computer. The client computer transmits a real-time Global Position System (GPS) coordinate to the application server. This location is then compared to a list of authorized location ranges associated with the requested application. If the client computer is located within an authorized location range, the application server then downloads the application to the client computer. If the client computer is not within an authorized area, then the application is not allowed be downloaded.
摘要:
A method and system for managing a secure network boot of a server blade. The server blade is part of a server blade chassis, which holds multiple server blades that communicate with outside devices via a Pre-boot eXecution Environment (PXE) enabled network interface card. When a server blade receives a response from a PXE boot server offering a boot program download, a Remote Supervisory Adapter (RSA) card, managed by a remote manager, compares the identity of the responding PXE boot server with a list of trusted PXE boot servers. Only if the responding PXE boot server is on the list of trusted PXE boot servers will the server blade be allowed to use a boot program provided by the responding PXE boot server.
摘要:
A data processing system and method are described for booting a computer system from a virtual floppy diskette. A native operating system is executed by the computer system which utilizes a native file system. A boot able floppy diskette image is stored on the hard drive. The image includes a second operating system which utilizes a second file system. A master boot record stored on the hard drive is modified to include a boot bit. The boot bit is set in response to a storage of the image. The computer system is then booted from the image in response to the boot bit being set. The native operating system and the native file system are unchanged during the booting of the computer system from the image.
摘要:
Embodiments of the invention address deficiencies of the art in respect to load balancing for servers having multiple blades and provide a novel and non-obvious method, system and computer program product for load balancing at the blade level for servers having multiple blades. In one embodiment of the present invention, a blade server for performing load balancing may comprise a plurality of blades, each blade coupled with a plurality of outgoing ports. The blade server may further include a blade management module configured for monitoring throughput performance of the server and the plurality of blades, wherein each blade is coupled with a plurality of outgoing ports, instructing a blade to switch from a first outgoing port to a second outgoing port when throughput performance decreases and instructing the blade to switch from the second outgoing port back to the first outgoing port when throughput performance increases.