摘要:
A data processing system and method are described for permitting a server computer system coupled to a client computer system utilizing a network to remotely modify operation of the client computer system's network hardware. A counter is established within the client computer system for counting a plurality of network events. A counter threshold is established. Upon the counter reaching the counter threshold, the client computer system's network hardware transmits a message to the server computer system including network statistics information. The network statistics information includes an indication of the counter reaching the counter threshold. In response to a receipt of the message, the server computer system determines whether to modify the operation of the client's network hardware. In response to a determination to modify operation of the network hardware, the server remotely modifies operation of the client's network hardware.
摘要:
A data processing system and method are described for permitting a server computer system to perform remote diagnostics on a malfunctioning client computer system coupled to the server computer system utilizing a network. The server computer system transmits a diagnostic command to the malfunctioning client computer system utilizing the network. A network adapter operating as a bus controller for an internal bus within the malfunctioning client computer system executes the diagnostic command. The network adapter transmits a result of the execution of the diagnostic command to the server computer system. In this manner, the diagnostic command is executed within a malfunctioning client computer system by a remote, server computer system.
摘要:
A data processing system and method are described for permitting a server computer system to remotely initiate a boot block recovery from a failure of a client computer system to successfully complete execution of POST. The client computer system is coupled to a server computer system utilizing a network. The client computer system fails to successfully complete executing POST. Thereafter, the server computer system transmits a recovery POST code to the client computer system utilizing the network. The client computer system executes POST utilizing the recovery POST code, wherein the client computer system is capable of successfully completing execution of POST utilizing the recovery POST code received remotely from the server computer system.
摘要:
A data processing system and method including a docking station and a portable computer capable of being coupled to the docking station are disclosed for securing the docking station, the portable computer, and for securing the attachment of the docking station to the portable computer. The portable computer is coupled to the docking station. A disconnection password is established. When the portable computer is disconnected from the docking station, a user is prompted for the disconnection password. The portable computer is disabled in response to a failure to correctly enter the disconnection password, wherein the portable computer is inoperable without a correct entry of the disconnection password. When a portable computer is connected to the docking station, a correct entry of a connection password is required. In response to a failure to correctly enter the connection password, access to the docking station is prohibited. When the docking station is physically removed from its stationary support, correct entry of a relocation password is required. In response to a failure to correctly enter the password, access to the docking station is prohibited.
摘要:
A data processing system and method are described for remotely controlling execution of a processor utilizing the processor's built-in test access port for debugging the execution of the processor. The client computer system is coupled to a server computer system utilizing a network. The server computer system transmits a signal to said client computer system to control execution of the processor utilizing the test access port. The signal identifies one of a plurality of processor actions. In response to a receipt of the signal, the processor executes the one of the plurality of processor actions such that the server computer system remotely debugs the execution of the processor utilizing the built-in test access port, wherein additional debug hardware is not utilized.
摘要:
An intelligent network interface monitors activity states of a client and reports them to a network manager using a single network connection. The network interface monitors interrupts occurring on the client, derives activity states from the interrupts, and logs the activity states on the network interface. An activity state specifies whether the client is in a hung state, but may also specify whether the client is off, sleeping, inactive, or active. The network interface may periodically report the activity states to the network manager or report upon receiving a command. The network interface is preferably powered full time using a trickle power supply and therefore operates even when the remainder of the client is off. By including a processor or specialized logic on the network interface, the interface operates independently of the client operating system and therefore monitors and reports even when the client malfunctions.
摘要:
A data processing system and method are disclosed for disabling a portable computer in response to the portable computer being moved outside of an authorized area of use. An authorized, geographical area of use is established. The authorized, geographical area is any geographical area capable of being defined. The geographical area is not limited to areas within an enclosure, and is not bounded by a transmitter's broadcast range. A determination is made regarding whether the portable computer is located outside of the authorized area. If the portable computer is moved outside of the authorized area, the portable computer is disabled. The portable computer is inoperable when disabled.
摘要:
A data processing system and method including a server computer system coupled to a client computer system utilizing a network are described for causing an initially powered-off client computer system to power-on only in response to a receipt of an authenticated wake network packet. The client computer system is capable of receiving a wake network packet while the client is powered-off. The client computer system determines if the received wake network packet is a valid wake network packet while the client is powered-off. The client computer system powers-on only in response to a determination that the wake network packet is a valid wake network packet. The client computer system powers-on only in response to authenticated wake network packets.
摘要:
A data processing system and method are described for permitting a portable computer to automatically detect the presence of a printer within a remote area, and responsive to the detection, automatically establishing a communications link with the printer. The portable computer is physically disconnected from the printer. The portable computer transmits a wireless query signal to the remote area. In response to a printer physically located within the remote area receiving the wireless query signal, the printer transmits a wireless reply signal to the remote area. In response to the portable computer receiving the wireless reply signal, the computer automatically establishes a communications link with the printer so that the computer may utilize the printer to print information. The communications link may be established with a printer for which the computer does not include a printer driver necessary for communicating with the printer.
摘要:
A data processing system and method are disclosed for authenticating a client computer system to a secure network prior to permitting the client computer system to attempt to log-on to the network. The secure network is controlled by a server computer system. A unique identifier is established which identifies the client computer system. The unique identifier is encrypted. Prior to permitting the client computer system to attempt to log-on to the secure network, the client computer system transmits the encrypted identifier to the server computer system. Also prior to permitting the client computer system to attempt to log-on to the network, the server computer system utilizes the unique identifier to determine whether to permit the client computer system to attempt to log-on to the network. The client computer system is authenticated prior to permitting the client computer system to attempt to log-on to the network.