摘要:
A method and system for remotely isolating faults in computer network devices coupled to a computer network. A plurality of first computer units are coupled to the computer network. The plurality of first computer units are located on a user side of the computer network. A plurality of second computer units are coupled to the computer network. The plurality of second computer units are located on a service provider side of the network. One of the plurality of second computer units is designated to provide computing services to one of the plurality of first computer units. One of the plurality of first computer units experiencing a fault communicating with its designated second computer unit uses another of the plurality of first computer units as a proxy computer unit to remotely isolate the fault.
摘要:
A method, computer program product and system for reducing the boot time of a client device in a client device/data center environment. A profile of the client device, which includes information regarding the usage characteristics of the client device, may be created. A confidence level indicating the likelihood that the client device is going to be booted may be determined based on the client device's profile. The confidence level and the utilization of the resources of the server blades in the data center may be examined in determining whether to have an appropriate server blade perform an action involved in booting the operating system of the client device. If the appropriate server blade performs such an action, e.g., pre-booting the client device's operating system, prior to the user of the client device attempting to boot its operating system, then the boot time may be reduced.
摘要:
A system and method for installing a type-1 hypervisor onto a secondary storage of a computer while a user operating system is already installed and executing in main memory.
摘要:
A “setmax” command is issued in BIOS to hide the service area (HPA) of a HDD during normal operation, so that the HPA cannot be accessed or erased inadvertently by the user or by a virus. Pressing a special key (e.g., F11) during booting permits access to the HPA.
摘要:
Various methods are disclosed for ensuring compliance with operating system license requirements in a server blade center environment in which a server blade may have plural images of an O.S., one for each of plural thin clients serviced by the blade.
摘要:
A method, computer program product and system for enabling a client device in a client device/data center environment to resume from sleep state more quickly. The resource in the server blade used for suspending the activity of the computing state of the client device in order to enter the client device in a sleep state is not reallocated for a period of time. If the client device indicates to the server blade to resume the client device from sleep state prior to the ending of that period of time, then the server blade reinitializes the computing state using the same resource as used in suspending the computing state of the client device. By using the same resource, steps traditionally implemented in resuming the client device from sleep state are avoided thereby reducing the time in resuming the client device from sleep state.
摘要:
The boot-time required for a log-on to a desktop blade system is improved, and a more streamlined process for performing maintenance operations, such as software updates, across an enterprise desktop blade system is facilitated. All activities being performed by a user are cached, in an off-blade storage location, on an ongoing basis. The caching is performed using “divided caching”, that is, different elements of the user image are stored in different locations. The specific divisions utilized are based upon classifications of the information to be cached, e.g., a first class of information used by all users of the system; a second class of information utilized by a certain class of users; a third class of information utilized only by a particular individual, etc.
摘要:
An apparatus, system, and method are disclosed for reassigning a client. A selection module selects a second computation module that is hardware compatible with a first computation module. A suspension module suspends a software process for a client executing on the first computation module. An execution state module copies a computation module execution state of the first computation module to the second computation module. A memory map module copies a memory map of a software process image associated with the software process and stored in a first storage system from the first computation module to the second computation module. In one embodiment, a resumption module resumes the software process executing on the second computation module.
摘要:
A method and system are disclosed in which a management module (MM) designates an idle blade in a client blade farm to be an “administrative blade” that has administrator access to the virtual images of all users. The MM identifies when a particular user image is, or is not, in use and conveys this information to the administrative blade. The administrative blade performs virus scans, backups, defrags, patch installs, software upgrades, and other such maintenance functions on user images when they are inactive, thereby eliminating the performance impact to active users.
摘要:
Hacking a rental computer to use it beyond purchased rental time is prevented by plugging a time card with internal counter into a DIMM socket of the motherboard and encrypting the register locations of the time card with the private key of the motherboard to bind the time card to the motherboard. Thus, if the time card is not detected at boot or if it is removed during operation the computer is disabled. The counter counts down the rented time period as it receives clocking signals, and at the elapse of the purchased period disables the computer.