摘要:
A portable information handling system (IHS) is disclosed wherein the system includes a cover, a primary display disposed on the cover and an auxiliary display coupled to the cover, wherein the auxiliary display is movable between a viewable position and a closed position. The system also includes a switch coupled to the auxiliary display, wherein the switch is adapted to place the auxiliary display in an operational state in the open position and in a non-operational state in the closed position.
摘要:
A portable information handling system (IHS) is disclosed wherein the system includes a cover, a primary display disposed on the cover and an auxiliary display coupled to the cover, wherein the auxiliary display is movable between a viewable position and a closed position. The system also includes a switch coupled to the auxiliary display, wherein the switch is adapted to place the auxiliary display in an operational state in the open position and in a non-operational state in the closed position.
摘要:
A client hosted virtualization system (CHVS) has a non-volatile memory that includes BIOS code and virtualization manager code that operates to initialize the CHVS and to launch a virtual machine. The CHVS establishes a secure communication channel with a client update system via a network interface, receives an update to the virtualization manager code, authenticates the update and overwrites the non-volatile memory with the update. The CHVS is configurable to execute the BIOS and not virtualization manager, or to execute the virtualization manager and not the BIOS.
摘要:
A client hosted virtualization system (CHVS) includes a processor and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the CHVS, authenticates a virtual machine image and launches the virtual machine based on the image. The CHVS is configurable to execute the BIOS or the virtualization manager. A client system update network includes a client update system and a CHVS with a processor, a security processor, and non-volatile memory with BIOS code and virtualization manager code that initializes the CHVS, authenticates a virtual machine image and launches a virtual machine based on the image. The CHVS is configurable to execute the BIOS or the virtualization manager. The client update system receives updates and sends them to the CHVS. The CHVS authenticates the updates with the security processor, and overwrites the non-volatile memory with the updates.
摘要:
A system for point of sale personalization of an information handling system (IHS), includes one or more subsystems to allow a customer to access a server to select a model of IHS, allow the customer to choose an operating system for the IHS, allow the customer to choose hardware for the IHS, simulate the IHS to the customer including the operating system and the hardware, receive personalization data from the customer, store the personalization data, assemble the IHS, including the hardware and installing the operating system, and download the personalization data to the IHS.
摘要:
A system for point of sale personalization of an information handling system (IHS), includes one or more subsystems to allow a customer to access a server to select a model of IHS, allow the customer to choose an operating system for the IHS, allow the customer to choose hardware for the IHS, simulate the IHS to the customer including the operating system and the hardware, receive personalization data from the customer, store the personalization data, assemble the IHS, including the hardware and installing the operating system, and download the personalization data to the IHS.
摘要:
A client hosted virtualization system (CHVS) includes a processor to execute code, a security processor, a component that includes a certificate, and a non-volatile memory. The non-volatile memory includes BIOS code for the CHVS and virtualization manager code to initialize the CHVS, launch a virtual machine on the CHVS, and authenticate the component with the security processor by determining that the certificate is valid. The CHVS is configurable to execute the first code and not the second code, or to execute the second code and not the first code.
摘要:
Systems and methods for managing booting of an information handling system are disclosed. A method for managing the booting of an information handling system may include receiving user input for booting an information handling system to a first partition or a second partition. The user input may be used to determine whether the received user input is for booting to the first partition or to the second partition. In response to determining that the received user input is for booting to the second partition, a determination may be made whether the information handling system is authorized to boot to the second partition. In response to determining that the information handling system is authorized to boot to the second partition, the information handling system may be booted to the second partition. In response to determining that the information handling system is not authorized to boot to the second partition, the information handling system may be booted to the first partition.
摘要:
A client hosted virtualization system includes a processor and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system, authenticates a virtual machine image, launches the virtual machine based on the image, and implements a policy manager. The policy manager determines a policy for the virtual machine, receives a request to access a device from the virtual machine, determines if the virtual machine is permitted to access the device based upon the policy, and if so, permits the virtual machine to access the device. If not, the policy manager denies the virtual machine access to the device. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager.
摘要:
A method for providing a user with feedback of firewall activity. The method includes determining when access to an application is attempted, blocking access of the application to the Internet based upon a blocked application list, and providing feedback to the user when access to an application is blocked by the firewall every time access to the application is blocked.