摘要:
A device access control system includes a first computing system that is coupled to a second computing system via a network, and that includes a device access controller subsystem coupled to devices, a central processing subsystem, and a device access control manager subsystem. The device access control manager subsystem identifies first application(s) configured for provisioning by the central processing subsystem and second application(s) configured for provisioning by the second computing system, configures the device access controller subsystem to provide the central processing subsystem access to a first subset of the devices to allow the central processing subsystem to provide the first application(s), and configures the device access controller subsystem to provide the second computing system access via the device access control manager subsystem to a second subset of the devices to allow the second computing device to provide the second application(s) using the second subset of the devices.
摘要:
A workload compliance governor system includes a management system coupled to a computing system. A workload compliance governor subsystem in the computing system receives a workload performance request associated with a workload, exchanges hardware compose communications with the management system to compose hardware components for the workload, and receives back an identification of hardware components. The workload compliance governor subsystem then determines that the identified hardware components satisfy hardware compliance requirements for the workload, and configures the identified hardware components in the computing system based on the software compliance requirements for the workload in order to cause those identified hardware components to provide an operating system and at least one application that operate to perform the workload.
摘要:
A clustered memory system includes a first computing system coupled to a second computing system via a network, and including a clustered memory management subsystem coupled to a central processing subsystem and a networking device. The clustered memory management subsystem receives a processor memory-centric access request associated with a memory access operation from the central processing subsystem, and uses memory management hardware to determine that the processor memory-centric access request is directed to a second memory subsystem in the second computing system. The clustered memory management subsystem then uses remote memory access hardware to generate memory access information for performing the memory access operation at the second memory subsystem, and instructs the networking device to utilize the memory access information to transmit at least one memory access communication that provides for the performance of the memory access operation at the second memory subsystem.
摘要:
A distributed secure communication system includes a first System Control Processor (SCP) subsystem coupled to second and third SCP subsystems via a network. The first SCP subsystem identifies the second SCP subsystem, signs a first SCP authentication communication with a first private key to provide a first signed SCP authentication communication that it transmits to the second SCP subsystem. The first SCP subsystem receives a second signed SCP authentication communication from the second SCP subsystem, authenticates the second signed SCP authentication communication using a second public key associated with the second SCP subsystem and, in response, establishes a first secure communication channel with the second SCP subsystem. The first SCP subsystem then receives an attestation of an authentication of the third SCP subsystem from the second SCP subsystem and, in response, establishes a second secure communication channel with the third SCP subsystem without the transmission of signed SCP authentication communications.
摘要:
A reflective memory system includes network-connected computing systems including respective memory subsystems. A reflective memory management subsystem in a first computing system receives a processor memory-centric reflective write request associated with a local reflective memory write operation and remote reflective memory write operations, performs the local reflective memory write operation to write data to a memory subsystem in the first computing system, and uses remote memory access hardware to generate remote memory write information for performing the remote reflective memory write operations to write the data at respective second memory subsystems in second computing systems. The reflective memory management subsystem then instructs a networking device in the first computing system to utilize the remote memory write information to transmit first memory access communications that provide for the performance of the remote reflective memory write operations to write the data at the second memory subsystem in each second computing system.
摘要:
In accordance with the present disclosure, a battery back-up unit (BBU) element for providing uninterruptable direct current (DC) power in a rack-level power infrastructure is describe. The BBU element may include a rack-mountable chassis with a battery drawer. A battery may be disposed within the battery drawer, and at least one power module may be coupled to the battery. The BBU element may also include a power module controller that causes the battery to charge from or discharge to a busbar coupled to the BBU element. The power module controller may also communicate power management information to a power infrastructure controller.
摘要:
A communication system personality provisioning system includes a communication system included in a computing system and coupled to a management system. The communication system stores authentication information in a UEFI database of a UEFI system in the communication system. The communication system receives a first operating software image and application/service from the management system, authenticates the first operating software image and application/service via first secure initialization operations performed by the UEFI system using the authentication information and, in response, installs the first operating software image and application/service on the communication system. The communication system subsequently receives a second operating software image and application/service from the management system, authenticates the second operating software image and application/service via second secure initialization operations performed by the UEFI system using the authentication information and, in response, installs the second operating software image and application/service on the communication system.
摘要:
A graph-based data multi-operation system includes a data multi-operation management subsystem coupled to an application and accelerator subsystems. The data multi-operation management subsystem receives a data multi-operation graph from the application that identifies first data and defines operations for performance on the first data to transform the first data into second data. The data multi-operation management subsystem assigns each of the operations to at least one of the accelerator systems, and configures the accelerator subsystems to perform the operations in a sequence that transforms the first data into the second data, When the data multi-operation management subsystem determine a completion status for the performance of the operations by the accelerator subsystems, it transmits a completion status communication to the application that indicates the completion status of the performance of the plurality of operations by the plurality of accelerator subsystems.
摘要:
A coordinated initialization system includes a computing system with first and second initialization subsystems coupled to a coordinated initialization subsystem. The coordinated initialization subsystem receives first and second initialization progress information associated with respective first and second initialization subsystem operations performed by the respective first and second initialization subsystems. Using a coordinated initialization database that identifies dependences between the first and second initialization operations, the coordinated initialization subsystem determines that the first initialization progress information identifies a first initialization operation that is going to be performed by the first initialization subsystem and that is dependent on a second initialization operation that is identified by the second initialization progress information and that has not yet been performed by the second initialization subsystem and, in response, causes the first initialization subsystem to pause the first initialization subsystem operations until the second initialization operation has been performed.
摘要:
A live migration/high availability system includes a first computing system having a first SCP subsystem coupled to first computing system components and a first hypervisor subsystem that provides a first virtual machine. Each time the first SCP subsystem receives snapshot commands from the hypervisor subsystem, it retrieves respective SCP component state information that was not retrieved in response to a previous snapshot command from each first SCP component included in the first SCP subsystem, and uses the respective SCP component state information to generate a respective SCP subsystem snapshot based on that snapshot command. The first SCP subsystem then transmits the SCP subsystem snapshots to a second SCP subsystem in a second computing system, and the second SCP subsystem uses the SCP subsystem snapshots to allow a second hypervisor subsystem on the second computing system to provide a second virtual machine that operates the same as the first virtual machine.