摘要:
Corrupted configuration data stored in a first memory for a device may be restored using backup configuration data stored in a second memory. In one embodiment, the second memory may be carried by the device itself. In another embodiment, the second memory may be carried on a motherboard and may store backup configuration data for more than one device. Other embodiments are described and claimed.
摘要:
Disclosed are exemplary embodiments for updating a networked machine having at least a dormant state and an active state. In various embodiments, when the machine it is a dormant state, it listens to a network for candidate updates, that is, updates that may be applicable to the machine. In some embodiments, determining the candidate update is an applicable update for the machine may be based at least in part on a variety of reasons, including testing if it has already been applied, does not actually update some aspect of the machine, conflicts with an existing configuration of the machine, conflicts with a policy of the machine, etc. The machine may cache some or all of the candidate updates or applicable updates, where a variety of rationales or policies may be used to control update retention. When the machine enters an active state, such as a power on or non-sleep mode, or other active state, the machine may validate integrity of an applicable update if not done while the machine was dormant, and optionally choose to install it.
摘要:
Techniques are described that can be used to identify a defective communication channel in a communications network. A decoder in a receiver may decode a signal received from a network. The decoded signal may be re-encoded and compared with the signal received from the network. A count of differences between the re-encoded signal and the signal received from a network may be provided. An indication of errors remaining after the decoding may also be provided. Based on the count and the indication, a defect in the communication channel may be identified. A user may be notified and/or actions may take place.
摘要:
A method for preventing counterfeit of a hardware device is disclosed. The method comprises determining whether a first indicator for a hardware device is set, wherein the first indicator when set indicates that the device is not a counterfeit device, and if the first indicator is not set, then activating a counter, setting a second indicator when the counter expires, and operating the hardware device in a counterfeit mode when the second indicator is set, wherein the counterfeit mode identifies the hardware device as a counterfeit device. Other embodiments are also disclosed.
摘要:
In some embodiments, a platform has an active and a dormant state. The platform includes a primary network interface and a mass storage, a management agent having a secondary network interface to receive a software update at least during the dormant state and further having a non-volatile memory to cache the software update; a memory subsystem to contain an updating software agent; a processor, coupled to the memory subsystem, the mass storage, the non-volatile memory and the primary network interface. The processor executes the updating software agent so as to install the software update after the platform transitions from the dormant state to the active state and before the primary network interface is communicatively enabled.
摘要:
Techniques are described that can be used to identify a defective communication channel in a communications network. A decoder in a receiver may decode a signal received from a network. The decoded signal may be re-encoded and compared with the signal received from the network. A count of differences between the re-encoded signal and the signal received from a network may be provided. An indication of errors remaining after the decoding may also be provided. Based on the count and the indication, a defect in the communication channel may be identified. A user may be notified and/or actions may take place.
摘要:
In one embodiment, an apparatus includes a network controller to communicate with a network. The apparatus may also include a storage device that is coupled to the network controller to store a cryptographically signed unique network identifier.
摘要:
Provided is a method and system for managing data processing rates at a network adapter using a temperature sensor. A temperature of a component in the adapter transmitting data over a network is measured. A rate at which data is processed in the adapter over the network is reduced in response to determining that the measured temperature exceeds a threshold.
摘要:
Provided are a method, system, and article of manufacture, wherein in certain embodiments, an indicator is searched for in a computational platform, and wherein the indicator indicates an operational state of a device coupled to the computational platform. A determination is made that the indicator has been modified to disable the device. The indicator is modified to allow enablement of the disabled device. The device is tested to determine whether the device is capable of operating correctly.
摘要:
Provided are a method, apparatus, system, and article of manufacture, wherein in certain embodiments a network adapter having an offload protocol stack receives a query. The offload protocol stack of the network adapter is configured to provide a programmable identity for the offload protocol stack of the network adapter. A response is generated to the query by processing the query in the configured offload protocol stack, wherein the response is based on the programmable identity. The generated response is sent by the network adapter.