摘要:
A basic input/output system may be stored on two different memories coupled to active management technology firmware and a trusted platform module. The trusted platform module ensures that access to the correct memory. One of the memories is selected to store an update of the basic input/output system.
摘要:
In some embodiments, the invention involves a system and method relating to secure booting of a platform. In at least one embodiment, the present invention is intended to securely boot a platform using one or more signature keys stored in a secure location on the platform, where access to the signature is by a microcontroller on the platform and the host processor has no direct access to alter the signature key. Other embodiments are described and claimed.
摘要:
A basic input/output system may be stored on two different memories coupled to active management technology firmware and a trusted platform module. The trusted platform module ensures that access to the correct memory. One of the memories is selected to store an update of the basic input/output system.
摘要:
In some embodiments, the invention involves a system and method relating to secure booting of a platform. In at least one embodiment, the present invention is intended to securely boot a platform using one or more signature keys stored in a secure location on the platform, where access to the signature is by a microcontroller on the platform and the host processor has no direct access to alter the signature key. Other embodiments are described and claimed.
摘要:
A method and system for migrating a computer environment, such as a virtual machine, from a first blade server to a second blade server includes storing data generated by the first and second blade servers on a shared hard drive and transferring a logic unit number from the first blade server to the second blade server. The logic unit number identifies a location of the shared hard drive used by the first blade server to store data. Additionally, the state of the central processing unit of the first blade server may be transferred to the second blade server.
摘要:
A device and method for provided access to distributed data sources includes a cloud security server configured to associate any number of data sources and client devices with a cloud security server account. The cloud security server assigns trust levels to the data sources and the client devices. A client device requests data from the cloud security server. The cloud security server authenticates the client device and verifies the trust levels of the client device and the requested data. If verified, the cloud security server brokers a connection between the client device and the data source, and the client device accesses the requested data. Data sources may include cloud service providers and local storage devices. The cloud security server may assign a trust level to a client device for a limited time or revoke a trust level assigned to a client device. Other embodiments are described and claimed.
摘要:
A method for storing from a temporal sequence of a plurality of individual cardiac events cardiac rhythm information comprised of at least one determined type, in particular a sequence of time intervals between ventricular and/or atrial events, whereby a time interval continuum of the temporal distances between the events is subdivided into time portions of a predetermined length, which are each allocated a single-valuedd marker, in particular a number, each time interval detected with a detection of the cardiac rhythm as one recording is provided with the marker of the time portion into which it falls, the number of the recordings out of a predetermined total number of detected time intervals or belonging to each marker during a predetermined period of time, is assessed, and the markers which have been allocated from a predetermined number of time intervals or during a predetermined period of time at least one recording, each are stored along with the number of recordings.
摘要:
Systems and methods may provide for extracting location data from a plurality of news items, wherein at least a portion of the location data has a first level of detail that is greater than or equal to a neighborhood, and using the location data to populate a news data store. Additionally, a response to a news query may be generated based on a requested location associated with the news query and the location data in the news data store, wherein the requested location has a second level of detail that is greater than or equal to the first level of detail and the response indicates one or more news items that correspond to the requested location. In one example, a graphical representation of the response is overlaid on one or more of a map corresponding to the requested location or an image of the requested location.
摘要:
Embodiments of systems and methods for geo-location of a computing resource are generally described herein. In some embodiments, a first computing device determines a geographical location of the first device. The first device accesses an identifier of a second computing device and associates the location with the second device. The first device transmits a notification of the location being associated with the second device to the second device. In response to receiving the notification, the second device periodically transmits a message to the first device. The second device may detect a disconnection of a wired connection coupling the second device with an external system. In response to the detection, the second device ceases the periodic transmission of the message. The first device dissociates the location from the second device based on an elapsed time period since reception of a most recent one of the messages exceeding a predetermined time period.
摘要:
Embodiments of computer-implemented methods, systems, computing devices, and computer-readable media are described herein for tethering of mobile wireless devices. In some embodiments, a computing device configured for tethering may include a processor and a tethering application operated by the processor to associate a first mobile wireless device with a community of mobile wireless devices eligible for tethering to the first mobile device based on eligibility criteria; identify, among the community of mobile devices, a second mobile wireless device to tether with the first mobile device, based on communication information exchange among the mobile wireless devices in the community, including the first mobile device; and based on a result of the identifying, cause the first mobile device to tether to the second mobile device, so as to enable the first mobile device to connect to a wireless communication network via the second mobile device. Other embodiments may be described and claimed.