摘要:
An improved system and method for using a file system to automatically backup a file in persistent storage is provided. A storage aggregator may organize nonvolatile memory for use in aggregate to store backup copies of a file. A file system filter driver may receive a request from an application for storing a file and may access a policy to determining whether to create a backup copy of the file and what type of backup to apply to the file. A generational file handler may create and manage a set of generational files as backup copies of a particular application file. And a recovery user interface may be provided to retrieve one or more backup copies, such as the set of generational files, for inspection by a user to recover whatever copy of the file may be desired by the user.
摘要:
A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.
摘要:
A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.
摘要:
A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.
摘要:
A computing system that incorporates an auxiliary processor to the main system processor. The auxiliary system utilizes a separate application runtime for processes and is capable of operating even when the primary system is in an off state. Methods for load-balancing are provided based on computing needs respective to power consumption requirements. Processes that are not computationally intensive are processed by a low-power, auxiliary processor. In addition, peripheral components accessible to the overall computing system are shared.
摘要:
A computing system that incorporates an auxiliary processor to the main system processor. The auxiliary system utilizes a separate application runtime for processes and is capable of operating even when the primary system is in an off state. Methods for load-balancing are provided based on computing needs respective to power consumption requirements. Processes that are not computationally intensive are processed by a low-power, auxiliary processor. In addition, peripheral components accessible to the overall computing system are shared.
摘要:
A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an explicit message to encrypt selected data on the electronic device. In addition, the electronic device may enter a limited function mode that only allows display of simplistic messages and supports network traffic with a recovery service. The recovery service may be able to use the network traffic to locate the electronic device. The security module may include a secure memory, a cryptographic function, a timer, and support for direct display of data on a monitor.
摘要:
Techniques are described which provide an independent computation environment. The independent computation environment is contained at least in part in a set of one or more hardware components and configured to host a provisioning module that is executable to provision functionality of the computing device according to a wide variety of factors. In an implementation, when the provisioning module determines that particular functionality is referenced in an inclusion list, the computing device is permitted to access the particular functionality. When the provisioning module determines that the particular functionality is referenced in an exclusion list, the computing device is prevented from accessing the particular functionality.
摘要:
A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an explicit message to encrypt selected data on the electronic device. In addition, the electronic device may enter a limited function mode that only allows display of simplistic messages and supports network traffic with a recovery service. The recovery service may be able to use the network traffic to locate the electronic device. The security module may include a secure memory, a cryptographic function, a timer, and support for direct display of data on a monitor.
摘要:
A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring 0, at the same level as the virtual machine monitor.