摘要:
A method for preventing counterfeit of a hardware device is disclosed. The method comprises determining whether a first indicator for a hardware device is set, wherein the first indicator when set indicates that the device is not a counterfeit device, and if the first indicator is not set, then activating a counter, setting a second indicator when the counter expires, and operating the hardware device in a counterfeit mode when the second indicator is set, wherein the counterfeit mode identifies the hardware device as a counterfeit device. Other embodiments are also disclosed.
摘要:
A system and method for initialization of a computer system is described. Faster initialization of a computer system is possible by allowing certain device driver initialization tasks to overlap with other initialization and operating system tasks. option-ROMs resident on hardware device drivers define the initialization tasks to be performed prior to device driver initialization. Initial computer code for booting the computing device, such as a BIOS, is executed. As option-ROMs for hardware devices are scanned and executed, specific device initialization information is accessed from the devices and placed in pre-defined buffer areas. These accesses occur in parallel to other start up tasks. When device drivers are loaded, some of their initialization has already completed, thereby shortening the time necessary to boot the system.
摘要:
A directed audio system, a network interface communicatively coupled with a network, and a controller to receive, via the network interface, an estimate for a location from a locating device communicatively coupled with the network, and to cause the directed audio system to direct an audio signal based at least in part on an estimate for the location received from the locating device.
摘要:
Disclosed are exemplary embodiments for updating a networked machine having at least a dormant state and an active state. In various embodiments, when the machine it is a dormant state, it listens to a network for candidate updates, that is, updates that may be applicable to the machine. In some embodiments, determining the candidate update is an applicable update for the machine may be based at least in part on a variety of reasons, including testing if it has already been applied, does not actually update some aspect of the machine, conflicts with an existing configuration of the machine, conflicts with a policy of the machine, etc. The machine may cache some or all of the candidate updates or applicable updates, where a variety of rationales or policies may be used to control update retention. When the machine enters an active state, such as a power on or non-sleep mode, or other active state, the machine may validate integrity of an applicable update if not done while the machine was dormant, and optionally choose to install it.
摘要:
Disclosed are exemplary embodiments for updating a networked machine having at least a dormant state and an active state. In various embodiments, when the machine it is a dormant state, it listens to a network for candidate updates, that is, updates that may be applicable to the machine. In some embodiments, determining the candidate update is an applicable update for the machine may be based at least in part on a variety of reasons, including testing if it has already been applied, does not actually update some aspect of the machine, conflicts with an existing configuration of the machine, conflicts with a policy of the machine, etc. The machine may cache some or all of the candidate updates or applicable updates, where a variety of rationales or policies may be used to control update retention. When the machine enters an active state, such as a power on or non-sleep mode, or other active state, the machine may validate integrity of an applicable update if not done while the machine was dormant, and optionally choose to install it.
摘要:
Corrupted configuration data stored in a first memory for a device may be restored using backup configuration data stored in a second memory. In one embodiment, the second memory may be carried by the device itself. In another embodiment, the second memory may be carried on a motherboard and may store backup configuration data for more than one device. Other embodiments are described and claimed.
摘要:
Disclosed are exemplary embodiments for updating a networked machine having at least a dormant state and an active state. In various embodiments, when the machine it is a dormant state, it listens to a network for candidate updates, that is, updates that may be applicable to the machine. In some embodiments, determining the candidate update is an applicable update for the machine may be based at least in part on a variety of reasons, including testing if it has already been applied, does not actually update some aspect of the machine, conflicts with an existing configuration of the machine, conflicts with a policy of the machine, etc. The machine may cache some or all of the candidate updates or applicable updates, where a variety of rationales or policies may be used to control update retention. When the machine enters an active state, such as a power on or non-sleep mode, or other active state, the machine may validate integrity of an applicable update if not done while the machine was dormant, and optionally choose to install it.
摘要:
Provided are a method, apparatus, system, and article of manufacture, wherein in certain embodiments a network adapter having an offload protocol stack receives a query. The offload protocol stack of the network adapter is configured to provide a programmable identity for the offload protocol stack of the network adapter. A response is generated to the query by processing the query in the configured offload protocol stack, wherein the response is based on the programmable identity. The generated response is sent by the network adapter.
摘要:
Provided are a method, system, and article of manufacture, wherein in certain embodiments, an indicator is searched for in a computational platform, and wherein the indicator indicates an operational state of a device coupled to the computational platform. A determination is made that the indicator has been modified to disable the device. The indicator is modified to allow enablement of the disabled device. The device is tested to determine whether the device is capable of operating correctly.
摘要:
Provided are a method, apparatus, system, and article of manufacture for interfacing a device to a host, wherein in certain embodiments a device interface in the device receives a request generated by a device driver in the host. The device interface processes the request, wherein a plurality of device interfaces corresponding to a plurality of devices are capable of processing the request. An operation associated with the device is executed, by the device interface, in response to processing the request.