摘要:
A system and method that restores a computer system is provided. An image is created of a primary drive that includes an operating system and one or more applications. A copy of the image is stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. Patches are received for the operating system and the applications and applied to the corresponding operating system or applications. A copy of the patch files is stored in the second nonvolatile storage area. When the system is restored, the primary drive is reformatted and the image stored on the second nonvolatile storage area is copied to the primary drive. The patches stored on the second nonvolatile storage area are then applied to the operating system and applications included in the image that was copied to the primary drive.
摘要:
A system and method that rejuvenates a computer system is provided. The user uses the computer system that includes an operating system and applications for a first period of time creating data files and applying patches to the operating system and applications. An image is created of the primary drive and stored on a second nonvolatile storage area. In one embodiment, the second nonvolatile storage area is a hidden partition of a hard drive. The user continues using the system during a second period of time. When the computer system becomes sluggish, the primary drive is reformatted and the image is copied from the second nonvolatile storage area to the primary drive. In addition, patches and applications installed after the image was created are stored to the second nonvolatile storage area and reapplied and reinstalled on the primary drive after the image has been copied to the primary drive.
摘要:
A method and system for downloading software according to an identity of a user. Upon booting up a client computer, the user is automatically directed to a deployment server, which contains a listing of software to which the user is authorized to download and use. The directions to the deployment server are provided by a domain name server, or a domain controller. The software initially loaded onto the client computer is minimal, such that it is easily appended with additional features and programs.
摘要:
A method and system for remotely isolating faults in computer network devices coupled to a computer network. A plurality of first computer units are coupled to the computer network. The plurality of first computer units are located on a user side of the computer network. A plurality of second computer units are coupled to the computer network. The plurality of second computer units are located on a service provider side of the network. One of the plurality of second computer units is designated to provide computing services to one of the plurality of first computer units. One of the plurality of first computer units experiencing a fault communicating with its designated second computer unit uses another of the plurality of first computer units as a proxy computer unit to remotely isolate the fault.
摘要:
A method, computer program product and system for reducing the boot time of a client device in a client device/data center environment. A profile of the client device, which includes information regarding the usage characteristics of the client device, may be created. A confidence level indicating the likelihood that the client device is going to be booted may be determined based on the client device's profile. The confidence level and the utilization of the resources of the server blades in the data center may be examined in determining whether to have an appropriate server blade perform an action involved in booting the operating system of the client device. If the appropriate server blade performs such an action, e.g., pre-booting the client device's operating system, prior to the user of the client device attempting to boot its operating system, then the boot time may be reduced.
摘要:
A system and method for installing a type-1 hypervisor onto a secondary storage of a computer while a user operating system is already installed and executing in main memory.
摘要:
A “setmax” command is issued in BIOS to hide the service area (HPA) of a HDD during normal operation, so that the HPA cannot be accessed or erased inadvertently by the user or by a virus. Pressing a special key (e.g., F11) during booting permits access to the HPA.
摘要:
Various methods are disclosed for ensuring compliance with operating system license requirements in a server blade center environment in which a server blade may have plural images of an O.S., one for each of plural thin clients serviced by the blade.
摘要:
A method, computer program product and system for enabling a client device in a client device/data center environment to resume from sleep state more quickly. The resource in the server blade used for suspending the activity of the computing state of the client device in order to enter the client device in a sleep state is not reallocated for a period of time. If the client device indicates to the server blade to resume the client device from sleep state prior to the ending of that period of time, then the server blade reinitializes the computing state using the same resource as used in suspending the computing state of the client device. By using the same resource, steps traditionally implemented in resuming the client device from sleep state are avoided thereby reducing the time in resuming the client device from sleep state.
摘要:
The boot-time required for a log-on to a desktop blade system is improved, and a more streamlined process for performing maintenance operations, such as software updates, across an enterprise desktop blade system is facilitated. All activities being performed by a user are cached, in an off-blade storage location, on an ongoing basis. The caching is performed using “divided caching”, that is, different elements of the user image are stored in different locations. The specific divisions utilized are based upon classifications of the information to be cached, e.g., a first class of information used by all users of the system; a second class of information utilized by a certain class of users; a third class of information utilized only by a particular individual, etc.