摘要:
A system and method for storing adapter card Option ROM BIOS extensions on the system's DASD and, more particularly, on a partition of the DASD that is generally inaccessible to the operating system. The system may partition the system DASD into a user partition and a hidden partition where the hidden partition is preferably inaccessible to the operating system. BIOS extensions files are stored in the hidden partition. The system BIOS, when executed, identifies the peripheral devices on the system and interrogates the hidden partition for BIOS extension files corresponding to each of the identified devices. If the hidden partition contains a BIOS extension file corresponding to an identified peripheral device, the file is verified for authenticity. If the verification completes successfully, the BIOS extension file is copied into shadow RAM and control is passed to it. In one embodiment, each BIOS extension file are downloaded to the system's DASD using a standards-based update process that is independent of the vendor or adapter card type.
摘要:
Described is a computer system which can be pre-set over a network to boot to a first or second remote boot protocol prior to being powered on over the network. The system is coupled to a remote computer via a data communication link. The system includes a communication subsystem for communicating data with the computer system. The communication subsystem is supplied with auxiliary power and is operative to communicate with the computer system regardless of whether the computer system is in a normal operating state. The remote computer includes a program for sending a first packet to the computer system via the communication link. The first packet contains a boot parameter which is indicative of the first or second remote boot protocol. The computer system is operative to receive the first packet via the communication subsystem and store the boot parameter in a memory thereof without powering on. The memory is accessed by BIOS during a network boot sequence and the system will boot in accordance with the specified boot protocol stored in the memory.
摘要:
The present invention comprises a method and system for configuring the language of a BIOS of a computer system. The method and system comprise providing a plurality of BIOS images in the computer system, each of the plurality of BIOS images being related to a particular language, selecting one of the pluralities of BIOS images based on the language supported by the computer system and utilizing the selected BIOS to configure the computer system. Through the use of the method and system in accordance with the present invention, the language being supported by the computer system is determined when the computer system is booted up as opposed to when the computer system is being built. This results in an increase in manufacturing productivity since original equipment manufacturers can build computer systems without having to worry about language restrictions.
摘要:
A system and method for installing a customized set of software on a personal computer, tailored to the requirements of the prospective user and avoiding unnecessary software and attendant license fees. Software (all that may be desired) in unusable form is loaded onto the personal computer then selected software (that which a particular user may require and/or desire) is converted (decompressed and/or decrypted) to produce usable versions of the selected software while the other software may be erased, if desired, to free up space in storage. The selection of software is done on the user's function (department and/or mission) and may be supplemented by a user selection from a menu, based on a selection utility.
摘要:
A system and method for recovering from corruption of an executable application and/or operating system stored on a client computer without downloading another copy of the application and/or operating system. This recovery is accomplished by storing, preferably at the initial program loading, two copies of the application (and the operating system, if desired) in different segments of a partitioned storage, one copy as a working copy and a second copy as an archive or backup copy. When the working copy of the application or operating system becomes corrupted and crashes, the backup copy is thereafter used as the new working copy and, if desired, a new backup copy is stored to be used when the working copy crashes. This allows the system to continue functioning after a crash without the necessity to find a new copy of the application and operating system from outside the computer.
摘要:
Embodiments of the invention address deficiencies of the art in respect to load balancing for servers having multiple blades and provide a novel and non-obvious method, system and computer program product for load balancing at the blade level for servers having multiple blades. In one embodiment of the present invention, a blade server for performing load balancing may comprise a plurality of blades, each blade coupled with a plurality of outgoing ports. The blade server may further include a blade management module configured for monitoring throughput performance of the server and the plurality of blades, wherein each blade is coupled with a plurality of outgoing ports, instructing a blade to switch from a first outgoing port to a second outgoing port when throughput performance decreases and instructing the blade to switch from the second outgoing port back to the first outgoing port when throughput performance increases.
摘要:
The present invention provides a way to secure data accessed by a software package pre-loaded on a computer system (for delivery to a customer). Specifically, under the present invention, customer data is loaded on a computer system along with any software package(s) that access the customer data prior to shipping the computer system to the customer. Also prior to shipping, a set (e.g., one or more) of passwords for accessing the data such as an administrative password and a hard disk password are set. After the computer system is shipped to the customer, confirmation of proper delivery will be sought. Once this confirmation is received, an access code such as a key or the set of passwords themselves will be shipped to the customer to unlock and use the data.
摘要:
A method and system for load balancing switch modules in a server system and a computer system utilizing the same is disclosed. In a first aspect, the method comprises assigning each of a plurality of servers to a switch module of a plurality of switch modules, such that a number of servers assigned to each of the plurality of switch modules is substantially equal. In a second aspect, a computer system comprises a plurality of servers coupled to a plurality of switch modules, a management module, and a load balancing mechanism coupled to the management module, wherein the load balancing mechanism assigns each of the plurality of servers to a switch module of the plurality of switch modules, such that a number of servers assigned to each of the plurality of switch modules is substantially equal.
摘要:
A network load balancing method in a blade grouping chassis can be provided. The method can include detecting system conditions among blades coupled to a single blade grouping chassis. The method also can include maintaining a rotation of selected ones of the blades among which individual blades are selected for use in network load balancing inbound workloads. Finally, the method can include removing an individual blade from the rotation responsive to detecting a system condition in the individual blade indicative of an inability of the individual blade to support high availability in network load balancing. As such, the method further can include re-adding the individual blade to the rotation responsive to detecting a system condition in the individual blade indicative of an ability of the individual blade to support high availability in network load balancing.
摘要:
An arrangement which eliminates the need to remove a computer system from its packaging in order to initiate a re-imaging process. Particularly, there is broadly contemplated herein the use of a position-sensitive switching arrangement, such as a mercury switch, that is configured to power selected control circuitry in a computer so as to receive additional information or data as needed to update imaging or other aspects of a computer's operating system.