摘要:
In some embodiments, the invention involves extending trusted computing environments to the boot firmware. In at least one embodiment, the present invention is intended to enable the trusted environment to be extended forward to the pre-boot environment in addition to post-OS load environment. Embodiments of the present invention enable the trusted environment to extend to the firmware at power-on. The firmware is integrated within the secure perimeter which was previously only available to the OS. In other words, the BIOS is made to be a trusted entity, as well as the OS. Extensible firmware interface (EFI) modules are signed with a public key. The processor has an embedded private key. EFI modules are verified using the keys to ensure a trusted environment from boot to OS launch. Other embodiments are described and claimed.
摘要:
When transitioning from sleep mode to active mode, a processing system loads first stage resume content and second stage resume content into a volatile memory of the processing system. The first stage resume content may contain contextual data for a first program that was in use before the processing system transitioned to sleep mode. The second stage resume content may contain contextual data for another program that was in use before the processing system transitioned to sleep mode. The processing system may provide a user interface for the first program before all of the second stage resume content has been loaded into the volatile memory. Other embodiments are described and claimed.
摘要:
Firmware-based conversion methods for storing converted firmware variables in a firmware storage device, such as flash memory. Under one method, “eager” compression of firmware is performed. In response to a storage request, a determination is made to whether a compressor is available. If it is, the firmware variable is stored in a compressed form in the storage device; if not, the firmware variable is stored in an uncompressed form. In response to a read request for a stored firmware variable, a determination is made to whether the variable is stored in a compressed or uncompressed form. If it is compressed, a decompressor is employed to return the variable to its uncompressed form prior to providing it to the requestor; already uncompressed variables are provided directly to the requester. An application program interface is provided to enable operating system runtime access to the firmware variables. Similar conversions may be employed separately or in parallel, including encryption.
摘要:
Techniques for unified management communications for virtual systems are described. An apparatus may comprise a first server emulated using a first virtual machine, a second server emulated using a second virtual machine, and a virtual machine monitor. The virtual machine monitor may communicate information with one or more emulated servers using a Simple Object Access Protocol (SOAP) message. Other embodiments are described and claimed.
摘要:
Provided are a method, system and program for buffering writes to an Input/Output (I/O) device in a cache. Writes to an Input/Output (I/O) device are buffered in a cache. Information on the buffered writes are communicated to a monitor component enabling identification of the buffered writes in the cache. A system failure is detected. The monitor component determines from the information on the buffered writes buffered in the cache that have not been transferred to the I/O device in response to the system failure. The monitor component causes the transfer of the determined writes to the I/O device.
摘要:
In some embodiments, the invention involves a system and method for fast resume from sleep mode. Reserved cache memory is used to store drivers and configuration variables. Upon resume, the drivers and configuration are read from the ACPI reserved cache memory and executed in memory rather than read from slower flash or CMOS memory. Other embodiments are described and claimed.
摘要:
A computer system is disclosed. The computer system includes a chipset to access one or more partitioned regions of a storage device and a network controller coupled to the chipset. The network controller includes a manageability engine (ME) to enforce one or more policies as conditions for accessing each of the one or more partitioned regions of the storage device.
摘要:
A system and method for maintaining computer platform components in an optimal state. The method determines whether a platform includes an out-of-band processor, and if the platform includes an out-of-band processor, then the out-of-band processor is enabled to passively or proactively obtain firmware and/or option ROM (Read Only Memory) updates for add-in cards on the platform. Once the out-of-band processor has obtained the updates for the add-in cards on the platform, the out-of-band processor will place the updates in a platform mailbox and send an interrupt to the in-band processor indicating that firmware and/or option ROM updates are available in a platform mailbox. The in-band processor will launch the firmware and/or option ROM updates on the platform.
摘要:
A system and method for enabling wireless traffic message passing. The method includes initializing a vehicle wireless subsystem, enabling a vehicle wireless subsystem comprising a WiMAX transponder to broadcast a query to request real-time traffic pattern data from a WiMAX tower, and if a response to the query is received, incorporating the real-time traffic pattern data into a runtime database and creating a human-readable display for displaying the runtime database on a navigation system. The human-readable display of the traffic pattern data includes the display of free-flowing traffic, slow moving traffic, and stopped traffic on a map to allow the driver to change a planned travel route if slow and stopped traffic pattern conditions exist on the planned travel route.
摘要:
Methods, software/firmware, and apparatus to support use of software running on platform hardware employing different endianness. In one embodiment, an endian byte order shim is implemented in a firmware stack to facilitate the use of software running on a computer platform having a processor employing an endianness that is different from the endianness native to the software. In response to software calls into the firmware, the endian byte order shim converts the endian byte order of the call arguments, as necessary, and passes the converted arguments to the firmware. Similarly, return arguments generated via the firmware (and/or platform hardware) are converted back to the endian byte order native to the software prior to being returned to the software.