摘要:
A method and apparatus for activating a computer system in response to a stimulus from a universal serial bus (USB) peripheral provides a mechanism for powering up a computer system or restoring it from a suspended mode of operation. The apparatus includes a controllable power supply and a non-standard protocol using the USB wire connections, to provide a method for polling the peripheral to determine if activity has occurred which a host computer system should use to trigger activation.
摘要:
Aspects for providing protection against theft and loss of a portable computer system are described. The aspects include establishing boundary conditions within which the portable computer system is authorized for use and tracking a position of the portable computer system with a global position system (GPS) unit in the portable computer system. The position is compared to the boundary conditions to identify whether the portable computer system has violated the boundary conditions, and anti-theft routines are performed when the position has violated the boundary conditions. The anti-theft routines include calling a preset phone number with a cellular calling facility of the portable computer system.
摘要:
A system and method for installing a customized set of software on a personal computer, tailored to the requirements of the prospective user and avoiding unnecessary software and attendant license fees. Software (all that may be desired) in unusable form is loaded onto the personal computer then selected software (that which a particular user may require and/or desire) is converted (decompressed and/or decrypted) to produce usable versions of the selected software while the other software may be erased, if desired, to free up space in storage. The selection of software is done on the user's function (department and/or mission) and may be supplemented by a user selection from a menu, based on a selection utility.
摘要:
Method and system aspects for securely transferring a computer system are described. A computer system is disabled at a shipping point via an RFID (radio frequency identification) interface and re-enabled at a receiving point via the RFID interface. Disabling the computer system includes selecting a boot password, writing the boot password to storage in the computer system via the RFID interface, and setting a disable bit in the storage via the, RFID interface. Re-enabling the computer system includes entering the boot password via the RFID interface and clearing the disable bit.
摘要:
Method and system aspects for performing an authenticated boot of a computer system in a networked computing environment are provided. The aspects include integration of boot manager services into a power on self test (POST) routine of a client system. The client system provides a digital signature for a selected operating system when the POST routine transfers control to a basic input/output system (BIOS) routine. Booting is authorized with the operating system through authentication by a server system of the digital signature.
摘要:
One aspect provides a method comprising: ascertaining an interrupt at an information handling device having two or more cores of different size; determining if the interrupt should be directed to one of a bigger core and a littler core based on a policy for scheduling interrupts; directing the interrupt to the little core if the interrupt does not qualify as an exception based on the policy for scheduling interrupts; and processing the interrupt on an appropriate core according the policy for scheduling interrupts. Other aspects are described and claimed.
摘要:
Systems and arrangements for permitting the transmission of fingerprint authentication data to a system remotely, while also permitting the system to employ such data as well as passwords in order to operate a computer system, while ensuring a reliable level of security for any group or organization using such systems and arrangements.
摘要:
A method, computer program product and system for enabling a client device in a client device/data center environment to resume from sleep state more quickly. The resource in the server blade used for suspending the activity of the computing state of the client device in order to enter the client device in a sleep state is not reallocated for a period of time. If the client device indicates to the server blade to resume the client device from sleep state prior to the ending of that period of time, then the server blade reinitializes the computing state using the same resource as used in suspending the computing state of the client device. By using the same resource, steps traditionally implemented in resuming the client device from sleep state are avoided thereby reducing the time in resuming the client device from sleep state.
摘要:
A method, computer program product and system for enabling a client device in a client device/data center environment to resume from sleep state more quickly. The resource in the server blade used for suspending the activity of the computing state of the client device in order to enter the client device in a sleep state is not reallocated for a period of time. If the client device indicates to the server blade to resume the client device from sleep state prior to the ending of that period of time, then the server blade reinitializes the computing state using the same resource as used in suspending the computing state of the client device. By using the same resource, steps traditionally implemented in resuming the client device from sleep state are avoided thereby reducing the time in resuming the client device from sleep state.
摘要:
Methods and systems for managing communication between a key fob and a host device are provided. In one implementation, the system includes a key fob configured to operate in accordance with one of a plurality of modes, including an automatic mode and a manual mode. The system further includes a host device associated with the key fob, wherein responsive to the key fob operating in accordance with the automatic mode, the key fob is configured to page periodically, and the host device is configured to page-scan periodically to detect a page from the key fob. In one implementation, the key fob further includes a controller configured to dynamically adjust a signal strength of a communication signal between the key fob and the host device in accordance with a mode of operation selected (or desired) by the user.