Abstract:
A computing system and a method of communicating with a virtual trusted runtime BIOS. The computing system can include hardware and a virtual machine monitor. A virtual trusted runtime BIOS can be managed by the virtual machine monitor. A communication channel can communicate with the virtual trusted runtime BIOS. The communication channel can be secured by a secure socket layer.
Abstract:
A polarity control circuit receives signals from contacts of a flat connector when the flat connector is connected to a port, where the port is engageable with the flat connector in any of plural orientations of the flat connector. The polarity control circuit applies polarity processing to the input signals to produce output signals at a target polarity.
Abstract:
A privileged domain includes a function of a Basic Input/Output System (BIOS). A request to access the function of the BIOS is routed to the privileged domain.
Abstract:
A first guest domain and an isolated peripheral related task. A peripheral related task to communicate with the peripheral and prevent the first guest domain from communicating with the peripheral.
Abstract:
Examples disclosed herein relate to a conference call host. Examples include to establishing, by a first computing system, a first secure connection to a second computing system via a wireless network in response to receiving a secure connection request from the second computing system; the first computing system and the second computing system are in physical proximity to each other. Examples include to provide an operating system session to the second computing system through the secure connection while the first computing system and the second computing system remain in physical proximity to each other; the operating system is stored on and executable by the first computing system. Examples include to provide a connection to a conferencing platform to the second computing system via the first secure connection, the conference call at least among the first computing system, the second computing system, and a remote user.
Abstract:
A controller that is separate from a processor of the system verifies controller code for execution on the controller. In response to verifying the controller code, the controller verifies a system boot code.
Abstract:
An electronic device has a plurality of virtualized environments. Selection of an application of an application store is received, and a virtualized environment is identified for installing the application selected from the application store.
Abstract:
Embodiments disclosed herein relate to managing shared data using a virtual machine. A virtual machine 110 executing on a processor may receive data from another virtual machine executing on the processor and store the received data. The virtual machine 110 may manage the stored data by processing it independent of other virtual machines executing on the processor.
Abstract:
In example implementations, a method is provided. The method may be executed by a processor of a security system. The method includes detecting a robot. The robot may then be validated. The response of the security system may be modified in response to the robot that is detected and validated.