Patent application number | Description | Published |
20120192019 | Visually Marking Failed Components - Methods, apparatus, and products for visually marking computing components within a computing system are disclosed that include: detecting that a particular computing component has failed, wherein the particular computing component has a physical surface that may be altered with the application of some physical stimulus; and applying a requisite physical stimulus to the physical surface such that the appearance of the physical service is altered, thereby visually identifying that the component has failed. | 07-26-2012 |
20130031538 | Updating Secure Pre-boot Firmware In A Computing System In Real-time - Updating secure pre-boot firmware in a computing system in real-time, including: storing in a secure firmware memory region a firmware update module configured to update the secure pre-boot firmware; responsive to a user request to update the secure pre-boot firmware: entering a processor management mode, including suspending operating system and user-level data processing operations; executing the firmware update module; and determining whether the secure pre-boot firmware was successfully updated; and exiting the processor management mode, including resuming operating system and user-level data processing operations and notifying the user of the successful update. | 01-31-2013 |
20130091259 | Out-Of-Band Management Of Third Party Adapter Configuration Settings In A Computing System - Out-of-band management of third party adapter configuration settings in a computing system, the computing system including one or more configurable adapters, including: retrieving, by an out-of-band configuration manager from an out-of-band configuration repository, out-of-band configuration settings for a configurable adapter; determining, by the out-of-band configuration manager, whether the out-of-band configuration settings for the configurable adapter have been updated; and responsive to determining that the out-of-band configuration settings for the configurable adapter have been updated: updating, by the out-of-band configuration manager, in-band configuration settings for the configurable adapter, wherein the in-band configuration settings for the configurable adapter are stored in an in-band configuration repository; retrieving, by the out-of-band configuration manager from the in-band configuration repository, metadata that includes updated in-band configuration settings for the configurable adapter; and sending, by the out-of-band configuration manager to a configuration implementer, the metadata that includes updated in-band configuration settings for the configurable adapter. | 04-11-2013 |
20130091260 | Out-Of-Band Management Of Third Party Adapter Configuration Settings In A Computing System - Out-of-band management of third party adapter configuration settings in a computing system, the computing system including one or more configurable adapters, including: retrieving, by an out-of-band configuration manager from an out-of-band configuration repository, out-of-band configuration settings for a configurable adapter; determining, by the out-of-band configuration manager, whether the out-of-band configuration settings for the configurable adapter have been updated; and responsive to determining that the out-of-band configuration settings for the configurable adapter have been updated: updating, by the out-of-band configuration manager, in-band configuration settings for the configurable adapter, wherein the in-band configuration settings for the configurable adapter are stored in an in-band configuration repository; retrieving, by the out-of-band configuration manager from the in-band configuration repository, metadata that includes updated in-band configuration settings for the configurable adapter; and sending, by the out-of-band configuration manager to a configuration implementer, the metadata that includes updated in-band configuration settings for the configurable adapter. | 04-11-2013 |
20130117493 | Reliable Memory Mapping In A Computing System - Methods, apparatus, and products for reliable memory mapping in a computing system, the computing system including a plurality of memory modules, including: determining, by a channel mapping module, a reliability rating for each of a plurality of memory controller address ranges; mapping, by the channel mapping module, critical system-level memory addresses to the most reliable memory controller address ranges; and directing, by the channel mapping module, memory accesses addressed to a critical system-level memory address to the most reliable memory controller address ranges. | 05-09-2013 |
20130138934 | LOADING CONFIGURATION INFORMATION - Embodiments of the present invention relate to a method and apparatus for loading configuration information. The method for loading configuration information according to one embodiment of the present invention comprises: obtaining a first digest from a baseboard management controller BMC, wherein the first digest is generated according to first configuration information stored in BMC; comparing the first digest with a second digest locally stored in a host system, wherein the second digest is generated according to second configuration information locally stored in the host system, and the second configuration information is configuration information loaded in the last boot of the host system; and in response to determining that the first digest differs from the second digest, obtaining the first configuration information from BMC for overwriting the second configuration information, so as to load the first configuration information in the course of booting the host system. | 05-30-2013 |
20130144991 | Wireless Configuration For A Computing Device - Wireless configuration for a computing device, the computing device including computer memory, a wireless receiver, and a device configuration management module, including: receiving, by the device configuration management module via the wireless receiver, configuration data for the computing device, wherein the computing device is packaged in original equipment manufacturer (‘OEM’) packaging; and storing, by the device configuration management module, the configuration data for the computing device in the computer memory of the computing device. | 06-06-2013 |
20140068766 | Secure Code Verification Enforcement In A Trusted Computing Device - Secure code verification enforcement in a trusted computing device, including: examining, by a secure code validation module, a trusted computing device that is locked in a powered down state in response to an impermissible physical access of the trusted computing device; determining, by the secure code validation module, whether content of trusted memory in the trusted computing device has been altered; and responsive to determining that the content of trusted memory in the trusted computing device has not been altered, unlocking, by the secure code validation module, the trusted computing device such that the trusted computing device can be powered up. | 03-06-2014 |
20140173689 | PROVIDING A REAL-TIME INDICATION OF PLATFORM TRUST - Methods and apparatuses for providing a real-time indication of platform trust are provided. Embodiments include an integrity reporting module determining that a platform is currently operating in a system management mode (SMM) and receiving from an integrity measurement module, an integrity measurement results signal. Embodiments also include the integrity reporting module determining whether the received integrity measurement results signal indicates the platform is trusted. If the received integrity measurement results signal indicates that the platform is trusted, the integrity reporting module provides to a user of the platform, a real-time visual indication that the platform is trusted. If the received integrity measurement results signal indicates that the platform is not trusted, the integrity reporting module provides to the user a real time visual indication that the platform is not trusted. | 06-19-2014 |