Patent application number | Description | Published |
20090064209 | OPTICAL DISC DRIVE DEVICE AND METHODS THEREOF - An information handling system includes an optical disc drive. The optical disc drive is connected to an auxiliary power source so that a drive tray of the optical disc drive can be opened or closed, or a disc inserted or ejected from the optical disc drive when the information handling system is in a low-power mode. In response to these actions in the low-power mode, information is stored to record that the drive tray has been opened or closed. Accordingly, when the information handling system returns to a normal mode, it can take appropriate action, such as dismounting a logical volume associated with a disc that was previously in the drive. Because the optical disc drive can be physically accessed in the low-power mode, the information handling system does not have to enter the normal power mode in order for discs to be retrieved or inserted. | 03-05-2009 |
20090109984 | WIRELESS DEVICE WITH FLASH CACHE AND BOOT FROM DOCK - A device is docked to a docking station. The docking station is coupled to a wired network. Code is obtained through the wired network. The code is executed on the device to enable the device to couple to a wireless network. | 04-30-2009 |
20090132797 | Methods, Media and Apparatus for Booting Diskless Systems - The disclosure provides a system, method, and computer readable medium for booting a diskless client in an information handling system (IHS). Cached boot data is stored in a non-volatile memory of the diskless client. The diskless client sends a boot request with an identifier and receives a boot reply containing an image signature associated with the identifier. The diskless client determines whether there is a match between a cached image signature and the received image signature. If there is a match, the diskless client boots with the cached boot data. If there is not a match, the cached boot data is invalidated and new boot data is requested and received from a server. The diskless client stores the new boot data in the non-volatile memory and boots with the new boot data. The cached boot data may be update when network traffic is below a predetermined level and/or an administrator change to boot data affects a plurality of diskless clients. The diskless client request and receives updated boot data stores the updated boot data in the non-volatile memory. | 05-21-2009 |
20090165097 | SINGLE SIGN-ON FOR OS BOOT IMAGE PROVISIONING AND OS LOGIN BASED ON USER IDENTITY - A method for single sign-one for operating system (OS) boot image provisioning and OS login based on user identity includes receiving authentication information from an information handling system (IHS) over a network. The authentication information is associated with a user. The authentication information is sent to network services. Boot image information is received from the network services. The boot image information is associated with a boot image and the authentication information. The boot image is provisioned to the IHS over the network, wherein the boot image includes an OS that is configured to read the authentication information from a shared memory region of the IHS and use the authentication information to auto-login the user to the OS. | 06-25-2009 |
20090264098 | System and Method for Configuring Devices for Wireless Communication - A system and method for configuring devices for wireless communication are disclosed. A method may include transmitting an activation key from an activation broker to a wireless agent. The method may also include transmitting the activation key from the activation broker to a wireless registrar. At least one of the transmission of the activation key to the wireless agent and the transmission of the activation key to the wireless registrar may include transmitting the activation key via a short-range wireless communication technology. In addition, the activation key may include information for authenticating wireless communication between the wireless agent and a wireless access point. | 10-22-2009 |
20090327675 | SYSTEM AND METHOD FOR OS BOOT IMAGE PROVISIONING BASED ON USER IDENTITY TO ENABLE MOBILE USERS - A method for provisioning a boot image includes receiving authentication information from an information handling system (IHS) over a network. The authentication information is associated with a user. The authentication information is sent to network services. Boot image information is received from the network services. The boot image information is associated with a boot image. The boot image is provisioned to the IHS over the network. | 12-31-2009 |
20100027441 | System and Method for Configuring a Network - A system and method for configuring a network are disclosed. A method may include storing identifying information associated with one or more network devices on a computer-readable medium in an information handling system prior to delivery of the information handling system to a user. The method may also include determining whether the identifying information stored on the information handling system is associated with the network access point. The method may further include automatically configuring network parameters for communication between the network access point and the information handling system in response to a determination that the identifying information stored on the information handling system is associated with the network access point. | 02-04-2010 |
20100031255 | Modular Virtual Machine Server - A simple to customize IT infrastructure architecture. The IT infrastructure architecture includes a general-purpose virtualized architecture platform. The IT infrastructure architecture is well suited for delivering simple pre-packaged software solutions to the small business segment as plug and play type appliances. In certain preferred embodiments, the IT infrastructure architecture includes a virtual appliance memory device such as a virtual appliance universal serial bus (USB) key. The IT infrastructure architecture uses embedded server virtualization technology to host business applications as a virtual appliance. | 02-04-2010 |
20100042672 | VIRTUAL MACHINE IMAGE MANAGEMENT SYSTEM AND METHODS THEREOF - A virtual machine image (VMI) repository stores a set of VMIs. A subset of the VMIs can be associated with a designated user. In response to receiving a request from a remote device identifying the designated user, a list of the subset of VMIs is communicated to the remote device via a network. The user can select one of the VMIs from the list and the VMI repository can provide the selected VMI to the remote device. The user is thereby permitted to select a VMI suited to a particular use or environment, such as a VMI associated with a work environment. | 02-18-2010 |
20100095000 | Enabling Throttling of Resources on a Virtualization Enabled Information Handling System - A system for enabling throttling of resources, including central processing units (CPUs) and peripherals, on a virtualization-enabled information handling system such as a CE type information handling system is set forth. With the system for enabling throttling of resources, each virtual appliance within an information handling system is configured with its resource needs. | 04-15-2010 |
20100146039 | System and Method for Providing Access to a Shared System Image - Systems and methods for providing data integrity for stored data are disclosed. A method may include associating a client with a first provisioning server selected from a plurality of provisioning servers communicatively coupled to the client. The method may also include creating a partition on a first logical unit communicatively coupled to the first provisioning server and associated with the client, the partition having a write space for data specific to the client. The method may further include the first provisioning server managing (a) input/output operations communicated between the client and the partition on the first logical unit and (b) input/output operations communicated between the client and a shared image common to the client and at least one other client, the shared image stored on a second logical unit. | 06-10-2010 |
20100146251 | VIRTUAL APPLIANCE PRE-BOOT AUTHENTICATION - A system for pre-boot authentication of a virtual appliance includes one or more subsystems to receive a command to power-on an information handling system (IHS). After receiving the command to power-on the IHS, the system initializes a power-on self test (POST), passes control of the IHS to a hypervisor, loads a concurrent service environment (CSE), requests user credentials, receives user credentials, authenticates user credentials using the CSE and authorizes a specific operating system image from a plurality of images to run on the IHS via the virtual appliance after the user credentials are authenticated. | 06-10-2010 |
20100153697 | Methods and systems for embedded user authentication and/or providing computing services using an information handling system configured as a flexible computing node - Methods and systems for providing embedded user authentication and/or providing computing services using an information handling system configured as flexible computing node, and which may be implemented to perform preboot authentication of users. The flexible computing node may also be configured to provision the appropriate work environment for a given user based on one or more user parameters (e.g. entitlements, location, network connection, and/or other parameters). | 06-17-2010 |
20100259486 | System And Method For Secure Gesture Information Handling System Communication - A secured communication channel is established between two or more information handling systems by defining attributes for encrypting information with physical inputs made at touch devices of the information handling systems. Inputting the physical gesture at a touch device of each information handling system allows evaluation of one or more attributes at each information handling system so that the shared secret of the physical gesture form the basis for encrypted communications. The touch device includes touch screens or touch pads and the attributes include gesture speed, plural distinct gesture touch points, movement of touch points relative to each other, or other attributes that are determinable from physical gesture inputs at each information handling system. | 10-14-2010 |
20100268756 | SYSTEM AND METHOD FOR PROVIDING ACCESS TO A SHARED SYSTEM IMAGE - Systems and methods for providing data integrity for stored data are disclosed. A method for providing access to a remote shared image may include receiving from a first provisioning server a request to create a write space for a client communicatively coupled to the first provisioning server. The message may further include creating a partition on a first logical unit disposed in a storage array, the first logical unit communicatively coupled to the first provisioning server and associated with the client. The method may additionally include storing a thin clone of a shared image on the partition, the shared image common to the client and at least one other client and stored on a second logical unit, the thin clone comprising a write space for data specific to the client. | 10-21-2010 |
20100306418 | Methods and System for Configuring a Peripheral Device with an Information Handling System - A method for configuring a peripheral device in communication with an information handling system (IHS) is disclosed, wherein the method includes receiving visual data associated with the peripheral device and mapping configuration data to the peripheral device based on the visual data. The method further includes utilizing the configuration data to configure the peripheral device in communication with the IHS. An information handling system (IHS) in communication with an image capturing device is further disclosed including a storage device operable to store a database, the database configured to store a standard image of a peripheral device, wherein the standard image is associated with configuration data for the peripheral device. The system further includes a memory coupled to the storage device and a processor to receive visual data associated with the peripheral device from the image capturing device. The processor is operable to execute a software application configured to match the visual data with the standard image to configure the peripheral device based on the configuration data. | 12-02-2010 |
20110063994 | Secure And Rapid Networking Configuration Of Information Handling Systems And Peripherals - A near field communication device, such as an RFID wand, transmits network configuration information to non-volatile memory of a networking device while the networking device is powered down, and even packaged at a retail store. The networking device powers up, reads the network configuration information, and applies the network configuration to automatically interface the networking device with a wireless network. | 03-17-2011 |
20110072069 | Systems and Methods for Providing a Desktop Image to an Information Handling System - An information handling system (IHS) is provided in the context of providing a desktop image. The IHS may include a storage device and a client device. The IHS may also include a management server configured to establish communication between the storage device and the client device. In addition, the client device may be configured to boot directly from the storage device and wherein the data communication occurs only between the storage device and the client device. | 03-24-2011 |
20110191765 | System and Method for Self-Provisioning of Virtual Images - A system, method, and computer-readable medium are disclosed for automatically provisioning a virtual image on a target system. A service operating system comprising a virtual machine monitor and a personalization agent is installed on a target system. A set of digital assets entitlement data is provided along with an associated set of digital assets data contained in a virtual software image, which is then installed on the target system by the personalization agent. | 08-04-2011 |
20110223860 | System and Method for Configuring Devices for Wireless Communication - A system and method for configuring devices for wireless communication are disclosed. A method may include transmitting an activation key from an activation broker to a wireless agent. The method may also include transmitting the activation key from the activation broker to a wireless registrar. At least one of the transmission of the activation key to the wireless agent and the transmission of the activation key to the wireless registrar may include transmitting the activation key via a short-range wireless communication technology. In addition, the activation key may include information for authenticating wireless communication between the wireless agent and a wireless access point. | 09-15-2011 |
20110283276 | System and Method for Automated Information Handling System Network Device Discovery and Support - Extended network plug and play functionality is provided for a first network device with a proxy located at a second network device. The proxy advertises a profile for the first network device and responds to a query of the profile by a third network device. The proxy provides an install package for the first network device to the third network device that the third network device applies to interact with the first network device through the network. In one embodiment, the proxy automatically detects network devices that are not plug and play compliant and retrieves the profile for the non-compliant network device using an identifier retrieved from the non-compliant device, such as a MAC address. | 11-17-2011 |
20110289350 | Restoration of an Image Backup Using Information on Other Information Handling Systems - A backup and restoration process which first attempts to recover information blocks from locally connected information handling systems executing a backup/restore service before looking to the slower access cloud store to recover data blocks. | 11-24-2011 |
20110296156 | System and Method for Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system (CHVS) includes a processor and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the CHVS, authenticates a virtual machine image and launches the virtual machine based on the image. The CHVS is configurable to execute the BIOS or the virtualization manager. A client system update network includes a client update system and a CHVS with a processor, a security processor, and non-volatile memory with BIOS code and virtualization manager code that initializes the CHVS, authenticates a virtual machine image and launches a virtual machine based on the image. The CHVS is configurable to execute the BIOS or the virtualization manager. The client update system receives updates and sends them to the CHVS. The CHVS authenticates the updates with the security processor, and overwrites the non-volatile memory with the updates. | 12-01-2011 |
20110296408 | System and Method for Implementing a Secure Client Hosted Virtualization Service Layer in an Information Handling System - A client hosted virtualization system (CHVS) has a non-volatile memory that includes BIOS code and virtualization manager code that operates to initialize the CHVS and to launch a virtual machine. The CHVS establishes a secure communication channel with a client update system via a network interface, receives an update to the virtualization manager code, authenticates the update and overwrites the non-volatile memory with the update. The CHVS is configurable to execute the BIOS and not virtualization manager, or to execute the virtualization manager and not the BIOS. | 12-01-2011 |
20110296409 | System and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system (CHVS) includes a processor to execute code, a component, and a non-volatile memory. The non volatile memory includes BIOS code and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, launch a virtual machine on the CHVS, and assign the component to the virtual machine, such that the virtual machine has control of the component. The CHVS is configurable to execute the BIOS and not the virtualization manager, or to execute the virtualization manager and not the BIOS. | 12-01-2011 |
20110296410 | System and Method for Fuse Enablement of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system includes a processor to execute code, a non-volatile memory, and a switch. The memory includes code to implement a basic input/output system (BIOS) for the CHVS, and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, authenticate a virtual machine image associated with a virtual machine, and launch the virtual machine on the CHVS. The switch is operable to select one of a first state and a second state. The processor operates to execute the BIOS code when the switch is in the first state and to execute the virtualization manager code when the switch is in the second state. | 12-01-2011 |
20110296488 | System and Method for I/O Port Assignment and Security Policy Application in a Client Hosted Virtualization System - A client hosted virtualization system includes a processor and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system, authenticates a virtual machine image, launches the virtual machine based on the image, and implements a policy manager. The policy manager determines a policy for the virtual machine, receives a request to access a device from the virtual machine, determines if the virtual machine is permitted to access the device based upon the policy, and if so, permits the virtual machine to access the device. If not, the policy manager denies the virtual machine access to the device. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager. | 12-01-2011 |
20120117381 | System and Method for Component Authentication of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system (CHVS) includes a processor to execute code, a security processor, a component that includes a certificate, and a non-volatile memory. The non-volatile memory includes BIOS code for the CHVS and virtualization manager code to initialize the CHVS, launch a virtual machine on the CHVS, and authenticate the component with the security processor by determining that the certificate is valid. The CHVS is configurable to execute the first code and not the second code, or to execute the second code and not the first code. | 05-10-2012 |
20120131666 | Virtual Appliance Pre-Boot Authentication - A system for pre-boot authentication of a virtual appliance includes one or more subsystems to receive a command to power-on an information handling system (IHS). After receiving the command to power-on the IHS, the system initializes a power-on self test (POST), passes control of the IHS to a hypervisor, loads a concurrent service environment (CSE), requests user credentials, receives user credentials, authenticates user credentials using the CSE and authorizes a specific operating system image from a plurality of images to run on the IHS via the virtual appliance after the user credentials are authenticated. | 05-24-2012 |
20130024726 | SYSTEM AND METHOD FOR REMOVABLE NETWORK ATTACHED STORAGE ENABLING SYSTEM RECOVERY FROM BACKUP - A system and method for enabling recovery from backup is disclosed. The removable system may include a processor, a memory, a network interface, a backup management module configured to backup data associated with an information handling system communicatively coupled together. The system may be further configured to boot and restore data associated with the information handling system to which the memory is locally attached. The method may include copying data from an information handling system via the network to memory. The method may further include booting and restoring copied data to the information handling system from the locally attached memory. The system and method may further include an article of manufacture including a computer-readable medium and computer-executable instructions operable to copy data, determine the identity of, boot and restore copied data to an information handling system. | 01-24-2013 |
20130139250 | VIRTUAL APPLIANCE PRE-BOOT AUTHENTICATION - A system for pre-boot authentication of a virtual appliance includes one or more subsystems to receive a command to power-on an information handling system (IHS). After receiving the command to power-on the IHS, the system initializes a power-on self test (POST), passes control of the IHS to a hypervisor, loads a concurrent service environment (CSE), requests user credentials, receives user credentials, authenticates user credentials using the CSE and authorizes a specific operating system image from a plurality of images to run on the IHS via the virtual appliance after the user credentials are authenticated. | 05-30-2013 |
20130311464 | Aggregated Preference-Driven Social Content Player - A system and method are disclosed for managing playlists of digital content. Digital content preference data is received from a plurality of users. The preference data is then processed to generate a group preference playlist, which contains references to digital content that is mutually preferred by each of the users. The group preference playlist is then initiated to play the mutually-preferred digital content. | 11-21-2013 |
20130326585 | System and Method for Fuse Enablement of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system includes a processor to execute code, a non-volatile memory, and a switch. The memory includes code to implement a basic input/output system (BIOS) for the CHVS, and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, authenticate a virtual machine image associated with a virtual machine, and launch the virtual machine on the CHVS. The switch is operable to select one of a first state and a second state. The processor operates to execute the BIOS code when the switch is in the first state and to execute the virtualization manager code when the switch is in the second state. | 12-05-2013 |
20130339501 | Automated Digital Migration - A system, method, and computer-readable medium are disclosed for performing automated, peer-to-peer migrations of entitled digital assets. A first identifier corresponding to a source system, and a first set of entitlement data corresponding to a set of digital assets installed on the source system, are processed to generate a first set of entitlements entitling the source system to use the set of digital assets. The first identifier is then cross-referenced to a second identifier corresponding to a target system. A migration request and the second identifier are received from the target system, which are then processed to initiate the migration of the digital assets from the source system to the target system. The second identifier and the first set of entitlement data are subsequently processed to generate a second set of digital asset entitlements entitling the target system to use the set of digital assets. | 12-19-2013 |
20140019584 | Acceleration of Cloud-Based Migration/Backup Through Pre-Population - A system, method, and computer-readable medium are disclosed for performing automated, cloud-based migrations of entitled digital assets. A set of entitlement data corresponding to a set of digital assets installed on a first system is processed with a set of digital asset source data to generate an equivalent set of digital assets. A first identifier associated with the source system is then cross-referenced to a second identifier associated with a target system. The second identifier and the set of entitlement data are processed to generate a second set of digital asset entitlements entitling the target system to use the set of equivalent digital assets. A migration request and the second identifier are then processed to provide the set of equivalent digital assets to the target system. | 01-16-2014 |
20140020105 | Distributing Software Images with Mixed Licensing - A system, method, and computer-readable medium are disclosed for managing the licensing of digital assets associated with a system image. A system image is processed to identify digital asset identification information, which in turn is processed to determine whether its associated digital asset is available for licensing from a system manufacturer. If the digital asset could not be identified, or if it is unavailable for licensing from the system manufacturer, then it is marked as “custom.” Otherwise, it is marked as “available” and presented to a system purchaser. Any digital assets that the system purchaser elects to license are marked as “license” and all other digital assets are marked as “custom.” Digital assets marked as “license” are then licensed from the system manufacturer. Both licensed and “custom” digital assets are installed and their corresponding licenses are applied to the system image, which in turn is applied to the target system. | 01-16-2014 |
20140047101 | Method for Personalized Shopping Recommendations - A system, method, and computer-readable medium are disclosed for providing personalized recommendations based upon a user's system profile and usage. A personalized recommendation system receives a first set of input data and a second set of input data, the first set of input data comprising traditional recommendation input data and the second set of input data comprising recommendation input data associated with the profile and usage of a user's system. The first and second sets of input data are then processed to generate and provide a personalized recommendation. | 02-13-2014 |
20140047243 | System and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system (CHVS) includes a processor to execute code, a component, and a non-volatile memory. The non volatile memory includes BIOS code and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, launch a virtual machine on the CHVS, and assign the component to the virtual machine, such that the virtual machine has control of the component. The CHVS is configurable to execute the BIOS and not the virtualization manager, or to execute the virtualization manager and not the BIOS. | 02-13-2014 |
20140059236 | Process for Peer-To-Peer Download of Software Installer - A system, method, and computer-readable medium are disclosed for performing automated, peer-to-peer migrations of entitled digital assets. A first identifier corresponding to a source system, and a first set of entitlement data corresponding to a set of digital assets installed on the source system, are processed to generate a first set of entitlements entitling the source system to use the set of digital assets. The first identifier is then cross-referenced to a second identifier corresponding to a target system. A migration request and the second identifier are received from the target system, which are then processed to initiate the migration of the digital assets from the source system to the target system. The second identifier and the first set of entitlement data are subsequently processed to generate a second set of digital asset entitlements entitling the target system to use the set of digital assets. | 02-27-2014 |
20140143842 | System and Method for Component Authentication of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system (CHVS) includes a processor to execute code, a security processor, a component that includes a certificate, and a non-volatile memory. The non-volatile memory includes BIOS code for the CHVS and virtualization manager code to initialize the CHVS, launch a virtual machine on the CHVS, and authenticate the component with the security processor by determining that the certificate is valid. The CHVS is configurable to execute the first code and not the second code, or to execute the second code and not the first code. | 05-22-2014 |
20140162549 | SYSTEM AND METHOD FOR CONNECTING TO A PERIPHERAL DEVICE WITH ACCESS CREDENTIALS AND ROTATING PIN USING AN NFC REMOTE CONTROL - A system and method for connecting to a peripheral device utilizes a near field communication (“NFC”) enabled remote control to acquire a rotating access pin that is transmitted to an NFC enabled computing device in order to establish a connection between the computing device and the peripheral device. | 06-12-2014 |
20140184385 | Pairing Remote Controller to Display Device - A remote control device is authorized to command the presentation of information from an information presenting device by communicating with the information presenting device by a first mode of communications while the remote control device and the information presenting device are proximate. In response to the authorizing, the information presenting device is unlocked to permit the presentation of information in response to commands from the remote control device. After the unlocking, the information presenting device presents information in response to commands from the remote control device. | 07-03-2014 |
20140208383 | SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING - A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system. | 07-24-2014 |
20140215039 | SYSTEM AND METHOD FOR MANAGING PEER-TO-PEER INFORMATION EXCHANGES - In one embodiment, a method includes, on a peer-to-peer (P2P) network entity, acquiring dynamic context information for a proposed P2P information exchange. The method further includes performing, by the P2P network entity, a rules-engine check to determine an allowability of the proposed P2P information exchange given the dynamic context information. The rules-engine check yields at least one specified action relative to the proposed P2P information exchange. The method also includes taking, by the P2P network entity, the at least one specified action. | 07-31-2014 |
20140215052 | SYSTEM AND METHOD FOR REPORTING PEER-TO-PEER TRANSFER EVENTS - In one embodiment, a method includes detecting a recordable transfer event on a source device. The recordable transfer event comprises a transfer of data between the source device and one or more destination devices in a peer-to-peer network. The method further includes generating, on the source device, a log of the recordable transfer event. In addition, the method includes, responsive to a determination that the source device lacks an infrastructure network connection, transmitting the log to at least one destination device so that the at least one destination device can report the log to a reporting node. | 07-31-2014 |
20140215559 | SYSTEM AND METHOD FOR ADAPTIVE MULTIFACTOR AUTHENTICATION - In one embodiment, a method includes receiving a request for wireless connection from a supplicant device via a service path. The service path includes a peer-to-peer communication path. The method further includes, based on an indication received from the supplicant device, adapting an authentication method to the supplicant device. The adapting includes selecting at least one authentication factor from a plurality of supported authentication factors. Each of the plurality of supported authentication factors comprises an authentication path that is distinct from the service path. In addition, the method includes authenticating the supplicant device via each of the at least one authentication factor. | 07-31-2014 |
20140215585 | SYSTEM AND METHOD FOR SYNCHRONIZING CONNECTION CREDENTIALS - In one embodiment, a method includes establishing a connection with an access-point (AP) device via a first communication path. The method further includes establishing a connection with a proxy device for the AP device via a second communication path that is distinct from the first communication path. In addition, the method includes determining a set of connection credentials maintained by the AP device. Furthermore, the method includes determining a set of connection credentials maintained by the proxy device. Additionally, the method includes identifying a correct set of connection credentials. The correct set includes at least one of the first set and the second set. The method also includes synchronizing the first set and the second set according to the correct set. | 07-31-2014 |
20140240098 | SYSTEM AND METHOD FOR CONTROLLING MEETING RESOURCES - A method of controlling a plurality of meeting room resources. The method includes initiating, via a host information handling system, an application, creating, via the application, a plurality of preferences, and establishing, by the host information handling system, a connection with a configuration device via a first close range communication path. The method also includes transferring at least one of the plurality of preferences, via the first close range communication path to the configuration device. The configuration device transmits, via a second close range communication path, a control message based on at least one of the plurality of preferences, to control at least one of the plurality of meeting room resources. | 08-28-2014 |
20140242947 | SYSTEM AND METHOD FOR DYNAMIC GEO-FENCING - In one embodiment, a method includes establishing a geo-fencing environment for the information handling system. The method further includes monitoring a stream of context information. In addition, the method includes determining whether the geo-fencing environment should be dynamically modified responsive to new context information in the stream. Furthermore, the method includes dynamically modifying the geo-fencing environment responsive to the determining so indicating. | 08-28-2014 |
20150082012 | SYSTEMS AND METHODS FOR PROVISIONING AN INFORMATION HANDLING SYSTEM FOR OPERATING SYSTEM STREAMING BASED ON INFORMATION HANDLING RESOURCE INVENTORY - In accordance with embodiments of the present disclosure, a method for provisioning an information handling system for operating system streaming, the information handling system having one or more information handling resources, may be provided. The method may include receiving from the information handling system a boot request to boot a streaming operating system. The method may also include, responsive to determining that an operating system image associated with the information handling system is not available, instructing the information handling system to boot a service operating system for generating an inventory of the one or more information handling resources. The method may additionally include receiving the inventory from the information handling system. The method may further include generating a new operating system image including drivers for supporting the one or more information handling resources identified in the inventory. | 03-19-2015 |