G06F9/00

Information handling system quick boot

An information handling system may perform a quick boot based on a determination that a boot does not require an update to at least one of a firmware and hardware of an information handling system. The information handling system may reboot and may determine whether a boot of the system requires an update to at least one of a firmware and hardware of the information handling system. If the boot does not require an update to the at least one of a firmware and hardware of the information handling system, the information handling system may boot by bypassing one or more basic input/output system (BIOS) power-on self-test (POST) operations.

Deploying service containers in an adapter device

In one implementation, an adapter device includes a processor and a storage medium including instructions. The instructions are executable by the processor to: deploy a composer container in the adapter device, wherein the adapter device is coupled to a host device; receive, by the composer container, a plurality of adapter service requests from the host device; and in response to the plurality of service requests, deploy, by the composer container, a plurality of service containers in the adapter device, wherein each service container is to provide a particular adapter service to the host device, and wherein each service container is allocated a subset of the plurality of computing resources of the adapter device.

File decay property
11693823 · 2023-07-04 · ·

A computer-implemented method, computer system, and computer program product for deleting a file from a storage medium. A file that is marked for automatic deletion is identified. A deletion time at which the file is to be deleted from the storage medium is identified. A visual indicator associated with the file is displayed. The visual indicator changes over time to provide an indication as to a nearness of the deletion time.

Application based firewall rule service

Described herein are systems, methods, and software to enhance firewall implementation for virtual machines. In one implementation, a method of managing firewall rules for a virtual machine includes identifying, in the virtual machine, an attach process for one or more applications to the virtual machine. The method further includes, identifying one or more firewall rules that correspond to the one or more applications and providing the one or more firewall rules to networking manager for the virtual machine.

Methods and systems for managing prioritized database transactions
11537567 · 2022-12-27 · ·

A database management system for controlling prioritized transactions, comprising: a processor adapted to: receive from a client module a request to write into a database item as part of a high-priority transaction; check a lock status and an injection status of the database item; when the lock status of the database item includes a lock owned by a low-priority transaction and the injection status is not-injected status: change the injection status of the database item to injected status; copy current content of the database item to an undo buffer of the low-priority transaction; and write into a storage engine of the database item.

Systems and methods for preventing, through machine learning and access filtering, distributed denial of service (“DDoS”) attacks originating from IoT devices

A method for filtering internet traffic is provided. The method may include using a private network for receiving a request message from an electronic device within the private network and identifying the type of the electronic device. When the electronic device is identified as a non-IoT type device, the method may include transmitting the request message through the non-IoT output channel and when the electronic device is identified as an IoT type device the method may include transmitting the request message through the IoT output channel. The method may further include using an IP address filter gateway for filtering incoming traffic to a web server, the filtering may include granting device access to the web server when the request message is received through the non-IoT output channel and denying access to the web server when the request message is received through the IoT output channel.

Virtual marketplace for distributed tools in an enterprise environment
11538095 · 2022-12-27 · ·

A virtual marketplace may offer end users the ability to acquire articles (including tools and metadata objects) that are compatible with an enterprise operating system platform. The virtual marketplace may determine one or more articles that are implemented (or installed) on the enterprise operating system platform. The enterprise operating system platform may be provided to the end user by an operator of the marketplace. The articles including articles that may be used for evaluating a performance of an entity. The virtual marketplace may further ascertain data that are processed or generated by the articles that are implemented on the enterprise operating system platform. The virtual marketplace may additionally determine functionalities that are used or provided by the articles. Accordingly, the virtual marketplace may provide a recommendation of associated articles from the virtual marketplace that have at least one dependency relationship with the articles.

Blood treatment systems and methods

Dialysis systems comprising actuators that cooperate to perform dialysis functions and sensors that cooperate to monitor dialysis functions are disclosed. According to one aspect, such a hemodialysis system comprises a user interface model layer, a therapy layer, below the user interface model layer, and a machine layer below the therapy layer. The user interface model layer is configured to manage the state of a graphical user interface and receive inputs from a graphical user interface. The therapy layer is configured to run state machines that generate therapy commands based at least in part on the inputs from the graphical user interface. The machine layer is configured to provide commands for the actuators based on the therapy commands.

Secure boot of an integrated circuit

A computer chip, such as an System on chip (SOC), can receive firmware updates having two separate signatures; a first of the signatures is used to authenticate the firmware using a processor within the computer chip, and a second of the signatures is used by a controller, separate from the processor. A first key, used by the processor to authenticate the firmware, can be a boot key that is hardwired in the computer chip. A second key, used by the controller, can be a key that is provided to the controller at any time and is updatable. The controller can suspend the processor so that the controller can perform a first authentication of the firmware using the second signature and the second key. If the authentication is successful, the controller can release the processor, which then uses the first key and the first signature to perform a second authentication.

Estimating indirect interface implementation before load time based on directly implemented methods

According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.