G06F9/4406

Kernel-integrated instance-specific operational resources with virtualization

A network boot of a platform-specific operating system kernel is performed from a compressed platform-specific operating system kernel. The platform-specific operating system kernel, when booted, dynamically builds from the compressed platform-specific operating system kernel a bootable file system and boots application code. An application is loaded from the bootable file system.

Automatic switching and deployment of software or firmware based USB4 connection managers

Automatic-switching and deployment of software (SW)- or firmware (FW)-based USB4 connection managers (CMs) and associated methods, apparatus, software and firmware. A handshake is defined between BIOS and an operating system (OS) to discover supported CM capability and dynamically switch from a FW CM to a SW CM and visa verse if there is a mismatch. In addition, a mechanism is defined to deploy the correct FW or SW CM driver based on class code, 2-part or 4-part ID. Support for continued USB4 operation during an OS upgrade or downgrade is provided, while ensuring that the best possible CM solution is used based on the advertised platform and OS capability. USB4 controllers support a pass-through mode under which the host controller FW redirects control packets sent between an SW CM and a USB4 fabric, and a FW CM mode under which control packets are communicated between the host controller FW and the USB4 fabric to configure USB4 peripheral devices and/or USB4 hubs in the USB4 fabric.

Targeted data extraction system and method

Many mobile devices are used for documenting different scenarios that are encountered by the users as they go about their daily lives. In many situations, a mobile device may be used to document the scenario. This data may be of significant forensic interest to an investigator. In many situations, the owner of the phone may be willing to provide the investigator access to this data (through a documented consent agreement). Such consent is usually contingent upon the fact that not all the data available on the phone may be extracted for analysis, either due to privacy concerns or due to personal reasons. Courts have also opined in several cases that investigators must limit data extracted, so as to focus on only “relevant information” for the investigation at hand. Thus, only selective (or filtered) data should be extracted as per the consent available from the witness/victim (user). Described herein is the design and implementation of such a targeted data extraction system (TDES) for mobile devices. The TDES assumes consent of the user and implements state of the art filtering using machine learning techniques. This system can be used to identify and extract selected data from smart phones, in real time at the scene of the crime.

COMPUTATION SHARING AMONG DEVICES USING DEVICE OS CLUSTERING
20220374261 · 2022-11-24 ·

A processor may identify an action of a first device of the IoT devices. The processor may initiate a transfer from the first device to one or more other devices of the IoT devices. The processor may pause each thread being executed by the first device and the one or more other devices. The processor may transfer a unit from the first device to the one or more other devices.

SYSTEMS AND METHODS TO CONTROL SOFTWARE VERSION WHEN DEPLOYING OS APPLICATION SOFTWARE FROM THE BOOT FIRMWARE
20220374244 · 2022-11-24 ·

Embodiments of systems and computer implemented methods are disclosed to automatically restore operating system (OS) application software to an information handling systems (IHS) when the OS application software is removed from a computer readable storage device of the IHS. The disclosed embodiments control the version of the OS application software being deployed to an IHS when deploying the software from the boot firmware. For example, the disclosed embodiments utilize a version identifier to specify which version of the OS application software should be restored, a Content Deliver Network (CDN) server to store multiple versions of the OS application software, and a registration web server to map a device identifier corresponding to the IHS and the version identifier corresponding to the specified version of the OS application software to a universal resource locator (URL) link identifying where the specified version of the OS application software is stored within the CDN server.

Network initialization monitoring system

A network initialization monitoring system includes a host device coupled to a storage system and a monitoring system via a network, and including an initialization subsystem coupled to ports. During network initialization of the host device via the storage system, the initialization subsystem provides a first instance of a communication protocol for monitored port(s), and provides a second instance of the communication protocol for a monitoring port. During the network initialization of the host device via the storage system, the first instance of the communication protocol provided for each monitored port provides copies of network initialization communications transmitted via that monitored port and the network to the second instance of the communication protocol provided for the monitoring port, and the second instance of the communication protocol provided for the monitoring port provides the copies of the network initialization communications to the monitoring system.

CUSTOMIZED THERMAL AND POWER POLICIES IN COMPUTERS
20230058713 · 2023-02-23 ·

Example approaches for customization of thermal and power policies in computers, are described. In an example, a microcontroller of a computing system, also referred to as system, validates thermal policy custom data stored in a firmware storage medium of the system, in response to a supply of power to the system. On a successful validation of the thermal policy custom data, thermal control settings is updated with a customized thermal policy included in the thermal policy custom data. In response to initiation of a boot operation of the system, a processor of the system validates power policy custom data stored in the firmware storage medium. In response to a successful validation of the power policy custom data during the boot operation, the processor updates power control settings of the system with a customized power policy included in the power policy custom data.

EFFICIENT NODE IDENTIFICATION FOR EXECUTING CLOUD COMPUTING WORKLOADS
20230055276 · 2023-02-23 ·

A workload execution manager receives a request to execute a workload process in a cloud computing environment, where the cloud computing environment comprises a plurality of nodes; identifies a set of eligible nodes of the plurality of nodes for executing the workload process; determines whether a first eligible node of the set of eligible nodes satisfies a version threshold; responsive to determining that the first eligible node satisfies the version threshold, selects the first eligible node as a target node for executing the workload process; and executes the workload process on the target node.

APPLICATION INVOCATION ON SPECIFIED OPERATING SYSTEM VERSION

Described are techniques including a computer-implemented method comprising determining that a first version of an operating system (OS) is updated to a second version of the OS. The method further comprises determining that an application does not support the second version of the OS. The method further comprises associating the first version of the OS with the application as a base OS. The method further comprises invoking the application on the base OS by generating an isolated instance running the base OS on a user device, where the user device simultaneously runs the second version of the OS.

Return and replacement protocol (RRP)

Systems and methods provide for managing faulting network devices. A first network device can receive an error. The first network device can generate one or more frames including data indicative of the error. The first network device can broadcast the one or more frames to one or more neighboring network devices. It may be determined that the first network device is inaccessible. The first data can be retrieved and presented from a second network device among the one or more neighboring network devices. In some embodiments, a network management system can utilize the first data to generate a machine learning model that classifies whether network devices are instances of network devices designated for a Return Merchandise Authorization (RMA) process. In some embodiments, the network management system can apply the first data to a machine learning classifier to determine whether to initiate the RMA process for the first network device.