Patent classifications
G06F9/4416
Control of a computer system in a power-down state
Techniques are disclosed relating a computer system in a power-down state receiving a communication from a remote computer system and performing a task indicated by the communication. The computer system in a power-down state performs the task without transitioning from the power-down state into a power-up state. Exemplary tasks performed in the power-down state include uploading one or more files to a remote computer system, downloading one or more files from a remote computer system, deleting one or more files from the computer system, accessing input/output devices, disabling the computer system, and performing a memory check on the computer system.
Default gateway extension
Many hybrid cloud topologies require virtual machines in a public cloud to use a router in a private cloud, even when the virtual machine is transmitting to another virtual machine in the public cloud. Routing data through an enterprise router on the private cloud via the internet is generally inefficient. This problem can be overcome by placing a router within the public cloud that mirrors much of the routing functionality of the enterprise router. A switch configured to intercept address resolution protocol (ARP) request for the enterprise router's address and fabricate a response using the MAC address of the router in the public cloud.
COOKIE-BASED NETWORK LOCATION OF STORAGE NODES IN CLOUD
Techniques are disclosed relating to storing location information about storage nodes in cookies. A cloud-based service may send location requests to an orchestration service that instantiated storage nodes included in a storage cluster of the cloud-based service. The cloud-based service may receive location information that identifies in which computer zone that a given storage node is located. The cloud-based service may store the location information in cookies at a metadata store that is shared among the storage nodes. The cloud-based service may receive, from a client node, a search request to identify ones of the storage nodes that store particular data. The cloud-based service may return a set of cookies corresponding to identified storage nodes. The set of cookies may enable the client node to determine whether there is a storage node that stores the particular data and is within the same computer zone as the client node.
Customizing program logic for booting a system
A technique for generating a customized program logic for booting a target system includes determining the hardware devices operatively connected with the target system. A list of identifiers of the determined hardware devices is sent to a server system. The server system selects from a set of drivers for each of the device identifiers in the list at least one driver operable to control the identified device to generate a sub-set of said set of drivers. The server system retrieves a core program logic being free of any drivers of the target system and sends the core program logic and the driver sub-set to the target system. The target system creates the customized program logic using the combination of the core program logic and the driver sub-set.
RUN-TIME CONFIGURATION LOADING
Configurations for communication interfaces are disclosed. In at least one embodiment, a processor includes one or more circuits to determine a firmware configuration for one or more server components and to transmit the firmware configuration at startup.
NON-VOLATILE MEMORY STORAGE AND INTERFACE
Configurations for communication interfaces are disclosed. In at least one embodiment, a volatile memory bridge provides an interface between a server component and a control entity to receive and transmit a firmware configuration to the server component at startup.
ELECTRONIC SYSTEM AND RELATED METHOD FOR PROVIDING MULTIPLE HOSTS WITH NETWORK CONNECTIVITY AND REMOTE WAKE-UP
An electronic system includes a display device, a first host and a second host. The display device includes a network interface port for connecting to an external network, a first port, a second port, a control unit for recording information associated with a designated network bridge target, and a hub unit for controlling the signal transmission between the network interface port, the first port, the second port and the control unit. The first host is coupled to the first port and configured to activate network bridge function when set as the designated network bridge target, thereby connecting to the external network. The second host is coupled to the second port and configured to connect to the external network using the network bridge function via the second port, the hub unit and the first port.
Onboarding multiple access point (Multi-AP) device using device provisioning protocol (DPP)
This disclosure provides systems, methods and apparatus, including computer programs encoded on computer storage media, for onboarding one or more Multi-AP devices using a device provisioning protocol (DPP) and a Multi-AP communication protocol. In one aspect, a first Multi-AP device may determine, during an onboarding process, DPP configuration information that was derived using the DPP. The first Multi-AP device may establish a Multi-AP network configuration between the first Multi-AP device and a second Multi-AP device using the Multi-AP communication protocol based, at least in part, on the DPP configuration information. In one aspect, the DPP configuration information may be derived remotely by the network operator prior to device deployment. In one aspect, a configurator station (STA) may be delegated as the DPP configurator by the network operator, and may onboard one or more STAs into the Multi-AP network using the DPP and the Multi-AP communication protocol.
Scalable life-cycle maintenance of hardware
Scalable life-cycle maintenance of hardware. In an embodiment, a software-defined Preboot eXecution Environment (PXE) server is executed to receive a request, comprising an identifier, from hardware. The identifier is compared to a plurality of attribute sets. When the identifier does not match any of the attribute sets, a task graph is generated for a PXE process for the hardware, and an initial stage of the task graph is initiated. Otherwise, when the identifier matches one of the attribute sets, the task graph associated with that attribute set is retrieved, and the next stage in the task graph is initiated. In addition, a display key may be used to tether hardware with a user system. Furthermore, hardware may be validated by comparing signatures using a validating operating system, and a boot order of operating systems in the hardware may be changed once the hardware device is validated.
Methods and systems for provisioning and commissioning an industrial gateway
A method of commissioning and provisioning an Industrial Internet of Things (IIOT) gateway that includes sending gateway information to a bootstrapping system and generating a commissioning token using the bootstrapping system. The method also includes storing the commissioning token in the bootstrapping system and associating it with a backend system. The method further includes inputting the commissioning token into the IIOT gateway and communicating the IIOT gateway to the bootstrapping system.