Patent classifications
G06F9/4416
Techniques for processor boot-up
A processor can be configured to access boot firmware from a remote location independent from use of a chipset. After a processor powers-on or reboots, the processor can execute microcode. The microcode will cause the processor to train a link with a remote device. The remote device can provide the processor with access to boot firmware. The processor can copy the boot firmware to the processor's cache or memory. The processor will attempt to authenticate the boot firmware. If the boot firmware is authenticated, the processor executes the copy of the boot firmware.
TECHNIQUES FOR PEER NODE RECOVERY
Techniques for peer node recovery can include: receiving a notification regarding an occurrence of a trigger condition which indicates to perform recovery processing for a first storage device of a first node, wherein the first storage device is used as a boot device for the first node; and responsive to receiving the notification of the trigger condition, performing recovery processing for the first storage device of the first node comprising: performing a network boot of the first node over an internal network connection using a preboot execution (PXE) server of the second node; reimaging the first storage device of the first node using content from a second storage device of the second node, wherein the content includes a bootable partition comprising an operating system; and using the bootable partition of the first storage device of the first node, booting the first node to load and run the operating system.
Extension resource groups of provider network services
At a network manager of an extension resource group of a provider network, a message comprising a command to launch a compute instance is received at an address which is part of a first network configured at a premise external to the provider network. The extension resource group includes a first host at the external premise. Within a second network configured at the external premise, the first host is assigned an address within a second address range. Addresses within the second range are also assigned to hosts within the provider network. The command is transmitted to the first host, and a compute instance is instantiated.
Systems and methods for collecting deep operating system (OS) telemetry
Systems and methods are provided that may be implemented to utilize information from existing OS initialization mechanisms on an information handling system to determine characteristic/s of OS usage, and to record and store these determined characteristic/s as metadata on nonvolatile storage for later retrieval. In one embodiment, the determined characteristics for every given OS boot may be so recorded with information that identifies whether each given OS boot was from a manufacturer or vendor-supplied OEM OS image or from an aftermarket OS image.
APPLICATION INTERFACE AND DATABASE STRUCTURES TO REMOTELY MANAGE BIOS SETTINGS OF AUTOMATED TELLER MACHINES
A method for controlling at least one setting of a basic input output system (BIOS) of at least one automated transaction machine (ATM) can include provisioning features of an active management technology system of a first computing device associated with an ATM. The method can also include establishing an initial trust between the first computing device and a second computing device that is remote from the first computing device, over a serial-over-lan (SOL) connection that is a feature of the active management technology system. The method can also include configuring the setting of the BIOS of the first computing device and storing a schedule for changing the setting of the BIOS. The method can also include reconfiguring the setting of the BIOS in response to the schedule stored on the database over the SOL.
TECHNIQUES FOR PROVIDING CLOUD SERVICES ON DEMAND
Techniques are disclosed for deploying a computing resource (e.g., a service) in response to user input. A computer-implemented method can include operations of receiving (e.g., by a gateway computer of a cloud-computing environment) a request comprising an identifier for a computing component of the cloud-computing environment. The computing device receiving the request may determine whether the identifier exists in a routing table that is accessible to the computing device. If so, the request may be forwarded to the computing component. If not, the device may transmit an error code (e.g., to the user device that initiated the request) indicating the computing component is unavailable and a bootstrap request to a deployment orchestrator that is configured to deploy the requested computing component. Once deployed, the computing component may be added to a routing table such that subsequent requests can be properly routed to and processed by the computing component.
SETTING TERMINAL, SETTING METHOD AND PROGRAM
Provided is a setting management system that makes setting operation of a device efficient. A setting terminal includes a storage unit that stores a scenario of a setting process related to a device to be set, an input unit that is USB connected to the device to be set and inputs information to the device to be set, a progress determination unit that determines a progress of a scenario of a setting process based on timing of an input by the input unit and the scenario stored in the storage unit, and a setting operation unit that inputs, to the device to be set, setting information via the input unit according to the progress of the scenario determined by the progress determination unit.
SYSTEM AND METHOD TO MANAGE STORAGE SYSTEM FOR STARTUP
Methods and systems for managing data for startup purposes in a distributed system are disclosed. The distributed system may include any number of clients operably connected to a storage system via a connection fabric. By virtue of the connection topology, any of the clients may interact with the storage system to gain access to storage resources of the storage system. When a client is provided access to storage resources by the storage system, other clients may not be able to access the storage resources of the storage system.
System and method of setting a configuration to achieve an outcome
A computer-implemented method for managing a graphical user interface for a computer procurement application is disclosed. The graphical user interface is configured to show data related to key performance indicators (KPIs) for an entity and those for a peer group, show recommendations for improving values of the KPIs by adjusting values of configurations associated with the KPIs for the entity based on values of the KPIs and the associated configurations for the peer group in response to a first request, and implement the adjustment in response to a second request.
Hashing values using salts and peppers
In some examples, a management controller includes a communication interface to communicate with a computing device, where the management controller is separate from a processor of the computing device. The management controller includes a management processor to receive, from the computing device, a first hash value that is based on a first hash function applied on an input value and a salt, generate a second hash value based on applying a second hash function on the first hash value and a pepper, and send the second hash value to the computing device.