Patent classifications
G06F9/442
Management controller to bios root of trust bypass implant detection and remediation
An information handling system may include a host system comprising a host system processor, a management controller communicatively coupled to the host system processor and a logic device and configured to perform out-of-band management of the information handling system, and a logic device communicatively coupled to the host system and the management controller. The logic device may be configured to, upon determining that a watchdog timer has timed out a threshold number of times without completion of a boot of the management controller, allow boot of the host system, after boot of the host system, determine if a later boot of the management controller occurs, and if the later boot of the management controller occurs, force the host system to power off.
Microprocessor, and method of managing reset events therefor
A microprocessor comprises at least one reset management module. The at least one reset management module is arranged to detect a reset event, determine if at least one reset condition has been met upon detection of the reset event, and cause at least a part of the microprocessor to remain in a reset state upon determining that the at least one reset condition has been met.
SERVER NODE SHUTDOWN
Example implementations relate to server node shutdown. For example, a server node shutdown can include detecting a secondary power supply integrated into a server node, receiving a primary power supply interruption signal from the secondary power supply, and initiating a sequenced shutdown of the server node in response to receiving the signal using the secondary power supply.
MULTIPLE SIGN CONTROLLER
Embodiments of a multiple sign controller are generally described herein. Many embodiments include a multiple sign controller system. In some embodiments, the multiple sign controller can comprise a computer, a single instance of an operating system configured to run on the computer, two or more virtual sign controller instances, one or more physical communication ports coupled to the computer, and two or more virtual ports configured to run on the single instance of the operating system. In many embodiments, a first virtual port of the two or more virtual ports can be associated with a first virtual sign controller instance of the two or more virtual sign controller instances. Other embodiments may be described and claimed.
Managing unexpected shutdown in a disk drive with multiple actuators and controllers
An event that indicates unexpected shutdown of a hard disk drive is determined. The hard disk includes first and second controllers that control respective first and second independently-operable actuators. Each of the actuators has one or more heads that access one or more spinning disks of the hard disk drive. While receiving power for the hard disk drive via back-electromotive force of a motor driven by the one or more spinning disks in response to the event, the first and second controllers independently move the respective first and second actuators to safe positions. In response to determining the first and second actuators are in safe positions, write cache data associated with the first and second controllers is written to a non-volatile memory.
System and method for detecting computer network intrusions
A method and system for monitoring computer network intrusions, the system comprising at least one security device including a processor and memory. The at least one security device is communicatively coupled to a private network and configured to generate heartbeat pulses comprising operational snapshots of the at least one security device. The system further comprises one or more host systems configured to communicate with the at least one security device from an external network, transmit configuration parameters to the at least one security device, the configuration parameters including instructions for the at least one security device to operate as a given type of network asset, monitor the heartbeat pulse of the at least one security device, determine a change in integrity in the at least one security device based on the monitoring, and send one or more notification messages to a network administrator based on the determination.
Efficient power management of a system with virtual machines
Efficient power management of a system with virtual machines is disclosed. In particular, such efficient power management may enable coordination of system-wide power changes with virtual machines. Additionally, such efficient power management may enable coherent power changes in a system with a virtual machine monitor. Furthermore, such efficient power management may enable dynamic control and communication of power state changes.
Cognitive protection of critical industrial solutions using IoT sensor fusion
A technique for cognitive protection of a system can include digital and analog sensors to measure or calculate operational parameters of a system. Digital sensors may be used to determine measured or primary operational parameters. The analog sensors are used to measure analog sensor information related to operation of the system. Analog sensor information that is measured may be used to calculate secondary operational parameters that includes the same operating parameters as the primary operational parameters. Lockstep analysis may be used to compare the primary operational parameters with the secondary operational parameters so as to determine a discrepancy in the operational parameters in the system.
INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM INFORMATION PROCESSING APPARATUS AND CONTROL METHOD
There is provided a mechanism for invalidating, when an apparatus returns from a high-speed shutdown, authentication identification information issued before the apparatus enters the high-speed shutdown.
Information processing system and information processing method to be executed by information processing system
An information processing system includes a CPU that is configured to output an address and a writing instruction signal instructing to write data to the address or a reading instruction signal instructing to read data from the address, to a selector, the selector that is configured by hardware such that an output destination of data input from the CPU is determined according to the address, the writing instruction signal, and the reading instruction signal, a volatile memory that is configured to store data including snapshot image information and initial setting data for a non-standard device including a register when the information processing system is started, on the basis of a signal output from the selector, and the register that has the same address as an address of a memory region of the volatile memory storing the initial setting data.