G06F9/44505

Adjusting wireless docking resource usage

Adjusting wireless docking resource usage, including identifying, at a client information handling system (IHS), a configuration policy, the client IHS wirelessly connected to a docking station, the docking station providing wireless connections to peripheral computing components, respectively; processing, at the client IHS, the configuration policy, including identifying configuration rules of the configuration policy for performing computer-implemented actions of throttling resource utilization between the client IHS and the docking station; identifying, at the client IHS, when the client IHS is wirelessly connected to the docking station, a first presence state of a user with respect to the client IHS; and determining, at the client IHS, that the first presence state indicates that the user of the client IHS is not actively engaged with the client IHS, and in response, applying the configuration rules to perform computer-implemented actions of throttling resource utilization between the client IHS and the docking station.

Atomic groups for configuring HCI systems
11593141 · 2023-02-28 · ·

An information handling system may include at least one processor, and a non-transitory memory coupled to the at least one processor. The information handling system may be configured to execute a configuration procedure to set up a plurality of information handling resources of the information handling system, and wherein the configuration procedure includes a plurality of logical groups related to different types of configuration. Each logical group may include one or more atomic groups, each atomic group including a plurality of logically related atomic operations. In response to a failure of a particular atomic operation of a particular atomic group, the information handling system may be configured to roll back the particular atomic operation and allow the configuration procedure to be restarted at a beginning of the particular atomic group.

Configuration optimization with performance prediction
11593142 · 2023-02-28 · ·

An information handling system may include at least one processor; and a non-transitory memory coupled to the at least one processor. The information handling system may be configured to: execute a plurality of virtual machines having workloads associated therewith; during selected times, apply a plurality of configuration settings relating to the at least one processor while executing the workloads of the plurality of virtual machines; track a plurality of performance metrics relating to the at least one processor during the selected times; and predictively determine a selected one of the plurality of configuration settings that is predicted to improve performance of the workloads.

SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS
20180004957 · 2018-01-04 ·

A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first device. The processing hardware retrieves a secret value from secure storage hardware operatively coupled to the processing hardware. The processing hardware derives a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key. The first device then sends the validator to the second device.

MONITORING AND CONTROL SYSTEM USING CLOUD SERVICES

A system includes a computer processor located within a cloud system. The system receives data from a sensor associated with an industrial or home automation control application. The sensor is configured to monitor a first condition of a device. The computer processor analyzes the data, and transmits a software update or software download from the cloud system to the industrial or home automation control application based on the data analysis.

METHOD AND SYSTEM FOR IMPLEMENTING AN OPERATING SYSTEM HOOK IN A LOG ANALYTICS SYSTEM

Disclosed is a system, method, and computer program product for implementing a log analytics method and system that can configure, collect, and analyze log records in an efficient manner. An improved approach is provided for identifying log files that have undergone a change in status that would require retrieve of its log data, by including a module directly into the operating system that allows the log collection component to be reactively notified of any changes to pertinent log files.

COMPUTER SYSTEM AND METHOD FOR CONTROLLING OPERATING FREQUENCY OF PROCESSOR

A computer system including a PCH (platform controller hub), a CPLD (complex programmable logic device), a first switch and a processor, and a control method are provided to control the operation frequency of the processor. The CPLD is coupled to the PCH and the first switch. The processor is coupled to the first switch. The PCH produces and outputs a second control signal according to the first firmware and a first control signal from a command input unit. The CPLD produces and outputs a third control signal according to the second firmware and the second control signal. The first switch receives the third control signal and is turned on to output a triggering signal when the third control signal is valid. The processor includes a PROCHOT pin. The processor receives the triggering signal and triggers the PROCHOT pin for frequency control.

MEDIA EFFECTS SYSTEM

In accordance with one embodiment, a method can be implemented that includes accessing a first data file associated with a first media application program, wherein the first data file includes a first identifier associated with a first designer-specified variable for controlling the first media application program; accessing a second data file associated with a second media application program, wherein the second data file includes a second identifier associated with a second designer-specified variable for controlling the second media application program; receiving with a computer processor the first designer-specified variable; receiving with the computer processor the second designer-specified variable.

METHOD AND SYSTEM FOR SHARING METADATA BETWEEN INTERFACES
20180013859 · 2018-01-11 ·

A system communicates a client application and a web application and receives configuration data operable within the web application and the client application. The system distributes the configuration data to the client application and the web application. The distributed configuration data is then used to configure the client application and the web application

User-Centric Widgets and Dashboards
20180011625 · 2018-01-11 · ·

User-centric widgets and dashboards are automatically modified to reflect a user's goals and needs.