Patent classifications
G06F9/441
Configuration of a virtual private network server
A method including retrieving, by a processor associated with a virtual private network (VPN) server, an initial operating system stored in a non-volatile memory, the initial operating system being associated with the VPN server providing VPN services; storing, by the processor, the initial operating system in a volatile memory; executing, by the processor, the initial operating system from the volatile memory to obtain a VPN operating system; storing, by the processor, the VPN operating system in the volatile memory; and executing, by the processor, the VPN operating system from the volatile memory to provide the VPN services. Various other aspects are contemplated.
Policy driven latency control applied to a vehicular real time network apparatus
A system includes a real-time partitioning separation kernel installed on a multi-core processor. Guest operating systems are hosted with in hardware virtualized machines in the cores. Another hardware virtualized machine performs a real-time USB-CAN interface communicatively coupled to distributed electronic control units which acquire data and command actuators. A plurality of hardware virtualized machines support processes of various criticality. A secure shared memory serves as the communication means between processes performing different levels of functionality at suitable latency ranges. a policy to distinguish, allocate, and distribute clock, memory, and input/output resources to meet focused latency ranges to the Observation, Decision, and Execution processes. Remaining resources have diffuse latency ranges made available to the Observation, Decision, and Execution processes in an as available but guarded minimum and maximum buffet. A latency policy ensures that each process receives its minimum tranche before queueing for up to the maximum at the resource buffet.
Systems and methods for host image transfer
Methods and systems for transferring a host image of a first machine to a second machine, such as during disaster recovery or migration, are disclosed. In one example, a first profile of a first machine of a first type is compared to a second profile of a second machine of a second type different from the first type, to which the host image is to be transferred. The first and second profiles each comprise at least one property of the first type of first machine and the second type of second machine, respectively. At least one property of a host image of the first machine is conformed to at least one corresponding property of the second machine. The conformed host image is provided to the second machine, via a network. The second machine is configured with at least one conformed property of the host image.
MOBILE DEVICE WITH SECURE PRIVATE MEMORY
A mobile device can detect an idle state and, in response, initiate an access monitoring function to covertly monitor activity involving a human interaction with the mobile device. The covert monitoring is undetectable by a user of the mobile device. The mobile device can then detect a human interaction with the mobile device and, in response, cause the mobile device to covertly capture and log one or more human interactions with the mobile device. An authorized user of the mobile device is enabled to review the log of human interactions with the mobile device.
SYSTEM-ON-CHIP OPERATING MULTIPLE CPUS OF DIFFERENT TYPES, AND OPERATION METHOD FOR SAME
A system-on-chip (SoC) for operating a plurality of different central processing units and a method for operating the same are provided. The SoC includes a plurality of central processing units (CPUs) that execute respective software programs independently of each other, a bus interconnector for connecting the plurality of CPUs, and at least one access control device that is connected to the bus interconnector and controls each access to a physical resource shared by the plurality of CPUs via the bus interconnector, for each CPU.
IN-VEHICLE INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND COMPUTER PROGRAM
Provided is an in-vehicle information processing apparatus capable of continuously executing an application program run on an OS even while that OS is restarting, a control method, and a computer program. An in-vehicle information processing apparatus according to the present embodiment is installed in a vehicle and includes a control unit that controls a plurality of operating systems (OSs) running on common hardware, wherein the control unit determines whether or not the plurality of OSs need to be restarted, in a case in which the control unit determines that one OS needs to be restarted, runs an application program running on the one OS on another OS different from the one OS, restarts the one OS, and after restart is complete, runs the application program running on the other OS on the one OS.
Information processing apparatus, method of controlling information processing apparatus, and storage medium
An information processing apparatus includes a storage unit configured to store at least a first boot program and a second boot program corresponding to the first boot program, a controller configured to read and execute a program, detect, in accordance with occurrence of a read error at reading of the first boot program, an address of a storage area storing a program in which the read error has occurred in the first boot program, and specify, from an address of a storage area storing the second boot program, an address corresponding to the detected address. The controller reads and executes the second boot program stored in the specified address.
Software deployment over communication fabrics
Software configuration deployment techniques for disaggregated computing architectures, platforms, and systems are provided herein. In one example, a method includes presenting a user interface configured to receive instructions related to deployment of software to compute units, and receiving user selections of a software element for deployment to a compute unit comprising a processing element and a storage element. Responsive to the user selections, the method includes instructing a management processor of a communication fabric to deploy the software element for use by the compute unit by at least establishing a first partitioning in the communication fabric between the management processor and the storage element, deploying the software element to the storage element using the first partitioning, de-establishing the first partitioning, and establishing a second partitioning in the communication fabric between the processing element and the storage element comprising the software element, wherein the processing element operates using the software element.
MULTI-BOOT SYSTEM AND METHOD FOR A BASEBOARD MANAGEMENT CONTROLLER (BMC)
An Information Handling System (IHS) includes multiple hardware devices, and a baseboard Management Controller (BMC) in communication with the plurality of hardware devices. The BMC includes executable instructions for beginning execution of a first BMC firmware stack, and during execution of the first BMC firmware stack, halt execution of the first BMC firmware stack, and begin execution of a second BMC firmware stack. At least a portion of the executable instructions used to generate the first BMC firmware stack are different than the executable instructions used to generate the second BMC firmware stack.
Electronic apparatus and control method thereof
An electronic apparatus includes: a memory; a storage configured to store a first operating system; and a processor configured to: perform booting by loading the first operating system stored in the storage to the memory, and store data, obtained based on the first operating system running, in the storage, load an obtained second operating system and the data stored in the storage to the memory, identify operation compatibility between the second operating system and the data loaded to the memory, perform booting by loading the second operating system to the memory, based on identification of normal operation compatibility, and perform booting by loading the first operating system to the memory, based on identification of abnormal operation compatibility.