Match Document Document Title
8713299 System and method for configuring software applications in a motor vehicle  
A system and method for allowing a user to select and manage software applications in their vehicle from any Internet enabled device and allows the user to remotely configure the content of each...
8706918 External environment sensitive predictive application and memory initiation  
An input tracker learns relationships between end user inputs made at a computer and external environment conditions sensed at the computer by external environment sensors integrated in the...
8707018 Managing initialization of file systems  
A method is used in managing initialization of file systems. Activity of file systems is monitored. The file systems include a first and second set of file systems. Based on activity of the file...
8707017 Method and system for managing core configuration information  
Embodiments of a method and system for managing a system are disclosed herein. The method and system provides a means to permanently and/or securely store core system configuration information so...
8700831 Automated classification of computer configuration using rule set  
A method, computer system and computer program product for generating a configuration status of a computer is provided. A method for generating a configuration status of a computer includes...
8700895 System and method for operating a computing device in a secure mode  
A computing device operates in a secure operating mode in response to user selection. Computer hardware is initialized to verify a bootloader of an operating system, and the bootloader verifies...
8700875 Cluster view for storage devices  
One or more techniques and/or systems are provided for generating a macroscopic cluster view of storage devices, as opposed to merely an isolated view from an individual node. For example, nodes...
8700888 Specific-purpose client with configuration history for self-provisioning of configuration and obviating reinstallation of embedded image  
Examples of specific-purpose local clients are provided for self-provisioning of configurations and for obviating reinstallation of entire windows-based embedded images onto the specific-purpose...
8694762 Secure boot with trusted computing group platform registers  
Disclosed is a method that includes providing at least two platform configuration registers, where a first platform configuration register is a measurement platform configuration register and...
8694763 Method and system for secure software provisioning  
A method and system for the provisioning of software that enable large scale installation and management of software in computer units in a highly secure manner. The BIOS of the target computer...
8694915 Enhanced telephony computer user interface allowing user interaction and control of a telephone using a personal computer  
Enhanced telephony computer user interfaces seamlessly integrate and leverage the features of personal computers and telephones. The manner in which media is presented at a computing system can...
8694690 External evironment sensitive predictive application and memory initiation  
An input tracker learns relationships between end user inputs made at a computer and external environment conditions sensed at the computer by external environment sensors integrated in the...
8694766 Device bootup from a NAND-type non-volatile memory  
Systems and methods are provided for using a NAND-type non-volatile memory (“NVM”), such as NAND flash memory, to store NV pre-boot information for a bootloader (e.g., a second state bootloader)...
8694684 Systems and methods of symmetric transport control protocol compression  
A method for compressing a stream of application layer network traffic communicated over a transport layer connection of a virtual private network connection between a client and a server using an...
8694764 Multi-phase resume from hibernate  
Resume of a computing device from hibernation may be performed in multiple phases. Each phase may partially restore a state of the computing device to an operational state and may establish an...
8694761 System and method to secure boot both UEFI and legacy option ROM's with common policy engine  
In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are...
8688965 System and method for increasing platform network boot efficiency  
Embodiments of the invention involve decreasing boot time by utilizing virtualization or partitioning techniques. In an embodiment, a hypervisor/platform partition controls the platform access to...
8688967 Secure booting a computing device  
A method and an apparatus for executing codes embedded inside a device to verify a code image loaded in a memory of the device are described. A code image may be executed after being verified as a...
8689284 Method of customizing a standardized IT policy  
A system and method are described herein for standardizing an IT policy that is used to configure devices operating on a network. An IT policy can be generated that applies to a group of users or...
8683191 Reconfiguring a secure system  
Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The...
8683424 Bridging the gap between high level user requirements and availability management framework configurations  
Configuration requirements for an Availability Management Framework (AMF) configuration are generated from high level user requirements that specify a subset of properties of an AMF configuration....
8682799 Method and system for port licensing in switches  
Method and system for setting port licenses in a switch is provided. The method includes receiving a command from a user for adding a license for a port; reading a licensing table; checking if a...
8683086 Universal remote control with automated setup  
A remote control of the present invention automatically identifies one or more peripheral devices which need to be programmed with the remote control. In some embodiments, the remote control is...
8683186 Information device storing state restoration software  
An information device has a storage medium storing information items which includes a first program provided on a first partition, a second program and data provided on a second partition to...
8683189 On-chip security method and apparatus  
A boot method an apparatus are described which reduce the likelihood of a security breach in a mobile device, preferably in a situation where a reset has been initiated. A predetermined security...
8683212 Method and system for securely loading code in a security processor  
Securely loading code in a security processor may include autonomous fetching an encrypted security data set, which may comprise security code and/or root keys, by a security processor integrated...
8683571 System and method for authentication of users in a secure computer system  
A system and method for authenticating a user in a secure computer system. A client computer transmits a request for a sign-on page, the secure computer system responds by transmitting a prompt...
8677112 Automatic notification based on generic storage framework  
According to one general aspect, a method may include associating a configuration value with at least one machine executable activity. The method may also include detecting that the configuration...
8677111 Booting devices using virtual storage arrays over wide-area networks  
Virtual storage arrays consolidate data storage at a data center for physical and virtual computer systems at one or more branch network locations. Standalone and virtualized computer systems at a...
8677110 Termination-log acquiring program, termination-log acquiring device, and termination-log acquiring method  
A client terminal receives, in response to a boot command issued by a user to boot the client terminal, a first start command to start monitoring. The client terminal acquires first time...
8677108 Method for finding next component to be booted based on booting status of current component to continue booting process by using a component look-up table  
A method to allow a device to boot in a secure fashion, even though some of the components within the secure device's firmware may not be present, not correctly authorized, or not correctly operating.
8677117 Remote management of boot application  
Systems and arrangements for remotely selecting a bootable image via a WOL packet for a wake-on-LAN (WOL) capable computer are contemplated. Server-side embodiments include hardware and/or...
8677109 Non-volatile memory device adapted to identify itself as a boot memory  
Non-volatile memory devices and methods of their operation are provided. One such non-volatile memory device has an interface and a control circuit. The non-volatile memory device is adapted to...
8671253 Facilitation of simultaneous storage initialization and data destage  
Various embodiments for storage initialization and data destage in a computing storage environment are provided. At least a portion of data on a storage device is initialized using a background...
8671228 System and methods for managing virtual adapter instances  
System and method for managing a virtual adapter instance associated with a physical adapter is provided. The method includes configuring a monitoring module for detecting change in configuration...
8671227 Card and host apparatus  
A host apparatus, into which a card having a nonvolatile semiconductor memory is inserted, issues a check command to the card. The check command instructs to send information on whether the card...
8671270 System connected to a memory for storing an extended firmware having a bios emulator in which the bios emulator is overwritten using a interruption vector for handling a bios call  
A computer system including no basic input/output system (BIOS) for operating bootstrap used in initial activation of a legacy operation system is allowed to perform booting of legacy operation...
8671166 Methods and systems for deploying hardware files to a computer  
A method and system may include deploying a base system image to a computer, identifying a hardware device associated with the computer, and analyzing an archive comprising a node and a hardware...
8667610 Portable computer and charging method thereof  
A portable computer and a charging method thereof are provided. The portable computer includes a charge integrated circuit (IC), a basic input/output system (BIOS) and embedded controller (EC), a...
8667262 Information processing apparatus and its control method  
An information processing apparatus includes: a first recording medium that stores a first system controller for allowing to execute boot processing of the information processing apparatus and is...
8667261 Systems, methods, and apparatus for utility meter configuration  
Systems, methods, and apparatus for configuring utility meters are provided. A meter configuration application may be executed by a device that includes one or more computers and that facilitates...
8661237 System and method for booting a plurality of servers from a shared boot image stored on a USB boot image sharer  
A computer system and an operation system loading method thereof are provided. The computer system comprises a universal serial bus (USB) storage device storing a boot image, servers and a boot...
8661238 Identifying an OS corresponding to an address included in a magic packet and determining whether activation of the OS is permitted  
To activate respective OSs separately through a network even in a virtual machine in which a plurality of OSs are installed, an M-packet acquiring unit acquires a received magic packet. An address...
8661235 Firmware storage medium with customized image  
In at least some embodiments, a computer system includes a processor and a firmware storage medium in communication with the processor. The firmware storage medium stores a default image invoked...
8661233 System configuration  
Embodiments provide methods, systems, and articles of manufacture for determining a configuration for system board based on a connector. The connector may have a structure that enables a system...
8656148 Device information collecting method and system in computer system  
The invention discloses a device information collecting method in a computer system including the following steps: booting a computer system and entering an operating system; executing a...
8655978 Diskless PC network communication agent system  
A diskless PC network communication agent system includes a host, a network communication agent, a physical network connecting the network communication agent to the host, and diskless PCs...
8656146 Computer system comprising a secure boot mechanism  
A secure boot processing may be accomplished on the basis of a non-volatile memory that is an integral part of the CPU and which may not be modified once a pre-boot information may be programmed...
8656143 Variable clocked heterogeneous serial array processor  
A serial array processor may have an execution unit, which is comprised of a multiplicity of single bit arithmetic logic units (ALUs), and which may perform parallel operations on a subset of all...
8656204 Security device meant to be connected to a processing unit for audio/video signal and method using such a device  
Example embodiments relate to a security device having two communication interfaces sharing at least one pin, each interface being capable of operating according to either of two predetermined...