Patents Assigned to Dell Products L.P.
  • Publication number: 20240137209
    Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a request for a secret known by the IHS, and attest the RAC by verifying that the public key exists in a manifest that is configured to store identifying information about a plurality of devices configured in the IHS. The request is signed using a private key of a first asymmetric key pair generated by a Remote Access Controller (RAC). Using a second public key of a second asymmetric key pair, the instructions encrypt the requested secret; and send the encrypted secret to the RAC, wherein the RAC is configured to use the second private key of the second asymmetric key pair to decrypt the encrypted secret.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Sreeram Veluthakkal, Sanjeev S. Dambal, Marshal F. Savage, Jason Matthew Young
  • Publication number: 20240134465
    Abstract: Aspects of this disclosure implement at least one sensor in a user input device with an identifiable user input on an information handling system. A method may include receiving, by an information handling system, an indication that at least one sensor, located on an outward facing surface of a frame housing a user input device, is actuated; comparing, by the information handling system, the indication to an active profile configuration; and identifying, by the information handling system, the indication as an input based on the active profile configuration. Other aspects are also disclosed.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Wong Hin Loong Justin, Kai Leong Wong
  • Publication number: 20240137413
    Abstract: With introduction of RDMA (Remote Data Memory Access) NICs (Network Interface Cards), it may be desirable for a client device to be able to use TCP (Transmission Control Protocol) and RDMA transports over a same RDMA NIC/IP. However, current systems do not support connections with different transport protocols from the RDMA NIC/IP. Accordingly, to solve this issue, embodiments allow a client to use different transports from the same RDMA NIC-IP in parallel. In one or more embodiments, a transport type (e.g., TCP or RDMA) may be added to or embedded in one or more identifiers thereby allowing a client to use an intended transport over a same NIC.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Applicant: DELL PRODUCTS L.P.
    Inventor: Suhas Dattatray MANE
  • Publication number: 20240134671
    Abstract: Disclosed systems and methods may register a first plugin server as a primary server of a cluster management plugin (CMP) for a user interface (UI) of a virtualization platform client and a second plugin server as an auxiliary server of the CMP. The first plugin server may be associated with a first cluster of the virtualization platform and the second plugin server is associated with a second cluster of the visualization platform. The clusters may include one or more multi-node hyperconverged infrastructure (HCI) clusters. The first cluster may be managed by a first instance of a cluster manager while the second cluster may be managed by a second instance of the cluster manager. A CMP manifest, indicative of user interface extension points defined by the CMP, is loaded into a browser from the primary server.
    Type: Application
    Filed: October 30, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Shengli LING, Yuan LI, Wei ZHANG, Zhijing HU
  • Publication number: 20240137263
    Abstract: A system, method, and computer-readable medium for performing a telemetry aggregation operation. The telemetry aggregation operation includes: associating a data center asset from a plurality of data center assets with a data center asset group, the associating being based upon a telemetry information response time of the data center asset; identifying a telemetry aggregation cycle time for the data center asset group; collecting telemetry information from the data center asset of the plurality of data center assets; and, aggregating the telemetry information according to the telemetry aggregation cycle time.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Vijayasimha Reddy Naga, Muralidhar Kolli, Sudhir Vittal Shetty
  • Publication number: 20240134768
    Abstract: An information handling system may include a processor and a program of instructions embodied in non-transitory computer-readable media, the program of instructions configured to, when read and executed by the processor: receive a touch temperature limit parameter indicative of a temperature limit; receive an acoustic noise limit parameter indicative of an acoustic noise limit; determine an estimated power capacity limit parameter indicative of an estimated power limit based on the touch temperature limit parameter and the acoustic noise limit parameter; and determine an estimated performance capability parameter based on the estimated power capacity limit parameter.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Qinghong HE, Balasingh Ponraj SAMUEL, Travis C. NORTH
  • Publication number: 20240137381
    Abstract: Systems and methods are provided for vulnerability proofing the use of an IHS (Information Handling System) in a computing cluster. Notification is received by the IHS of modifications to configurations of a computing cluster that includes the IHS. Vulnerability proofing requirements for computing cluster configurations including the IHS are retrieved from a persistent data storage of the IHS. Based on the vulnerability proofing requirements, catalogs comprising known vulnerabilities of IHS hardware components are accessed. Modifications to the computing cluster configurations are identified as vulnerable in one or more of the catalogs. When modifications to the computing cluster configurations are identified as vulnerable, participation by the IHS in the computing cluster is suspended until the modifications to the computing cluster configurations are changed to include no configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240134765
    Abstract: Disclosed methods and system feature or perform operations including monitoring, within an operating system (OS) environment of an information handling system, telemetry data indicative of values for one or more hardware status parameters and generating any of one or more anomaly alerts responsive to identifying any of one or more anomalous conditions. Responsive to detecting an anomaly alert, an OS-context configuration may be determined based on the hardware status parameters monitored during a timebox associated with the anomaly alert. Responsive to detecting a reset of the information handling system, preboot operations may be performed wherein the pre-boot operations may include configuring the information handling system in accordance with the OS-context configuration and performing one or more hardware diagnostic routines while the information handling system is configured in accordance with the OS-context configuration.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Jacob MINK, Balasingh P. SAMUEL, Travis C. NORTH
  • Publication number: 20240134425
    Abstract: An air shroud may include a plurality of channels including at least a first channel configured to direct airflow driven by one or more chassis-level air movers from outside a chassis enclosing the air shroud into the chassis and into the first channel and a second channel configured to direct airflow driven by the one or more chassis-level air movers from outside the chassis into the chassis and into the second channel, and an opening formed in the air shroud and fluidically configured to be interfaced between the second channel and a shroud air mover such that, when the shroud air mover operates in a plurality of modes comprising a first mode in which the shroud air mover is inactive and a second mode in which the shroud air mover is active, airflow through the second channel is greater in the second mode than in the first mode.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventor: Robert B. CURTIS
  • Publication number: 20240134985
    Abstract: A disaster recovery site storage array causes an instance of a host application or selected executables running on a host server to validate changes to an asynchronously updated replica of a storage object. Snapshots of the replica are generated before and after each set of changes to the replica are received from a remote storage array. Validation is performed by mounting snapshots to the instance of the associated host application and causing the host application instance to validate the data. If a snapshot is determined to be invalid, then the replica to recovered with the most recent known-valid snapshot. Alternatively, if each set of changes is validated prior to being applied to the replica, invalid changes are not applied to the replica. Unvalidated snapshots may be accumulated and validated independently from application of sets of changes to the replica, thereby decoupling validation from replication.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: DELL PRODUCTS L.P.
    Inventors: Yaron Dar, Arieh Don, Krishna Deepak Nuthakki
  • Publication number: 20240134622
    Abstract: A system for network management comprising a silicon management system operating on a processor that causes the processor to load one or more algorithms stored in a non-transient data memory to cause the processor to identify a version for a plurality of silicon data processing devices and to implement an update to one or more of the silicon data processing devices, a chipset management system operating on a processor that causes the processor to load one or more algorithms stored in a non-transient data memory to cause the processor to identify a version for a plurality of chipsets, each chipset associated with one of the silicon data processing devices and to implement an update to one or more of the chipsets and a boot system configured to cause a system associated with the updated silicon data processing devices and the updated chipsets to reboot.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Applicant: DELL PRODUCTS L.P.
    Inventors: Shekar Babu Suryanarayana, Anjali S, Karunakar Poosapalli
  • Publication number: 20240134989
    Abstract: Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include a Baseboard Management Controller (BMC) having computer-executable instructions to, during a boot sequence of the BMC, determine a type of a firmware that is to be booted on the BMC, and selectively restrict access to the resources based upon the determined type of firmware.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Sreeram Veluthakkal, Marshal F. Savage, Eugene David Cho
  • Publication number: 20240134624
    Abstract: Techniques for performing an upgrade can include: defining integration points, each associated with a workflow processing point of an upgrade workflow of an upgrade infrastructure or framework; and performing processing by code of the upgrade infrastructure or framework that performs the upgrade workflow to upgrade a system, wherein the upgrade includes upgrading a first feature, facility or service of the system from a current version to a new version. The processing can include: dynamically determining, at runtime during execution of the upgrade workflow by the code of the upgrade infrastructure or framework, a set of code entities associated with a first of the integration points; executing code corresponding to workflow processing points, wherein a first of the workflow processing points is associated with the first integration point; and in response to said executing reaching the first workflow processing point, invoking each code entity of the set for upgrade processing.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventor: Patricia Lee Allen
  • Publication number: 20240134993
    Abstract: Systems and methods are provided for vulnerability proofing updates to an IHS. An update package is detected that includes configurations for one or more of the hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. The updated configurations of the hardware component that are included in the update package are used to identify any hardware component configurations that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the updated configurations, further booting of the IHS may be disabled until the update package is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240134635
    Abstract: An information handling system may include at least one processor and a memory. The information handling system may be configured to receive a request to upgrade a component from a first version to a second version; perform a first check by determining if allowed source release (ASR) information of the second version includes a reference to the first version; perform a second check by determining if allowed target release (ATR) information of the first version includes a reference to the second version; and in response to either of the first check and the second check being successful, perform the component upgrade.
    Type: Application
    Filed: October 30, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Xueqiang ZHOU, Carl SHI, Shunhua XIE, Xiaofeng ZHANG, Steven CHEN
  • Publication number: 20240134991
    Abstract: Systems and methods are provided for vulnerability proofing the installation of new hardware components in an IHS (Information Handling System). The coupling of a new hardware component to the IHS is detected. A profile is identified that is to be used in provisioning the new hardware component that has been coupled to the IHS. The profile may include various configurations for the coupled hardware component. One or more catalogs are accessed that specify known vulnerabilities of hardware components. Configurations from the profile for the coupled hardware component are used to identify any configuration that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the configuration for the new hardware component, further use of the new hardware component by the IHS is disabled until the profile is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240134653
    Abstract: An embedded controller (EC) of an information handling system is configured to detect and respond to anomalous conditions in which a pre-boot or runtime error has occurred and EC-local storage resources are not sufficient to store EC telemetry data, by redirecting the EC telemetry data through an available communication channel, e.g., SBIOS MBOX packets or ACPI MMIO, to offload the data to EC-external storage such as an ESP partition or Cloud storage. In a pre-boot mode, SBIOS may invoke a UEFI storage driver to write out EC log data to EC-external storage, e.g., SSD/NVMe device or the Cloud. In a runtime mode, the EC may be flagged by an OS bugcheck handler, e.g., via eSPI MMIO path, to save the log data. In an OS-context mode, ACPI methods may notify a persistent driver, e.g., Common Platform Services (CPS) driver, to write out the log to the EC-external storage.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Ibrahim SAYYED, Adolfo S. MONTERO, Bassem ELAZZAMI
  • Publication number: 20240134992
    Abstract: Systems and methods provide vulnerability proofing procedures for booting of an IHS (Information Handling System). A request to boot the IHS is detected. One or more boot configurations are determined that include configurations for operation of one or more of the hardware components of the IHS. One or more catalogs are accessed that specify known vulnerabilities of hardware components. The boot configurations are used to identify any hardware component configurations that have known vulnerabilities that are listed in the catalogs. If known vulnerabilities are identified in the boot configuration, further booting of the IHS may be disabled until the boot configuration is modified to include no configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 18, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore
  • Publication number: 20240134712
    Abstract: In at least embodiment, processing can include: receiving virtual utilizations (VUs) for resources consumed in connection with recording entries in a log for commands or operations, wherein each resource has a corresponding VU which denotes a number of allocated units of the resource associated with entries of the log which have not been flushed from the log; determining a first resource having a maximum VU with respect to VUs of consumed resources; determining whether the maximum VU is within an acceptable VU range, wherein the acceptable VU range has bounds determined in accordance with a maximum deviation threshold associated with the first resource; and responsive to determining the maximum VU is not within the acceptable VU range of the first resource, performing one of a plurality of regulation actions that varies an amount of a system resource to accordingly vary a flush rate of entries from the log.
    Type: Application
    Filed: October 12, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products L.P.
    Inventors: Vladimir Shveidel, Geng Han, Jibing Dong
  • Publication number: 20240135001
    Abstract: Systems and methods are provided for vulnerability proofing the use of machine learning recommendations by an IHS. A machine learning recommendation is detected that provides configurations for one or more of the hardware components of the IHS. Catalogs specifying known vulnerabilities of hardware components are accessed to determine whether any of the hardware configurations from the machine learning recommendations are identified as vulnerable in one or more of the catalogs. If a machine learning recommendation is identified as vulnerable, use of the machine learning recommendation by the IHS is blocked until the recommendation is modified to include no recommended hardware configurations with vulnerabilities identified in the catalogs.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Applicant: Dell Products, L.P.
    Inventors: Raveendra Babu Madala, Santosh Gore