Abstract: A computer identifies a group of players that are participating in a gaming session that is hosted by the computer. The computer identifies the location of an avatar of a first player included in the group of players. The computer identifies the location of a second avatar of a second player included in the group of players and determining the proximity between the first avatar and the second avatar. The computer determines if the proximity exceeds a threshold. Responsive to the determination that the proximity does not exceed the threshold, the computer sends data for the gaming session to the first player and the first player passes that data to the second player.
Abstract: According to one embodiment, a computer program embodied on a tangible computer readable medium includes computer code for identifying a wireless communications gateway in communication with a management controller, computer code for establishing a wireless communications connection between one or more drives and the management controller, utilizing the wireless communications gateway, and computer code for communicating one or more of monitoring data and control data between the management controller and the one or more drives, utilizing the wireless communications connection.
Abstract: An apparatus includes a root port for coupling to a root complex, and a plurality of endpoint ports for coupling to endpoint devices, wherein each endpoint port is associated with a function number. A downstream buffer queues transaction layer packets (TLPs) received from the root port, wherein each TLP in the downstream buffer is directed to an endpoint port associated with the identified function number. An upstream buffer queues TLPs received from each endpoint port, and directs the queued TLPs to the root port. A method includes associating a function number with each endpoint port of a switch, wherein each endpoint port is adapted for coupling to an endpoint device. The method further includes receiving a first TLP from a root complex, identifying a function number within the first TLP, and directing the first TLP to an endpoint device through the endpoint port associated with the identified function number.
Abstract: A computer-implemented method includes: connecting, by a network device, with a user device via an alternate communications network; and providing, by the network device to the user device and via the alternate communications network, network credentials used for wireless access to a primary communications network, wherein the primary communications network and the alternate communications network are different.
Abstract: Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch detects packets sent by a new or migrated virtual machine, and sends a copy of a detected packet to the network control software as a notification. The switch further learns the source MAC address, thereby permitting the entry to be used for normal forwarding prior to validation of the entry and the VM associated therewith by the network control software. Until the network control software has validated the VM, the switch may periodically retry the notification to the network control software. “No_Redirect” and “Not_Validated” flags may be used to indicate whether a notification has already been attempted and thus no retry is necessary, and that the VM associated with the VM has not yet been validated, respectively.
Abstract: An apparatus includes one or more processor core, trusted key store, memory controller, and a memory module. The memory controller includes an encryption/decryption module that encrypts data being stored to the memory module for a guest OS being executed by the processor core(s) and that decrypts data being read from the memory module for the guest OS. Data owned by the guest OS is encrypted and decrypted by the encryption/decryption module using an encryption key stored by the trusted key store in association with the guest OS. A method encrypts data owned by the guest OS using the encryption key assigned to the guest OS and stores the encrypted data on a memory module, wherein the encrypted data is stored in association with the process identifier of the guest OS, and decrypts the encrypted data using the guest OS encryption key and provides the decrypted data to the guest OS.
Abstract: Detecting electrostatic discharge (“ESD”) events in a computer system, includes: determining, from an ESD detector installed in the computer system, that an ESD event has occurred; identifying a component of the computer system within a predefined proximity to the ESD detector as possibly affected by the ESD event; and notifying a user of the computer system of the component possibly affected by the ESD event.
Abstract: A method of accessing a trusted platform module in a computing device is disclosed. The method includes storing a platform authorization key in a memory of the computing device that includes the trusted platform module. The platform authorization key includes permitting access to the trusted platform module. The method includes obtaining a digital signature in response to the computing device requesting access to the trusted platform module. The digital signature is generated using at least a command for configuring the trusted platform module. The method includes verifying the digital signature and allowing retrieval of the platform authorization key from the memory of the computing device in order to access the trusted platform module in response to the digital signature is verified, and denying retrieval of the platform authorization key otherwise.
Abstract: Managing a manufacturer's business plan in real-time, a computer receives real-time quality data associated with a measure of component quality from supplier of the component incorporated in a manufacturer product. The computer receives real-time quality data associated with a measure of product quality from the manufacturer. The computer determines a statistical trend in the received supplier real-time quality data. If supplier real-time quality data exceeds a quality target metric for the supplier, exceeds a quality target metric for the component, or the statistical trend exceeds a threshold value, the computer analyzes financial impact to the manufacturer using supplier real-time quality data, manufacturer real-time quality data, historical quality data of supplier and manufacturer, and manufacturer's business plan.
Abstract: A method for providing over-heating protection of a target device within an information processing system is disclosed. A determination is made whether or not a power status of the information processing system is set to turn on a main power of a power supply device. If the power status of the information processing system is set to turn on a main power of a power supply device, a power switch of the target device is turned on; otherwise, another determining is made whether or not the target device is set to operate based on a user's setting. If the target device is set to operate based on the user's setting, the power switch of the target device is turned on; otherwise, the power switch of the target device is turned off.
Abstract: A system and method are provided for passing a data file from a software utility to a service processor. The method includes loading, using a processor, an interrupt handler and runtime code during initialization of a computer before booting an operating system; requesting, using a processor, that the operating system transfer a data file via an interface; and transferring, using a processor, the data file to an area accessible to the runtime code. The method further includes requesting, using a processor, that the interrupt handler pass the data file to a service processor. Still further, the method includes passing, using a processor, the data file from the accessible area to the service processor via a memory-mapped input/output window of the service processor, wherein the data file is transferred to the service processor without waiting for a system reboot.
Abstract: According to one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to determine a write rate for the media storage device or a portion thereof based on one or more factors, the write rate ranging from zero to a maximum possible write rate for the media storage device or the portion thereof. The logic is also configured to cause the processor to receive a write request to write data to the media storage device or the portion thereof and write the data to the media storage device using the determined write rate. Other systems, methods, and computer program products for defending against ransomware attacks are presented according to more embodiments.
Abstract: Profiling operating efficiency deviations of a computing system includes: generating a profile of expected operating efficiency for a computing system in an ideal configuration; for each of a plurality of alternative configurations of the computing system, wherein each of the alternative configurations includes a variation of the ideal configuration that introduces a deviation in operating efficiency of the computing system, said variation comprising a root cause of the deviation: monitoring operating efficiency of the computing system identifying, from the monitored operating efficiency, a deviation of operating efficiency from the expected operating efficiency; and recording, in a data structure, an association of the deviation and the root cause of the deviation.
Abstract: Apparatuses, systems, methods, and program products are disclosed for cache replacement. An apparatus includes a cache memory structure, a processor, and memory that stores code executable by the processor. The code is executable by the processor to receive a value to be stored in the cache memory structure, identify, in response to determining that the received value is not currently stored in an entry of the cache memory structure, a least recently used (“LRU”) set of entries of the cache memory structure where the received value can be stored, and select a least frequently used (“LFU”) entry of the identified LRU set of entries for storing the received value.
Abstract: A method of determining power fault information using a voltage regulator-down (VRD) device having a fault-pin output. The method may include receiving a fault indication from one of a plurality of fault detection devices, correlating the received fault indication with a timing signal having a predetermined time duration, applying a voltage change on the fault-pin output of the VRD device for the predetermined time duration corresponding to the timing signal, and applying the voltage change on the fault-pin output to a plurality of fuses. Based on the predetermined time duration associated with the applied voltage change, the plurality of fuses may be blown according to a binary pattern indicative of a fault type associated with the fault indication.
Abstract: An apparatus, a method, a system, and computer program product are disclosed for link aggregation group management. A method includes receiving an identifier from a device connected to a first port of a first switch, determining whether a second switch has a connection to the device on a first port of the second switch based on the identifier for the device, and autonomously configuring a link aggregation group comprising the first port of the first switch and the first port of the second switch in response to determining that the device is connected to the first port of the first switch and the first port of the second switch.
Abstract: Embodiments of the present invention provide a method, system and computer program product for frequent content retrieval in a content browser. In an embodiment of the invention, a method for frequent content retrieval in a content browser is provided. The method includes retrieving requested content from a content server from over a computer communications network and comparing the retrieved requested content to a cached version of the requested content. The retrieved requested content thereafter can be annotated to visually emphasize a frequently accessed portion of the retrieved requested content in response to a threshold difference between the retrieved requested content and the cached version. Finally, the annotated retrieved requested content can be returned to a content browser for display therein.
Abstract: Systems and methods for maintaining operating consistency for multiple users during firmware updates. According to an aspect, a method includes receiving, at a predetermined time interval, a request from one or more users of an application to carry out a result on a computing device. The method also includes analyzing a plurality of sessions of the application on the computing device servicing one or more users. The method also includes determining if one of the plurality of sessions contains an updated data. Further, the method includes creating at least one of a plurality of consistency groups based on the updated data. Further, the method includes updating, after the predetermined time interval, the application based on the at least one of the plurality of consistency groups.
Abstract: Automatically cooling computer system components for safe servicing includes: determining that a target component of a plurality of components is to be serviced; and reducing temperature of one or more components of said plurality of components if such one or more components exceeds a threshold temperature and such one or more components are within a predefined area of the target component.
Abstract: A storage-area network (SAN) manager running on a computing device connected to a fabric receives a request to allocate and mount a logical volume on a client computing device connected to the fabric. The manager groups storage drives connected to the fabric by failure domains. The manager filters the storage drives by native capabilities, available capacities, and dynamic performance to remove from consideration any storage drive having insufficient native capabilities, an insufficient available capacity, and/or an insufficient dynamic performance to satisfy the request. The manager selects a set of storage drives on which to store data of the logical volume, from the remaining storage drives, taking into account the failure domains. The manager sends a command to each such storage drive to provision a drive volume, and a command to a software agent on the client device to create and mount the logical volume using these drive volumes.