Patent application number | Description | Published |
20080229576 | Propagating Pin Corrections Through Physically Mating Devices - Propagating pin corrections through physically mating devices including bending one of a plurality of connectors of a first mating device; and mating the first mating device having the bent connector with an unmodified second mating device; wherein the mating of the first mating device and the unmodified second mating device bends a connector corresponding to the bent connector of the first mating device. | 09-25-2008 |
20080256370 | Intrusion Protection For A Client Blade - Receiving, by a blade management module from a client blade, notification of a loss of communications between a remote desktop apparatus and the client blade; responsive to the notification, accepting, by the blade management module from the remote desktop apparatus, an instruction to alter a power setting of the client blade; and; responsive to the instruction, altering, by the blade management module, the power setting of the client blade. | 10-16-2008 |
20090064338 | PROXIMITY SENSITIVE BLADE SERVER SECURITY - Embodiments of the present invention address deficiencies of the art in respect to blade server security and provide a method, system and computer program product for proximity sensitive blade server security. In one embodiment of the invention, a method for proximity sensitive blade server security can be provided. The method can include sensing proximity of a systems administrator relative to a blade center, detecting a loss of proximity of the systems administrator, and triggering automated securing of at least one blade server in the blade server in response to detecting the loss of proximity. For example, sensing proximity of a systems administrator relative to a blade center can include establishing a wireless radio connection with a personal article associated with the systems administrator, and determining a loss of proximity when the connection is lost. | 03-05-2009 |
20100024001 | Securing Blade Servers In A Data Center - Securing blade servers in a data center, the data center including a plurality of blade servers installed in a plurality of blade server chassis, the blade servers and chassis connected for data communications to a management module, each blade server chassis including a chassis key, where securing blade servers includes: prior to enabling user-level operation of the blade server, receiving, by a security module, from the management module, a chassis key for the blade server chassis in which the blade server is installed; determining, by the security module, whether the chassis key matches a security key stored on the blade server; if the chassis key matches the security key, enabling, by the security module, user-level operation of the blade server; and if the chassis key does not match the security key, disabling, by the security module, operation of the blade server. | 01-28-2010 |
20100115252 | AUTOMATED FIRMWARE RECOVERY - According to one embodiment, a corrupted network hardware device may be automatically inspected and repaired. A default boot sequence may be suspended, and an external recovery device may inspect and repair the corrupted code by selectively repairing files and configuration settings in a minimally invasive manner, to preserve as many user settings as practicable. The network hardware device may then be re-booted from the repaired firmware. | 05-06-2010 |
20110058674 | Secure Communication Of Information Over A Wireless Link - Secure communication of information over a wireless link with apparatus including a blade management module and a plurality of blade servers, the blade servers connected for data communications with the blade management module through at least one wired link, the blade servers also connected for data communications with the blade management module through at least one wireless link, including sharing an encryption key between the blade management module and one or more of the blade servers only through the at least one wired link connecting the blade management module to the one or more blade servers; encrypting information by the blade management module with the encryption key; transmitting the encrypted information by the blade management module to the one or more blade servers through the at least one wireless link; and decrypting the encrypted information by the blade server with the encryption key. | 03-10-2011 |
20110075666 | Autoconfiguration Of An IPv6 Component In A Segmented Network - Autoconfiguration of an IPv6 component in a segmented network including receiving an IPv6 packet; determining whether the received IPv6 packet is a router advertisement or a router solicitation; if the received IPv6 packet is a router advertisement, then retrieving through an out-of-band link a MAC address for the IPv6 component, removing a MAC address of a sending router, inserting in the packet instead an internal MAC address for forwarding packets to the IPv6 component, removing a multicast destination MAC address, inserting in the packet the destination MAC address of the IPv6 component, and forwarding the packet to the IPv6 component as a unicast message; if the received IPv6 packet is a router solicitation, then removing the MAC address of the sending IPv6 component, inserting in the packet instead an external MAC address for forwarding packets to the router, and forwarding the packet to the router as a multicast message. | 03-31-2011 |
20110138095 | PROVIDING EXPANSION CARD SETTINGS - Settings are provided by a chassis management controller to an expansion card in a multi-slot server chassis. The chassis management controller in a multi-slot server chassis provides an operating parameter to a server management controller in a server, and the server management controller writes the operating parameter to a port expander of an expansion card installed on the server. The operating parameter is written to the port expander prior to expansion card power up, and the expansion card uses the operating parameter after power up to derive one or more SERDES value. The SERDES value is used to program an ASIC chip comprising a SERDES converter on the expansion card. In one example, the operating parameter is determined by the capabilities of a chassis midplane at the slot where the compute node is installed. | 06-09-2011 |
20130086248 | Managing Stability Of A Link Coupling An Adapter Of A Computing System To A Port Of A Networking Device For In-Band Data Communications - Managing stability of a link coupling an adapter of a computing system to a port of a networking device for in-band data communications, the adapter and the network device coupled for out-of-band data communications to a management module, where link stability is managed by: monitoring link health including retrieving adapter link statistics from the adapter and networking device link statistics from the networking device; determining, in dependence upon the adapter and networking device link statistics, whether the link health meets predefined health acceptability criteria; and if the link health does not meet predefined health acceptability criteria, instructing the adapter to execute one or more predefined corrective actions. | 04-04-2013 |
20130220423 | Responding To Moisture At One Or More Zones Around An Outer Surface Of A Liquid-carrying Pipe - Methods, apparatuses, and computer program products for responding to moisture at one or more zones around an outer surface of a liquid-carrying pipe are provided. Embodiments include monitoring, by a moisture correction controller, a plurality of moisture sensors, each moisture sensor configured to detect moisture at a separate zone around the outer surface of the liquid-carrying pipe; based on the monitoring of the plurality of moisture sensors, calculating and tracking, for each zone, a level of moisture detected by a moisture sensor; based on the tracked levels of moisture detected at the zones, selecting, between condensation or a leak from within the liquid-carrying pipe as a source of the moisture detected at the zones around the liquid-carrying pipe; and administering a corrective action based on the selection of the source of the moisture detected at the zones around the liquid-carrying pipe. | 08-29-2013 |
20140245595 | PROPAGATING PIN CORRECTIONS THROUGH PHYSICALLY MATING DEVICES - Propagating pin corrections through physically mating devices including bending one of a plurality of connectors of a first mating device; and mating the first mating device having the bent connector with an unmodified second mating device; wherein the mating of the first mating device and the unmodified second mating device bends a connector corresponding to the bent connector of the first mating device. | 09-04-2014 |
20140359313 | IMPLEMENTATION OF AN AIR TUBE BUTTON - An approach is described for implementing an air tube button in a computing system. An associated apparatus may include an air tube having an aperture located on a panel of the computing system. The apparatus further may include an airflow sensor located in the air tube and a fan configured for facilitating airflow though the air tube. The airflow sensor may be an anemometer, an air pressure gauge, or a mass flow meter. The apparatus further may include a service processor subsystem connected to the airflow sensor. The service processor subsystem may be configured for implementing a virtual signal having a default logical high value. The service processor subsystem further may be configured for establishing a baseline value by determining average airflow detected by the airflow sensor over a unit of time and commencing sampling of the airflow sensor to obtain airflow values at uniform time intervals. | 12-04-2014 |
20150055455 | CONTROLLING WI-FI ACCESS IN A PUBLIC LOCATION - A method, computer system, and/or computer program product controls access to a wireless local area network (WLAN) access point in a retail establishment. A predetermined retail activity threshold is established for a retail establishment, where the retail establishment has a patron service area with a WLAN access point, and where a determination has been made that exceeding the predetermined retail activity threshold without increasing patron traffic out of the retail establishment will cause an excessive wait time for occupying the patron service area. In response to determining that the predetermined retail activity threshold is being exceeded, a secondary criterion is examined in order to determine if the mobile device should be disconnected from the WLAN access point, in order to motivate a user of the mobile device to leave the patron service area. If so, then the mobile device is disconnected from the WLAN access point. | 02-26-2015 |
20150070257 | LIQUID CRYSTAL DISPLAY USING BACKLIGHT INTENSITY TO COMPENSATE FOR PIXEL DAMAGE - A computer program product (CPP) for controlling a liquid crystal display (LCD) includes code for applying a test voltage to each liquid crystal element (LCE) disposed in an addressable array forming the LCD, and code for detecting an amount of light received by photosensors while applying the test voltage applied to the LCEs, wherein each photosensor is aligned behind and logically associated with one of the LCEs. The CPP further includes code for applying selected voltage levels to each LCE to display an image, and code for controlling an amount of backlight produced by backlighting elements in an addressable array while the image is displayed. Each backlighting element is aligned behind and logically associated with one LCE, and at least one backlighting element is controlled to compensate for a difference between the amount of light detected by the photosensor logically associated with at least one LCE and the other photosensors. | 03-12-2015 |
20150070401 | LIQUID CRYSTAL DISPLAY USING BACKLIGHT INTENSITY TO COMPENSATE FOR PIXEL DAMAGE - A method of controlling a liquid crystal display (LCD) includes applying a test voltage to the LCD, and detecting an amount of light received by a plurality of photosensors while the test voltage is being applied, wherein the photosensors are each aligned behind one of the liquid crystal elements of the LCD. An image is then displayed on the LCD by applying selected voltage levels to the LCD elements. An amount of backlight produced by backlighting elements is controlled to compensate for differences in the light transmittance of the individual LCD elements. | 03-12-2015 |