Patent application number | Description | Published |
20120188999 | Personal Computer and Mobile Phone Communications through Peer-to-Peer Connection - An information handling system includes a network interface, a radio frequency interface, and a processor. The processor is configured to receive a call initiation signal from a remote system through the network interface, establish a connection with a portable communication device through the radio frequency interface, and accept a call from the remote system. Additionally, the processor is further configured to route audio signals related to the call between the portable communication device and the remote system. | 07-26-2012 |
20130024726 | SYSTEM AND METHOD FOR REMOVABLE NETWORK ATTACHED STORAGE ENABLING SYSTEM RECOVERY FROM BACKUP - A system and method for enabling recovery from backup is disclosed. The removable system may include a processor, a memory, a network interface, a backup management module configured to backup data associated with an information handling system communicatively coupled together. The system may be further configured to boot and restore data associated with the information handling system to which the memory is locally attached. The method may include copying data from an information handling system via the network to memory. The method may further include booting and restoring copied data to the information handling system from the locally attached memory. The system and method may further include an article of manufacture including a computer-readable medium and computer-executable instructions operable to copy data, determine the identity of, boot and restore copied data to an information handling system. | 01-24-2013 |
20140122717 | System and Method for Tunneling of Management Traffic - A method of tunneling management traffic includes receiving at a managed system a control feature from a proxy-managed system that is connected to the managed system, determining that the proxy-managed system is not visible to a management system, providing the control feature to the management system in response to determining that the proxy-managed system is not visible, receiving a modification to the control feature from the management system, and providing, from the managed system, the modification to the control feature to the proxy-managed system in response to receiving the modification to the control feature from the management system. | 05-01-2014 |
20140143430 | System and Method for Peer-to-Peer Management Through Policy and Context Replication - A method of context replication including receiving a first context item at a first system in a network, determining that the first system is a context management master system, establishing a first peer-to-peer session with a second system in the network in response to determining that the first system is the context management master system, and providing, from the first system, the first context item to the second system. | 05-22-2014 |
20140208383 | SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING - A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system. | 07-24-2014 |
20150082012 | SYSTEMS AND METHODS FOR PROVISIONING AN INFORMATION HANDLING SYSTEM FOR OPERATING SYSTEM STREAMING BASED ON INFORMATION HANDLING RESOURCE INVENTORY - In accordance with embodiments of the present disclosure, a method for provisioning an information handling system for operating system streaming, the information handling system having one or more information handling resources, may be provided. The method may include receiving from the information handling system a boot request to boot a streaming operating system. The method may also include, responsive to determining that an operating system image associated with the information handling system is not available, instructing the information handling system to boot a service operating system for generating an inventory of the one or more information handling resources. The method may additionally include receiving the inventory from the information handling system. The method may further include generating a new operating system image including drivers for supporting the one or more information handling resources identified in the inventory. | 03-19-2015 |
20150143170 | STORAGE DEVICE FAILURE RECOVERY SYSTEM - A storage device failure recovery system includes a storage IHS and a user IHS coupled together over a network. The user IHS includes a storage system having a storage device, and a storage repair function that periodically provides a storage device image over the network to the storage IHS using data from the storage device. The storage repair function detects a failure of the storage device and streams an operating system on the user IHS using the storage device image stored on the storage IHS. While streaming the operating system on the user IHS using the storage device image stored on the storage IHS, the storage repair function analyzes the failure of the storage device, determines a storage system failure recovery procedure, and performs the storage system failure recovery procedure to restore the storage system while a user remains productive on the user IHS via the streamed operating system. | 05-21-2015 |
20150143465 | SYSTEMS AND METHODS FOR SECURITY TIERING IN PEER-TO-PEER NETWORKING - A method may also include receiving from each of one or more of potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may additionally include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system. | 05-21-2015 |