Patent application number | Description | Published |
20080294797 | STRUCTURE FOR CONFIGURING A DEVICE THAT HAS FAILED TO OBTAIN NETWORK ADDRESS - A design structure embodied in a machine readable storage medium for at least one of designing, manufacturing, and testing a design is provided. The design structure includes an apparatus for remotely configuring a device. The apparatus includes a mechanism operative to attempt to obtain a network address from a network server over a network, and a mechanism operative to receive a valid network address from a remote device connected to the device over the network in response to failing to obtain the network address from the network server. | 11-27-2008 |
20090077413 | APPARATUS, SYSTEM, AND METHOD FOR SERVER FAILOVER TO STANDBY SERVER DURING BROADCAST STORM OR DENIAL-OF-SERVICE ATTACK - An apparatus, system, and method are disclosed to failover to a standby server when a primary server is under broadcast storm or denial-of-service (“DoS”) attack. A primary attack sensing module is included to monitor a rate of incoming data from a computer network to a primary server and to determine if the rate of incoming data is above a primary data rate threshold. A standby contact module is included to request a standby data rate status from a standby server in response to the primary attack module determining that the rate of incoming data to the primary server is above the primary data rate threshold. The standby server is connected to the primary server over a private network. The standby data rate status includes a determination by the standby server of whether a rate of data received by the standby server is above a standby data rate threshold. A standby receiver module is included to receive a standby data rate status from the standby server over the private network. A switchover module is included to deactivate the primary server and to send a command to activate the standby server as a primary server in response to the received standby data rate status indicating that the rate of data received by the standby server has not exceeded the standby data rate threshold. | 03-19-2009 |
20110106886 | Propagating Firmware Updates In A Peer-To-Peer Network Environment - Propagating firmware updates in a peer-to-peer network including identifying, that one or more nodes in the network have firmware that is uplevel with respect to the downlevel node; broadcasting an update request requesting an update to the firmware; receiving, from a plurality of nodes having firmware uplevel with respect to the downlevel node, a plurality of portions of the update, metadata describing each portion of the update received, and metadata describing the firmware installed on each of the plurality of nodes having firmware uplevel with respect to the downlevel node; determining, in dependence upon the metadata describing each portion of the update received and the metadata describing the firmware installed on each of the plurality of nodes having firmware uplevel with respect to the downlevel node, whether the portions of the update received comprise an entire update; and updating the firmware if the portions of the update received comprise the entire update. | 05-05-2011 |
20110107317 | Propagating Firmware Updates In A Raid Array - Propagating firmware updates in a RAID array including identifying, by a RAID controller, that a first drive has a firmware that is uplevel with respect to firmware of at least one other drive, the RAID controller comprising a module of automated computing machinery; selecting, by the RAID controller, a second drive having downlevel firmware with respect to the firmware of the first drive; obtaining, by the RAID controller, an uplevel firmware image from the first drive; and updating, by the RAID controller, the downlevel firmware on the selected second drive with the obtained firmware image. | 05-05-2011 |
20110154313 | Updating A Firmware Package - Updating a firmware package including receiving an update package for the firmware package, the firmware package including currently installed components supporting one of a plurality of software layers, the update package including update components that correspond to the currently installed components; retrieving information describing a state of the currently installed components; comparing the information describing the state of the currently installed components to information describing a state of the corresponding update components; constructing a revised update package that includes only update components having a state more recent than the state of the corresponding currently installed components; and updating the currently installed components with corresponding update components of the revised update package. | 06-23-2011 |
20110279266 | AUTOMATIC VERIFICATION OF NETWORK CABLE CONNECTIONS - A system and method for guiding server chassis enumeration in a computer system are disclosed. One embodiment provides a method of connecting a plurality of computer server chassis configured as a plurality of nodes. For each cable connection between any two server chassis, a port on the first of the two server chassis to which a first end of a cable is connected is identified, and a port on the second server chassis to which a second end of the cable is connected is identified. The node containing second server chassis is uniquely designated by the port designator on the first server chassis, and the node containing the first server chassis is uniquely designated by the port designator on the second server chassis. An electronic alert is generated in response to any conflicting node designator. | 11-17-2011 |
20110289327 | CHASSIS POWER ALLOCATION USING EXPEDITED POWER PERMISSIONS - In one embodiment, a fixed chassis power budget is dynamically allocated to a plurality of servers inserted into a multi-server chassis. An inserted server may be inventoried by sequentially identifying server components, categorically-defined component power limits, and actual component power requirements of the inventoried components. A power permission may be granted to the inserted server prior to completion of the inventory, based on power-related information inferred from a chassis and server specification or from the inventoried components. | 11-24-2011 |
20120036346 | PARTIAL HIBERNATION RESTORE FOR BOOT TIME REDUCTION - Checkpoint snapshots of segments of system memory are taken while an operating system is booting in a computer system. The segments of system memory are stored in non-volatile memory as hibernation files. In response to detecting a request for a system reboot of the OS, an affected hibernation file, which corresponds to an affected segment of system memory that will change during the system reboot of the OS, is identified. A restoration of the system memory via a wake-up from hibernation is then initiated. The wake-up from hibernation proceeds until the affected hibernation file is reached, such that initial steps in the system reboot are bypassed. Thereafter, subsequent steps, which are after the bypassed initial steps in the system reboot, are executed. | 02-09-2012 |
20120079414 | CONTENT PRESENTATION UTILIZING MOVEABLE FLY-OVER ON-DEMAND USER INTERFACES - Content presentation using on-demand user interfaces is provided. One embodiment comprises detecting position of a pointer by a user relative to a content element in a graphical user interface displayed on an electronic display screen; displaying a popup window at a location on the graphical user interface while the pointer hovers over the content element, wherein the popup window includes a bump zone indicating that the popup window is moveable; detecting proximity of the pointer relative to the bump zone while the pointer hovers over the content element; and transitioning the popup window to a new location on the graphical user interface based on the detected proximity and movement of the pointer relative to the bump zone. | 03-29-2012 |
20120137066 | DYNAMIC USE OF RAID LEVELS RESPONSIVE TO WORKLOAD REQUIREMENTS - Data associated with a workload is stored in a first composite array of data storage devices that meets first data storage requirements of the workload, and is automatically stored in a second composite array in response to detecting second data storage requirements of the workload, wherein the second composite array of data storage devices meets the second data storage requirements. The data may be stored in the second composite array by either converting the first array or migrating the data to another array that more closely meets the current data storage requirements of the workload. Alternatively, the array conversion or the data migration may be performed in response to a predictive failure alert from one of the data storage devices in the first composite array. | 05-31-2012 |
20120137289 | PROTECTING HIGH PRIORITY WORKLOADS IN A VIRTUALIZED DATACENTER - A computer program product is provided, including computer usable program code for running a plurality of virtual machine workloads across a plurality of servers within a common power domain, and computer usable program code for setting an operating level for each of a plurality of hardware resources within the common power domain in response to receiving an early power off warning from a power source that supplies power to the common power domain, wherein the operating level for each of the hardware resources is determined as a function of the priority of the virtual machine workloads that are utilizing each of the hardware resources. | 05-31-2012 |
20120154165 | ELECTRONIC GUIDANCE FOR RESTORING A PREDETERMINED CABLING CONFIGURATION - In one embodiment, a computer system has a plurality of chassis interconnected by cables. Each cable initially connects a unique port pair consisting of a port of one chassis and a port of another chassis. The disconnection of cables is monitored, including electronically recording a disconnection sequence in which the port pairs are disconnected by removing each cable from at least one port of the respective port pair. Visual guidance is provided for re-cabling the computer system by sequentially identifying the port pairs in a reversal of the disconnection sequence, wherein identifying each port pair includes illuminating visual indicators associated with the ports of each port pair with a matching illumination pattern. | 06-21-2012 |
20120213119 | Method And System For Configuring A Device That Has Failed To Obtain Network Address - Method and system for configuring a device that has failed to obtain a network address. In one aspect of the invention, a method for remotely configuring a device includes attempting to obtain a network address from a network server over a network, and receiving a valid network address over the network from a remote device connected to the network in response to failing to obtain the network address from the network server. | 08-23-2012 |
20120272001 | DYNAMIC USE OF RAID LEVELS RESPONSIVE TO WORKLOAD REQUIREMENTS - Data associated with a workload is stored in a first composite array of data storage devices that meets first data storage requirements of the workload, and is automatically stored in a second composite array in response to detecting second data storage requirements of the workload, wherein the second composite array of data storage devices meets the second data storage requirements. The data may be stored in the second composite array by either converting the first array or migrating the data to another array that more closely meets the current data storage requirements of the workload. Alternatively, the array conversion or the data migration may be performed in response to a predictive failure alert from one of the data storage devices in the first composite array. | 10-25-2012 |
20120272243 | PROTECTING HIGH PRIORITY WORKLOADS IN A VIRTUALIZED DATACENTER - A method includes running a plurality of virtual machine workloads across a plurality of servers within a common power domain, and setting an operating level for each of a plurality of hardware resources within the common power domain in response to receiving an early power off warning from a power source that supplies power to the common power domain, wherein the operating level for each of the hardware resources is determined as a function of the priority of the virtual machine workloads that are utilizing each of the hardware resources. | 10-25-2012 |
20130103974 | Firmware Management In A Computing System - Managing firmware in a computing system storing a plurality of different firmware images for the same firmware includes: calculating, for each firmware image in dependence upon a plurality of predefined factors, a preference score; responsive to a failure of a particular firmware image, selecting a firmware image having a highest preference score; and failing over to the selected firmware image. | 04-25-2013 |
20130232241 | Method And System For Configuring A Device That Has Failed To Obtain Network Address - Method and system for configuring a device that has failed to obtain a network address. In one aspect of the invention, a method for remotely configuring a device includes attempting to obtain a network address from a network server over a network, and receiving a valid network address over the network from a remote device connected to the network in response to failing to obtain the network address from the network server. | 09-05-2013 |
20140189669 | DYNAMIC TIMEOUT DETERMINATION FOR MICROCONTROLLER MANAGEMENT OF FIRMWARE UPDATES - Embodiments of the invention provide a method, system and computer program product for dynamic time out determination during a microcontroller driven firmware update. In an embodiment, the method includes selecting by a processor of a server a firmware update to be applied by a microcontroller to firmware of the server and computing a timeout value according to a function based upon a date of production of the server. The method also includes transmitting a request to the microcontroller to apply the selected firmware update to the firmware. Finally, the method includes determining a failure state responsive to detecting a lapse in time from the request beyond the timeout value without response by the microcontroller. | 07-03-2014 |
20150067818 | BOOKMARKING SUPPORT OF TUNNELED ENDPOINTS - Methods and systems for managing tunneled endpoints are provided. One method includes preventing a user from accessing an endpoint that was previously accessed by the user via a first URL including an address with a first port designation, creating a constructive bookmark to the previously accessed endpoint, and establishing a tunnel to the previously accessed endpoint based on the constructive bookmark. Another method includes preventing a user from bookmarking a URL to an endpoint. A system includes a processor coupled to a memory a module for managing tunneled endpoints that, when executed by the processor, cause the processor to perform one or more of the above methods. | 03-05-2015 |