会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Methods and arrangements for activating IP configurations
    • 激活IP配置的方法和安排
    • US07886027B2
    • 2011-02-08
    • US11279864
    • 2006-04-14
    • Joseph E. BolanThomas M. BreyBrandon J. EllisonAaron E. Merkin
    • Joseph E. BolanThomas M. BreyBrandon J. EllisonAaron E. Merkin
    • G06F15/177
    • H04L61/2007H04L29/12216
    • Methods and arrangements for activating Internet Protocol (IP) configurations are discussed. Embodiments include transformations, code, state machines or other logic for activating in an end node an IP configuration suitable for IP communications between the end node and another end node upon the detection of a direct IP connection of the end node to another end node. In some embodiments, the other end node may have a direct IP connect only to the end node. In some embodiments, the suitable IP configuration may involve a static IP address which has been published. In some embodiments, detecting a direct IP connection with another node may be accomplished by detecting a crossed-over Ethernet connection. In some embodiments, an operating system device driver may activate the suitable IP configuration. In other embodiments, an embedded system may activate the suitable IP configuration.
    • 讨论了激活Internet协议(IP)配置的方法和安排。 实施例包括转换,代码,状态机或用于在终端节点检测到终端节点到另一终端节点的直接IP连接时在端节点中激活适合于终端节点与另一终端节点之间的IP通信的IP配置的其他逻辑。 在一些实施例中,另一端节点可以具有直接IP连接到端节点。 在一些实施例中,合适的IP配置可以涉及已经发布的静态IP地址。 在一些实施例中,检测与另一个节点的直接IP连接可以通过检测交叉以太网连接来实现。 在一些实施例中,操作系统设备驱动程序可以激活合适的IP配置。 在其他实施例中,嵌入式系统可以激活合适的IP配置。
    • 5. 发明授权
    • System for maximizing server utilization in a resource constrained environment
    • 用于在资源受限环境中最大化服务器利用率的系统
    • US08032776B2
    • 2011-10-04
    • US12259133
    • 2008-10-27
    • Aaron E. Merkin
    • Aaron E. Merkin
    • G06F1/00
    • G06F1/206G06F1/263G06F1/28H05K7/20836Y02D10/16
    • A mechanism for controlling the hardware resources on a blade server, and thereby limiting the power consumption of the blade server is disclosed. The enforceable hardware resources that are controlled include the base frequency of the central processing unit (CPU) as well as power to individual banks of physical memory, for example dual-inline memory modules (DIMMs). The hardware resources are tuned in dependence on actual server utilization such that applications running on the blade only have the allocated hardware resources available to them. Deactivated hardware resources are powered off and are so ‘hidden’ from the operating system when they are not required. In this manner, power consumption in the entire chassis can be managed such that all server blades can be powered on and operate at higher steady-state utilization. The utilization of the powered on resources in a blade center is also improved.
    • 公开了一种用于控制刀片服务器上的硬件资源,从而限制刀片服务器的功耗的机制。 受控的可强制执行的硬件资源包括中央处理器(CPU)的基本频率以及物理存储器的各个存储单元的电源,例如双列直插式存储器模块(DIMM)。 硬件资源根据实际的服务器利用率进行调整,使得在刀片上运行的应用程序只能为其分配的硬件资源。 停用的硬件资源已关闭,并且在不需要时被从操作系统“隐藏”。 以这种方式,可以管理整个机架中的功率消耗,使得所有服务器刀片都可以通电并且在更高的稳态利用率下操作。 刀片中心上的动力资源的利用也得到改善。
    • 6. 发明授权
    • Method and apparatus for enforcing of power control in a blade center chassis
    • 用于在刀片中心机箱中实施功率控制的方法和装置
    • US07307837B2
    • 2007-12-11
    • US11209868
    • 2005-08-23
    • Aaron E. MerkinThomas M. BreyJoseph E. Bolan
    • Aaron E. MerkinThomas M. BreyJoseph E. Bolan
    • G06F1/16
    • G06F1/206G06F1/26H05K7/20836
    • A mechanism for changing ownership over the physical power to a blade server in a blade center chassis that prevents a malfunctioning blade from jeopardizing other components in the chassis. When the management module is not present, control over power to the blade is switched to a service processor on the blade. This arbitration of control over power to a blade is accomplished by implementing a watchdog timer mechanism. The management module is responsible for tickling the watchdog timer when the present in the chassis and operating normally. This mechanism provides the management module with control over power. If the management module malfunctions or is removed, control over power is switched to the local service processor on the blade server as soon as the watchdog timer is not tickled.
    • 将物理电源的所有权更改为刀片服务器中央机箱中的刀片服务器的机制,可防止故障刀片损坏机箱中的其他组件。 当管理模块不存在时,控制刀片的电源切换到刀片上的服务处理器。 通过实施看门狗定时器机制来实现对刀片的功率控制的仲裁。 管理模块负责在机箱中存在的情况下检查看门狗定时器,并正常运行。 该机制为管理模块提供了对功率的控制。 如果看门狗定时器不发生故障,管理模块故障或被移除,则控制电源将切换到刀片服务器上的本地服务处理器。
    • 7. 发明授权
    • Method and apparatus for enforcing of power control in a blade center chassis
    • 用于在刀片中心机箱中实施功率控制的方法和装置
    • US07710718B2
    • 2010-05-04
    • US11859397
    • 2007-09-21
    • Aaron E. MerkinThomas M. BreyJoseph E. Bolan
    • Aaron E. MerkinThomas M. BreyJoseph E. Bolan
    • G06F1/16
    • G06F1/206G06F1/26H05K7/20836
    • A mechanism for changing ownership over the physical power to a blade server in a blade center chassis that prevents a malfunctioning blade from jeopardizing other components in the chassis. When the management module is not present, control over power to the blade is switched to a service processor on the blade. This arbitration of control over power to a blade is accomplished by implementing a watchdog timer mechanism. The management module is responsible for tickling the watchdog timer when the present in the chassis and operating normally. This mechanism provides the management module with control over power. If the management module malfunctions or is removed, control over power is switched to the local service processor on the blade server as soon as the watchdog timer is not tickled.
    • 将物理电源的所有权更改为刀片服务器中央机箱中的刀片服务器的机制,可防止故障刀片损坏机箱中的其他组件。 当管理模块不存在时,控制刀片的电源切换到刀片上的服务处理器。 通过实施看门狗定时器机制来实现对刀片的功率控制的仲裁。 管理模块负责在机箱中存在的情况下检查看门狗定时器,并正常运行。 该机制为管理模块提供了对功率的控制。 如果看门狗定时器不发生故障,管理模块故障或被移除,则控制电源将切换到刀片服务器上的本地服务处理器。
    • 9. 发明申请
    • AUTHENTICATION FOR COMPUTER SYSTEM MANAGEMENT
    • 计算机系统管理认证
    • US20080141350A1
    • 2008-06-12
    • US11609437
    • 2006-12-12
    • Aaron E. MerkinMark A. Rinaldi
    • Aaron E. MerkinMark A. Rinaldi
    • G06F21/20
    • G06F21/31G06F2221/2115
    • An improved solution for authenticating a user seeking to manage a computer system is provided according to aspects of the invention. A user seeking to perform out-of-band management of the computer system can provide a set of credentials to a service processor, which in turn provides them to the computer system for authentication. Additionally, a user seeking to perform in-band management of the computer system can provide a set of credentials to a management agent executing on the computer system for authentication. In either case, the computer system can authenticate the set of credentials, e.g., using an operating system interface.
    • 根据本发明的方面,提供了一种用于认证寻求管理计算机系统的用户的改进的解决方案。 寻求执行计算机系统的带外管理的用户可以向服务处理器提供一组凭证,这又将它们提供给计算机系统进行认证。 此外,寻求对计算机系统进行带内管理的用户可以向在计算机系统上执行的管理代理提供一组凭证以进行认证。 在任一情况下,计算机系统可以验证该组凭证,例如使用操作系统接口。
    • 10. 发明授权
    • Authentication for computer system management
    • 计算机系统管理认证
    • US08347378B2
    • 2013-01-01
    • US11609437
    • 2006-12-12
    • Aaron E. MerkinMark A. Rinaldi
    • Aaron E. MerkinMark A. Rinaldi
    • G06F11/00H04L29/06
    • G06F21/31G06F2221/2115
    • An improved solution for authenticating a user seeking to manage a computer system is provided according to aspects of the invention. A user seeking to perform out-of-band management of the computer system can provide a set of credentials to a service processor, which in turn provides them to the computer system for authentication. Additionally, a user seeking to perform in-band management of the computer system can provide a set of credentials to a management agent executing on the computer system for authentication. In either case, the computer system can authenticate the set of credentials, e.g., using an operating system interface.
    • 根据本发明的方面,提供了一种用于认证寻求管理计算机系统的用户的改进的解决方案。 寻求执行计算机系统的带外管理的用户可以向服务处理器提供一组凭证,这又将它们提供给计算机系统进行认证。 此外,寻求对计算机系统进行带内管理的用户可以向在计算机系统上执行的管理代理提供一组凭证以进行认证。 在任一情况下,计算机系统可以验证该组凭证,例如使用操作系统接口。