摘要:
A manageability engine of a processor based device and a host theft-deterrence agent of the processor based device, jointly implement a theft-deterrence protocol with a theft-deterrence service, remotely disposed from the processor based device, to deter theft of the processor based device. The host theft-deterrence agent is configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine is configured to operate outside the application execution environment.
摘要:
An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.
摘要:
Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices.
摘要:
A method of operation in a communications device is disclosed. The method of operation includes obtaining interference information associated with a plurality of channels, including age of the interference information, and selecting one of the plurality of channels, based at least in part on the interference information and their age. Communications devices, subsystems, and systems equipped to operate in the above described manner are also disclosed.
摘要:
A manageability engine of a processor based device and a host theft-deterrence agent of the processor based device, jointly implement a theft-deterrence protocol with a theft-deterrence service, remotely disposed from the processor based device, to deter theft of the processor based device. The host theft-deterrence agent is configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine is configured to operate outside the application execution environment.
摘要:
Nodes of an ad-hoc network may determine a category assigned to neighbor nodes and may select a communication pattern for communicating with the neighbor nodes based on their assigned categories. The category may be associated with a node's role in the network.
摘要:
An embodiment of the present invention provides an apparatus, comprising a transceiver capable of dynamic cluster-based node sleep/wake scheduling by integrating application information such as scheduled data transfers with the sleep/wake scheduling, wherein the nodes may sleep immediately after a scheduled data transmission. Further, the nodes may intelligently and automatically choose to sleep based on the ongoing communication of its neighbors and the apparatus may be part of a wireless sensor network. The nodes may consist of battery-operated computing and sensing devices that collaborate to deliver sensed data and the delivery of the sensed data may be over multiple hops between multiple nodes.
摘要:
A method, apparatus, and system are disclosed. In one embodiment, the method determines whether one or more manageability conditions are present in a computer system, and then invokes an out-of-service manageability remediation environment stored within a portion of a flash device in the computer system when one or more manageability conditions are present.
摘要:
Various embodiments are generally directed to cooperation among networked devices to seek out-of-band verification that an online transaction is requested by a person authorized to do so. An apparatus comprises a processor circuit and a storage communicatively coupled to the processor circuit and storing a sequence of instructions operative on the processor circuit to receive a transaction request requesting performance of a transaction via a first communications channel from a transaction device; transmit a verification request to another computing device via a second communications channel; receive a response to the verification request via the second communications channel; and perform the transaction in response to an indication in the response that the transaction has been verified. Other embodiments are described and claimed herein.
摘要:
A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.