摘要:
A computer-implemented system is provided that enables automated testing of a plurality of mobile devices residing at a monitor site. The system is comprised generally of a test controller in data communication with the plurality of mobile devices. The test controller transmits a test request over a wireless network to each of the plurality of mobile devices, where the test controller communicates via a persistent data channel using a short range communication protocol such as a Bluetooth. Each of the mobile devices is configured with a test agent that is configured to receive the test request from the test controller and execute a test in response to the test request.
摘要:
A computer-implemented system is provided that enables automated testing of a plurality of mobile devices residing at a monitor site. The system is comprised generally of a test controller in data communication with the plurality of mobile devices. The test controller transmits a test request over a wireless network to each of the plurality of mobile devices, where the test controller communicates via a persistent data channel using a short range communication protocol such as a Bluetooth. Each of the mobile devices is configured with a test agent that is configured to receive the test request from the test controller and execute a test in response to the test request.
摘要:
A method and apparatus for managing targeted advertisements for linear television is provided herein. During operation a list of N channels are maintained. Advertisements for the N channels are downloaded and stored locally. The list of N channels will be dynamically updated with advertisements being added to, and removed from local storage.
摘要:
A system and process are described to enable at least one of a plurality of host agents executing on a system to update memory region types of a system memory, register the at least one host agent in a registry stored in system management memory, receive a system management interrupt (SMI) from one of the plurality of host agents to update a memory region type, determine if the host agent issuing the SMI is listed in the registry stored in system management memory, update the memory region in response to determining the host agent issuing the SMI is listed in the registry, and maintain the memory region type in response to determining the host agent issuing the SMI is not listed in the registry.
摘要:
Provided are a method, system, program and device for maintaining shadow page tables in a sequestered memory region. A first processor executing an application invokes a second processor to create a shadow page table used for address translation for the application in a sequestered memory region non-alterable by processes controlled by an operating system executed by the first processor. The shadow page table references at least one page in an operating system memory region accessible to processes controlled by the operating system.
摘要:
Provided are a method, system, program and device for maintaining shadow page tables in a sequestered memory region. A first processor executing an application invokes a second processor to create a shadow page table used for address translation for the application in a sequestered memory region non-alterable by processes controlled by an operating system executed by the first processor. The shadow page table references at least one page in an operating system memory region accessible to processes controlled by the operating system.
摘要:
A heuristic agent in a tamper resistant partition monitors network traffic flow for undesirable worm scanning activity. If the undesired scanning activity is detected, the output of an associated network controller may be throttled or ultimately disabled from the network.
摘要:
In one embodiment, a method is provided. The method of this embodiment provides receiving one or more packets that are addressed to an alternate IP (Internet Protocol) address and that include a LADLC (local application data link control) address in a system having an operating system-independent processor (“service processor”) associated with the alternate IP address and an alternate DLC address, and an embedded network stack (“ENS”) of the service processor associated with a primary IP address; performing filtering to determine if the LADLC address matches the alternate DLC address; and if the LADLC address matches the alternate DLC address, then replacing the alternate IP address of the one or more packets with the primary IP address, and forwarding the one or more packets to the ENS.
摘要:
An embodiment of the present invention is a technique to protect memory. A memory identifiers storage stores memory identifiers associated with protected components. The memory identifiers include exclusive memory identifiers and shared memory identifiers. The memory identifier storage is protected from access by a host operating system. A memory identifier management service (MMS) manages the memory identifiers. The MMS resides in a protected environment. An access control enforcer (ACE) enforces an access control policy with the memory identifiers.