At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method, system, and computer-readable medium for updating the firmware of
a computing device via a...
A method for updating the firmware of a computing device via a communications network is provided. A client computer having firmware to be updated boots into a...
Methods and apparatus for provisioning servers to clients
In one embodiment, a server is provisioned to a client by: 1) pre-booting a server of a server pool using a client-neutral operating system image, before the...
Method and system for fault-tolerant remote boot in the presence of boot
server overload/failure with...
A method and system are presented for facilitating a PXE-compliant (Preboot Execution Environment) remote boot process between clients and multiple available...
Boot modification of registry data for iSCSI network boot operations
In one embodiment, a method includes retrieving a network parameter for a computing device from a remote server. The method also includes updating data in a...
A circuit with a large load driving capability, which is structured by single polarity TFTs, is provided. With a capacitor (154) formed between a gate electrode...
A crosscountry ski (1), the lower face (3) of which is curved to form a wax zone (2) positioned substantially in the region lying below the user's boot, wherein...
System for automated generation of config to order software stacks
A method for automatically generating a software stack in an information handling system. The information handling system includes a software process partition....
Production line boot sector lock
Hacking of a class of Set-Top Boxes known as Integrated Receiver-Decoders (IRDs) used to receive satellite broadcasts for display on television sets is prevented...
Method and apparatus for providing a secure boot for a computer system
A method and apparatus for securely booting a computer system comprises loading secure boot code and a secure operating system from the secure boot code. The...
iSCSI system OS boot configuration modification
A Pre-boot Execution Environment (PXE) boot extension is loaded upon system boot and is operable to store an iSCSI boot disk identifier identifying a remote disk...
System and method for backing up data from a quiesced storage device
Provided is a Method and Computer Apparatus being capable of safely and reliably making a backup copy of data stored on the Hard Disk Drive (HDD). A user places...
Boot for constant velocity universal joint
A boot for a constant velocity universal joint, having an inner surface that is prevented from contacting an edge portion of an outer housing of a constant...
Adaptive coupling and method
An adaptive coupling and method for joining a conduit to a barrier sheet through which the conduit passes are disclosed. The barrier sheet is movable axially...
Ski boot sole, disengageable ski binding and combination thereof
A ski boot sole for cooperating with a ski binding to releasably hold the sole in the binding, the sole having front and rear recesses with front and rear...
Air seeder disc scraper
A scraper for a single-disc opener air seeder, comprising a mounting bracket, scraper attachment member, scraper plate, scraper edge containment member, scraper...
Initialization of range registers within chipsets on spare processor cells
A distributed computer system is composed of a plurality of cells, a service processor, and first and second modules. Each of the cells includes a CPU, a memory,...
System and method for enabling automated run-time input to network
A system and method are provided for enabling runtime parameter value input into a computer device during a network bootstrapping process. The system and method...
Booting system and/or method for initializing peripherals
A booting system, method, and/or medium initializing peripherals of a computer system. The booting system initializing peripherals includes an auxiliary memory...
Transient transceiver clock configuration
A telecommunications system that includes an external memory, an internal memory and a system clock. A boot component is configured to use the clock signal...
Method of loading information into a slave processor in a multi-processor
system using an...
A conventional bootloader can conflict with the operating system (OS) of a multi-processor system. An OS-friendly bootloader and methods are described that...
Reinforced rolling boot
A sealing sleeve (11) of the rolling boot type having a first larger, substantially cylindrical collar (12), a second smaller, substantially cylindrical collar...
Multi dental flask system
A multi dental flask system. The system includes a boot, at least two dental flasks, a sleeve, and a wrench. The boot is affixed to a surface. The at least two...
Fiber optic cable connector
A fiber optic cable connector and method provides minimal adhesive wicking and eliminates damage to the cladding or coating on fiber optic cables or other damage...
Polled automatic virus fix
A client computer is connected via a network to an anti-virus server and polls the server for indication that an anti-virus needs to be immediately downloaded...
Method and system for implementing full BBS (BIOS boot specification)
functionality with a single device list
Methods and systems are disclosed for single list BBS implementations that allow for significant configurability and ease of use improvements. BCV devices are...
System and method for rapid restoration of server from backup
A server is restored by creating an image of a local drive of a server; replacing a driver in the boot up procedure of the server, the replacement driver...
External observation and control of data in a computing processor
A processor access module receives a data command from an agent located externally of a computing processor and performs a cache operation on a cache memory in...
Nonvolatile latch circuit and system on chip with the same
A nonvolatile latch circuit and a system on a chip with the same feature detection of change of latch data in an active period to store new data in a latch...
Self-sealing male connector
A self-sealing male connector having a body, a resilient boot mounted over the body, and a male thread hub. The body is formed with an elongate post that extends...
Method for recovering control of a continually resetting control module
A method for recovering control of a continually resetting control module is provided. The method recovers control by monitoring a vehicle's communication links...
Ensuring power availability to a blade server when blade management
controller is corrupted
An information handling system having a plurality of blade server modules (BSMs) and power supply units (PSUs) uses a module monitor board (MMB) to monitor and...
Server blade network boot method that minimizes required network bandwidth
A system remotely boots a plurality of server blades in a blade center to update each blade. A temporary network is created to provide an out-of-band...
System and method to filter processors by health during early firmware for
split recovery architecture
A system and method to determine a healthy group of processors and associated firmware for booting a system after a resetting event is disclosed. Redundant...
Method and an apparatus for switching root cells for a computer system
without requiring the computer system to...
Embodiments of the present invention pertain to methods and systems are described for switching root cells for a computer system without requiring the computer...
System and method for remotely updating a network device
A router in one embodiment of the present disclosure has first router logic and boot logic. The first router logic is configured to operate the router, and the...
In a joint boot to be mounted on an outer housing having a non-circular outer contour, intended to axial positioning without impairing the mountability to the...
Hoof boot body
Fail over method through disk take over and computer system having
When a primary server executing a task fails in a computer system where a plurality of servers are connected to an external disk device via a network and the...
Method and system for generating dynamic images
A method and system for imaging a workstation (or other device) and then associating that image with a specific device are disclosed. The present invention...
Secure transaction microcontroller with secure boot loader
A high security microcontroller (such as in a point of sale terminal) includes tamper control circuitry for detecting vulnerability conditions: a write to...
Encrypted file system using TCPA
A method for restricting access to an encryption key of an encrypted file system (EFS), whereby access is provided only when a computer system is booted in a...
Miniature implantable connectors
Apparatus connect electrically conductive wire to a miniature, implantable sensor or stimulator device for detecting electrical signals or stimulating living...
Image printing apparatus and method for deleting print job files based on
To prevent generation of an error caused by a print job spooled in a memory in boot processing of an image printing apparatus, a print job file left in a hard...
Cassette spool lock
A cassette for use in delivering a continuous length of filament. The cassette includes a housing having a first aperture and a spool rotatably mountable in the...
Upper for a boot
Upper for a boot
Operating system update and boot failure recovery
An improved operating system method that, in addition to the primary operating system, stores one or more alternate or recovery operating systems. The system...
Multiplex execution-path system
A multiple execution-path flash system includes a main flash image with primary and secondary POST and Boot executable files. The secondary executables are...