Abstract:
A method for setting configuration parameters (301) for at least one software system (300), comprises the steps of: a) receiving an identification of a set of configuration parameters (301) for at least one software system (300) to be optimized; b) selecting a random value from a predetermined range (305) for each configuration parameter (301) of interest; c) setting each configuration parameter (301) to a corresponding random value selected (305); d) running an application using the values selected (309); e) gathering performance information relating to the software system (300) while the application is running; f) repeating steps b) through e) for a selected number of times; and g) performing an analysis of the performance information gathered to determine optimal configuration parameters (301). The method can be performed by a programmable computer system (800) running program instructions for carrying out the above method steps or by a specialized apparatus such as an ASIC.
Abstract:
The present invention is a novel management system for selectively distributing applications and databases from a server computer to a plurality of intermittently connected handheld devices. The applications and databases to be downloaded and deleted are first selected from an application list maintained by handheld devices. After established a connection with the server computer, the application list of selected applications is copied to the server computer which maintains an access control list indicating which applications are permitted to be downloaded to which handheld devices. The server computer examines the application list and the access control list to determine which applications are both selected and are authorized for use by the handheld device. After determining that requested applications are authorized for requesting devices, these applications are downloaded. If the connected handheld device does not have that the application list, the application list is created for it and downloaded.
Abstract:
A system for selectively distributing applications and databases from a server computer to at least one client, such as at least one of a plurality of intermittently connected handheld devices. Applications and databases to be downloaded and deleted are selected from an application list 503 maintained by handheld devices. After connection with the server computer, the application list of selected applications is copied to the server computer which maintains an access control list indicating which applications can be downloaded to which handheld devices. The server computer examines the application list and the access control list to determine which applications are both selected and authorized for use by the handheld device. After determining that requested applications are authorized for requesting devices, these applications are downloaded. If the connected handheld device does not have the application list, the application list is created for it and downloaded.
Abstract:
A method and system for supporting discontiguous drive arrangements in a computer system using IDE control parameters having a central processing unit, user interface, short term volatile memory storage, and at least one, to four or more long term static memory storage devices, all of which are connected by a bus to the CPU, is used to provide access to the long term memory storage devices in a manner transparent to both the system and the user.
Abstract:
The present invention provides a method and system for supporting discontiguous drive arrangements in a computer system using IDE control parameters. In a standard computer system having a central processing unit, user interface, short term volatile memory storage, and at least one to four or more long term static memory storage devices (eg hard disks), all or which are connected by a bus to the CPU, the invention is used to provide access to the long term memory storage devices in a manner transparent to both the system and the user. According to the invention, the system first defines a primary address for a first set of long term storage locations as well as a secondary address for a second set of long term storage locations contiguous to the first set of long term storage locations. Next, the system defines first and second logical drive numbers within the primary address and within the secondary address. Next, the system determines whether at least one long term static memory devices are present, which devices have a physical drive number. Next, the system translates the logical number from either the primary address or the secondary address to the physical drive number corresponding to the present long term static memory devices previously identified.
Abstract:
A system and method of improving security during power-on-self-test (POST), particularly the ROM scan portion identifying ROM adapters, while selectively allowing user input. While a user input during ROM scan may be normally locked out to prevent the user from making changes to the configuration of the system, when the ROM scan during POST detects a ROM adapter which uses an input from the user, the system can override the lockout and allows for a user input. An optional control, such as a password or other personal identifier, can provide security, allowing the user input only when the user is authorized to provide the input (in response to an appropriate password or personal identifier such as a biometric identifier).
Abstract:
A system and method of improving security during power-on-self-test (POST), particularly the ROM scan portion identifying ROM adapters, while selectively allowing user input. While a user input during ROM scan may be normally locked out to prevent the user from making changes to the configuration of the system, when the ROM scan during POST detects a ROM adapter which uses an input from the user, the system can override the lockout and allows for a user input. An optional control, such as a password or other personal identifier, can provide security, allowing the user input only when the user is authorized to provide the input (in response to an appropriate password or personal identifier such as a biometric identifier).