Joseph Wayne Freeman - Raleigh NC Isaac Karpel - Cary NC Randall Scott Springfield - Chapel Hill NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1108
US Classification:
714 6, 714 54, 714764, 713324
Abstract:
A periodic system âwake-upâ is implemented during S1, S2 or S3 states utilizing a hardware timer. A memory scrubbing routine is initiated that reads out all memory locations and writes back any memory locations that have single bit (correctable) Error Correction Code errors. This procedure minimizes the chances of a multiple bit error build up over time that may cause an unrecoverable error. The scrubbing routine is invoked whenever the system is brought out of S1, S2, or S3 state to insure that there are no single bit errors present when full system operation is resumed.
Method, System, And Program For Customizing A Basic Input/Output System (ÂBiosâ) Configuration According To The Type Of User
Ralph Bonomo - Cary NC Richard Alan Dayan - Wake Forest NC Joseph Wayne Freeman - Raleigh NC Robert Duane Johnson - Raleigh NC Diane Nolterieke - Stewart FL Randall Scott Springfield - Chapel Hill NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 924
US Classification:
713 1, 713 2
Abstract:
A method, system, and program for selecting and implementing a basic input/output system (âBIOSâ) configuration among various BIOS configurations for a data processing system are disclosed. Different BIOS configurations are defined for various types of users, such as a home user, a commercial user, and a network user. Each of the BIOS configurations includes a different set of BIOS characteristics, such as program setup features security features, and network server features, under which the data processing system is able to run. The different BIOS configurations are stored into a memory device for the data processing system. A designation is set within the memory device that directs a processor of the data processing system to select and execute a desired one of the BIOS configurations for a particular type of user.
Method And System For Conserving Power And Improving Usability For Personal Computers With Remote Startup Features
Daryl Carvis Cromer - Apex NC Joseph Wayne Freeman - Raleigh NC Randall Scott Springfield - Chapel Hill NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04M 1100
US Classification:
37910204, 379 9302, 37914205
Abstract:
A method for remotely powering up a computer, includes: receiving a telephone call by a device coupled to a powered down computer; determining an originators telephone number for the telephone call; determining if the originators telephone number matches one of a plurality of authorized telephone numbers; and powering up the computer if the originators telephone number matches one of the plurality of authorized telephone numbers. The method and system utilizes the well known âCaller-IDâ technology to determine the originators telephone number for a telephone call received by a modem coupled to the computer. If there is no match, the computer remains in a powered down state. In this manner, the system discriminates between the received telephone calls, and avoids powering up the computer when the received call is not for this purpose. This avoids wasting power.
Reducing Start-Up Time And Avoiding Customer-Induced System Failures For Personal Computers
Joseph Wayne Freeman - Raleigh NC Joseph Franklin Garvey - Cary NC Steven D. Goodman - Raleigh NC Randall S. Springfield - Chapel Hill NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15177
US Classification:
713 2, 713100, 713320
Abstract:
Disclosed is a method for reducing power-up time and avoiding customer-induced failures of computer systems during power-up. An intrusion switch, which is connected to the inside frame of the computer system is utilized. The intrusion switch signals the BIOS of the computer system whenever the cover of the computers system unit is opened. The BIOS controls the POST operation during power-up of the computer system. During an initial power-up of the computer system, the POST configuration code examines and configures the hardware and sets the applicable registers, etc. At the end of the POST configuration code, the register values are stored in non-volatile storage. During a subsequent power-up of the computer system, a check is made to see if the cover of the system had been opened. When the cover has not been opened, the BIOS assumes that no changed has occurred in the hardware configuration and the BIOS restores the register values from non-volatile storage without completing the POST operation. When the cover has been opened, the BIOS discards the register values and initiates the POST operation, i. e.
Method Of Providing Enhanced Security In A Remotely Managed Computer System
Daryl Carvis Cromer - Apex NC Joseph Wayne Freeman - Raleigh NC Steven Dale Goodman - Raleigh NC Randall Scott Springfield - Chapel Hill NC James Peter Ward - Raleigh NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 124
US Classification:
713202, 7136185, 7136193, 7136200, 7136201
Abstract:
Authentication of an entity remotely managing a data processing system is enabled to allow changes by the remote entity to hard-locked critical security information normally accessible only during the POST and only to trusted entities such as the system BIOS. The remote entity builds a change request and generates a hash from the change request with a current password appended. The change request and the hash are stored in a lockable non-volatile buffer which, once locked, requires a system reset to access. During the next POST, a trusted entity such as the system BIOS reads the change request, generates an authentication hash from the change request and the current password within the hard-locked security information, and compares the buffered hash with the generated hash. If a match is determined, the security information is updated; otherwise a tamper error is reported.
Method And System For Disguising A Computer Systems Identity On A Network By Disguising The Systems Mac Address
Daryl Carvis Cromer - Apex NC Richard Alan Dayan - Wake Forest NC Eric Richard Kern - Durham NC Randall Scott Springfield - Chapel Hill NC Joseph Wayne Freeman - Raleigh NC Robert Duane Johnson - Raleigh NC Brandon Jon Ellison - Raleigh NC
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1516
US Classification:
709245, 709203, 709221, 713 2, 713100
Abstract:
A method and system are disclosed for substituting an anonymous media access controller (MAC) address for a client computer systems real MAC address in order to disguise an identity of the client computer system when the client computer system is utilizing a network. The client computer system is coupled to a server computer system via the network. A primary storage device is established for storing a MAC address. A MAC address which is stored in the primary storage device is utilized as a network address for the client computer system when the client computer system is utilizing the network. An anonymous MAC address is generated. The anonymous MAC address is not associated with any particular client computer system. The anonymous MAC address is then stored in the primary storage device. The client computer system utilizes the anonymous MAC address as the network address for the client computer system when the client computer system is utilizing the network.
Method And System For Booting Up A Computer System In A Secure Fashion
Richard Alan Dayan - Wake Forest NC, US Steven Dale Goodman - Raleigh NC, US Joseph Michael Pennisi - Apex NC, US Randall Scott Springfield - Chapel Hill NC, US James Peter Ward - Raleigh NC, US Joseph Wayne Freeman - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F009/00 G06F012/14 H04L009/32
US Classification:
713192, 713 1, 713 2, 713185, 713194
Abstract:
A method and system for booting up a computer system in a secure fashion is disclosed. The method and system comprise determining the presence of a security feature element during an initialization of the computer system wherein the security feature element includes a public key and a corresponding private key, storing a portion of the public key in a nonvolatile memory within the computer system if the security feature element is present and utilizing an algorithm to determine the presence of the security feature element prior to a subsequent boot-up of the computer system. Through the use of the present invention, a computer system is capable of being booted up whereby the computer system determines if a security feature element was previously present in the system. If a security feature element was previously present in the computer system, any stored keys, along with the secrets that they protect, are prevented from being compromised. It is also an object of the present invention to preclude the system from compromising any keys and associated secrets if a security feature element in the system was not previously present in the system.
Method And System For A Clean System Booting Process
Daryl Carvis Cromer - Apex NC, US Joseph Wayne Freeman - Raleigh NC, US Steven Dale Goodman - Raleigh NC, US Eric Richard Kern - Durham NC, US Randall Scott Springfield - Chapel NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F013/00
US Classification:
713 2, 713100, 713200, 710 16, 710104
Abstract:
A method, system and computer readable medium containing programming instructions for booting a computer system having a plurality of devices is disclosed. They include provisions for initiating a boot sequence in the computer system and determining whether a device of the plurality of devices is either a bootable device or a nonbootable device. If the device is a nonbootable device, a clean restart of the boot sequence is performed, wherein the nonbootable device is bypassed during the clean restart.
Cuesta College - Social and Behavioral Studies, Sheldon High School
Tagline:
18. Sheldon High Alumni. Cuesta College student.
Bragging Rights:
3 years with Kristina, 4 years of football
Joseph Freeman
Work:
Solid Foundation - Owner
Education:
Chicago
Relationship:
In_a_relationship
Bragging Rights:
Im still Alive so what that tell ya.....
Joseph Freeman
Lived:
Fuquay Varina, NC Citronelle, Alabama North Carolina Alabama Texas England Florida
About:
11 Years Of Law Enforcement, Married Since 2004 to Kristen Freeman Six boys: Keenan Threadgill, Joseph Ross Freeman, Rodney Taylor Freeman, William Jakoby Sampson, Jackson Thomas Freeman and Mason P...
Reporting was contributed by Joseph Freeman from Sanford; Beth Raymer from West Palm Beach, Fla.; Sabrina Tavernise and Timothy Williams from Manassas, Va.; and Jennifer Preston from New York. Alain Delaqurire and Sheelagh McNeill contributed research.
Date: Apr 02, 2012
Category: U.S.
Source: Google
Youtube
Joseph Freeman (Debris Chaos) Vs Craig Freema...
Sorry about the bad camera angles but this is our first upload on the ...
Category:
Gaming
Uploaded:
04 Feb, 2011
Duration:
9m 34s
Human Centipede: The Musical! - Part 2
Part 1 - www.youtube.com Part 2 - www.youtube.com Part 3 - www.youtube...
Category:
Comedy
Uploaded:
04 Apr, 2011
Duration:
8m 51s
Human Centipede: The Musical! - Part 1
Part 1 - www.youtube.com Part 2 - www.youtube.com Part 3 - www.youtube...
Category:
Comedy
Uploaded:
04 Apr, 2011
Duration:
9m 7s
Joseph Freeman and the Lollygaggers - ORLWHYK...
Joseph Freeman and the Lollygaggers and their smash hit "Regular, Ordi...
Category:
Entertainment
Uploaded:
14 Sep, 2007
Duration:
4m 36s
Joseph Freeman (Debris Chaos) Vs Craig Freema...
Again with the shaky camera. I apologize and will work on the camera m...
Category:
Gaming
Uploaded:
04 Feb, 2011
Duration:
8m 19s
Kirkland Lane Joseph Freeman's Interview
Description of remaining fabric of #6 Kirkland Lane