Christopher Harry Austen - Pflugerville TX, US Garry Michael Kump - Apex NC, US Kanisha Patel - Austin TX, US Christopher T. Schnorr - New Hill NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
714 57, 714 4, 714 25, 714 37, 714 47
Abstract:
The exemplary embodiments provide a computer-implemented method, apparatus, and computer-usable program code for reporting operating system faults on an Intelligent Platform Management Interface compliant server. In response to receiving an alert for an operating system fault, the alert for the operating system fault is converted into an IPMI event. The IPMI event is stored in an internal event log. An IPMI system event record is created for the IPMI event. The IPMI event is sent to a host management controller in order to enable monitoring of the operating system fault.
Methods Apparatus And Program Products For Wireless Access Points
David C. Challener - Raleigh NC, US Garry M. Kump - Apex NC, US David R. Safford - Brewster NY, US Douglas L. Schales - Mt. Kisco NY, US Leendert P. Van Doorn - Valhalla NY, US
Assignee:
Lenovo Singapore Pte. Ltd - Singapore
International Classification:
H04L 9/32 G06F 11/00
US Classification:
726 2, 726 3, 726 22, 726 23
Abstract:
Methods, apparatus and program products which monitor wireless access points () through which data can be exchanged with a network (), identify an unauthorized access point (), and respond to monitored data flow in a variety of manners including determining the location of the identified unauthorized access point, establishing filtering, and controlling accounting for access services.
Methods, Apparatus And Program Product For Controlling Network Security
Garry Kump - Apex NC, US Francis Noel - Durham NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04J001/16 H04J003/14
US Classification:
370/229000, 370/230100
Abstract:
Methods, apparatus and program products which monitor access points through which data can be exchanged with a network, identify an unauthorized access point, and selectively apply filters to the flow of data through an unauthorized access point.