[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

DMI

Posted on 1998-07-23
5
Medium Priority
?
474 Views
Last Modified: 2010-04-26

What is a DMI pool with respect to a P.C Pentium?
0
Comment
Question by:nairsubodh
  • 2
  • 2
5 Comments
 
LVL 17

Expert Comment

by:mikecr
ID: 1121396
It's where you plug and play information is kept when the computer boots up so that when you install a new component the plug and play operating system can find it quickly by looking at the DMI Pool data. That's about the easiest way to explain it.

Mike
0
 

Author Comment

by:nairsubodh
ID: 1121397
a) What is the expansion of DMI?
b) Where is this data stored?
c) How is this data updated?
0
 

Author Comment

by:nairsubodh
ID: 1121398
Adjusted points to 200
0
 
LVL 17

Expert Comment

by:mikecr
ID: 1121399
The data is stored in NVRAM or non volatile ram and is updated when you use the update feature located in the Bios setup routine to update the NVRAM after you make a change to the system configuration. Is this what your looking for?

Mike
0
 
LVL 1

Accepted Solution

by:
skylab060398 earned 600 total points
ID: 1121400
Desktop Management Interface,(DMI), is an API that enables software to collect information about computer hardware.
e.g. by using DMI a program can figure out what software and expansion cards are installed on your system.

DMI is platform and operating system independent. Which means, no matter which system they're running in the programs can make the same function calls to collect information. This is done by using plain text files (MIF to be exact)which contain info about your software and hardware.

I hope that helped!
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses
Course of the Month17 days, 17 hours left to enroll

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question