background image

62

S t y l i s t i c   S T 5 0 0 0   S e r i e s   T a b l e t   P C   U s e r ’ s   G u i d e   –   A p p e n d i x   A

Wireless LAN Glossary

Access point

A designation of wireless LAN network configurations. 
It indicates a form of communication using an Access 
Point. For details, refer to “access point connection” on 
page 50.

Ad hoc

A designation for wireless LAN network configuration. 
It indicates a form of communication limited to those 
personal computers which have wireless LAN function. 
For details, refer to “Ad hoc connection” on page 50.

Channel

The frequency band of wireless LAN to be used in 
communications over wireless LAN or at the access 
point.

DHCP (Dynamic Host Configuration Protocol)

A protocol used for automatically fetching communica-
tion parameters such as IP addresses. The side which 
assigns IP address is called DHCP server and the side 
that is assigned it is called DHCP client.

DNS (Domain Name System)

A function that controls the correspondence of IP 
addresses assigned to a computer with the name. Even 
for those computers whose IP addresses are unknown, if 
their names are known, it is possible to communicate 
with them.

IEEE802.11a

One of the wireless LAN standards prescribed by the 
802.11 committee in charge of establishing standards of 
LAN technology in IEEE (Institute of Electrical and 
Electronic Engineers). It allows communications at the 
maximum speed of 54 Mbps by using a 5GHz band 
which can freely be used without radio communication 
license. 

IEEE802.11b

One of the wireless LAN standards prescribed by the 
802.11 committee in charge of establishing standards of 
LAN technology in IEEE (Institute of Electrical and 
Electronic Engineers). It allows communications at the 
maximum speed of 11Mbps by a band of 2.4 GHz (ISM 
band) which can freely be used without radio communi-
cation license. 

IP address

An address used by computers for communicating in 
TCP/IP environment. IP addresses have global and 

private addresses. A global address is a unique address in 
the world. A private address is a unique address within a 
closed network.

LAN (Local Area Network)

An environment connecting computers within a rela-
tively small range, such as the same floor and building.

MAC address (Media Access Control Address)

A physical address inherent to a network card. For 
Ethernet, the top three bytes are controlled/assigned as a 
vendor code. The remaining three bytes comprise the 
code uniquely (to avoid duplication) controlled by each 
vendor. As a result, there is no Ethernet card with the 
same physical address in the world. In Ethernet, the 
frame transmission/reception is performed based on this 
address.

MTU (Maximum Transmission Unit)

The maximum size of data which can be transmitted at 
one time in networks including the Internet. In an envi-
ronment whose maximum size of data is too large to 
correctly receive data, normal communications can be 
restored by setting the size of MTU to a smaller value.

Network authentication

The method of authentication performed by wireless 
LAN clients to connect with the access point. There are 
two types: open system authentication and shared key 
authentication. The type of authentication must be set 
to each client and also coincide with the setting of access 
point with which to communicate. Network authentica-
tion is sometimes called authentication mode.

Network key

Data that is used for encrypting data in data communi-
cation. The personal computer uses the same network 
key both for data encryption and decryption, therefore, 
it is necessary to set the same network key as the other 
side of communication.

Network name (SSID: Service Set Identifier)

The network name is a unique identifier attached to the 
WLAN packet header that acts as a password when the 
client attempts to connect to a WLAN. The SSID differ-
entiates one WLAN from another so all WLAN devices 
attempting to connect to a specific WLAN must use the 
same SSID. SSID’s are transmitted in cleartext, thus 
supplying no security to the WLAN.

Ocampa3_UG.book  Page 62  Monday, August 23, 2004  9:25 AM

Summary of Contents for ST5020D - Stylistic - Pentium M 1.1 GHz

Page 1: ...ory Stick is a registered trademark of Sony Corpora tion and or its affiliates Wi Fi is a trademark of the Wireless Ethernet Compati bility Alliance WECA All other products are trademarks or registered trade marks of their respective companies Copyright 2004 Fujitsu Computer Systems Corporation All rights reserved No part of this publication may be copied reproduced or translated without the prior...

Page 2: ...S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e ...

Page 3: ...ng System Operation 24 Adjusting the Display Brightness 24 Using the Pen 24 Calibrating the Pen 25 Installing a Pen Tether 25 Replacing the Pen Tip 25 Charging the Battery 25 Removing and Installing the Battery 26 Tips for Conserving Battery Power 26 Modem Connection 27 Memory Stick SD Card Slot 27 PC Card Slot 28 Removing and Installing Memory Modules 28 3 CARE AND MAINTENANCE Caring for Your Sty...

Page 4: ...her settings Setting of power saving function 59 Troubleshooting the WLAN Troubleshooting 60 Wireless LAN Glossary Glossary 62 IP address information Additonal information 64 Specifications Specification 65 Using the Bluetooth Device What is Bluetooth 66 Where to find information about Bluetooth 66 APPENDIX B SECURITY DEVICE USER S GUIDE Fingerprint Sensor Device Introducing the Fingerprint Sensor...

Page 5: ...Preface ...

Page 6: ...S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e P r e f a c e ...

Page 7: ... 2724 E mail 8fujitsu us fujitsu com Web site http us fujitsu com computers Before you place the call you should have the following information ready so the customer support representative can provide you with the fastest possible solution Product name Product configuration number Product serial number Purchase date Conditions under which the problem occurred Any error messages that have occurred ...

Page 8: ...S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e P r e f a c e ...

Page 9: ...1 Getting Started with Your Stylistic ST5000 Series Tablet PC ...

Page 10: ...S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e ...

Page 11: ... ST5000 SERIES TABLET PC Verify that the following items are included in the box with your Tablet PC Stylistic ST5000 Series active pen Pen tips quantity 5 Pen tip removal tool Pen tether Main battery Power cord AC adapter Screen protectors quantity 2 Getting Started Guide Quick Tips Guide Drivers and Application Restore DAR CD System Restore DVD The Stylistic ST5000 Series Tablet PC is available ...

Page 12: ...es Tablet PC Executive Leather Portfolio Case Bump Case Tablet PC Nylon Attaché Case Easel Case Harsh Environment Case HEC Hand Strap Media Options External USB Floppy Disk Drive USB CD ROM Drive External DVD CD ROM Combo Drive Memory 256 MB SO DIMM DDR333 128 MB Compact Flash Card 512 MB SO DIMM DDR333 256 MB Compact Flash Card 1 GB SO DIMM DDR333 128 MB Secure Digital Memory Card Power Options A...

Page 13: ...the charge level of the battery and the security panel Power On Suspend Resume button Allows you to turn on off suspend resume hibernate or wake the Tablet PC in order to optimize battery life Application buttons Allow you to quickly launch pre defined applications and utilities by pressing a button Navigation buttons The navigation buttons allow you to move Page Up Page Down Tab Right Tab Left Cu...

Page 14: ...r over the memory modules Thermal Suede Several areas of the system back are covered with thermal suede This material should not be removed It is designed to minimize the heat that the user feels when the system has been operating for an extended period of time Wireless LAN module cover Provides protection for the optional wireless LAN radio Wireless LAN Bluetooth On Off switch For systems with th...

Page 15: ...ovides secondary cooling for processor Do not obstruct the vents SD Card Memory Stick Slot The Secure Digital SD card Memory Stick slot allows you to install a flash memory card for data storage Flash memory cards allow you to transfer data to and from a variety of different digital devices IrDA FIR port Provides an infrared interface for communication with devices compliant with IrDA Standard Rev...

Page 16: ... to connect an external VGA XGA or SVGA CRT monitor Modem jack Allows you to connect a standard RJ 11 connector to the Tablet PC s internal 56 Kbps modem Note that the internal 56 Kbps LAN modem module installed in the Stylistic ST5000 Series Tablet PC has actual maximum transfer rates of 53 Kbps receive 33 6 Kbps send and 14 4 Kbps fax Download rates are limited to 53 Kbps in the United States du...

Page 17: ...tore the pen when not in use Infrared keyboard mouse port The infrared port wraps around the front and bottom of the display and is used for communicating with an optional proprietary infrared keyboard or mouse Wireless LAN location The optional wireless LAN device is located inside of the system housing These peripherals and accessories are sold separately Pen Pen Holder Infrared Keyboard Mouse P...

Page 18: ... blinking LED flashes at the rate of once per second an LED that is blinking slow flashes at the rate of one second on five seconds off Icon Mode State LED State Remarks Power On State Idle Mode Green continuous The system is powered on and ready for use Suspend to RAM Green blinking The system has suspended and saved active settings to RAM Off State Hibernate Save to Disk Off The system has suspe...

Page 19: ...te Save to Disk without AC adapter If battery is inserted during power off LED blinks amber for 4 seconds to detect battery Battery status is displayed for 5 seconds after that HDD Access On State or flashing Idle Mode Green Displayed when hard disk drive is accessed Suspend to RAM Hibernate Save to Disk Off State Off Hard disk drive is not being accessed Security On State Green continuous until p...

Page 20: ...utton Internet Button When you press the EMail button you automatically launch Microsoft Outlook Express where you can read create and send emails When you press the Fn EMail buttons at the same time you automatically launch the Web browser The default page to which you go is the Fujitsu home page If you would like to change your home page go to the Control Panel Internet Options Select the Genera...

Page 21: ...r keystroke combination as assigned in the Tablet Button Settings utility You can change the settings in Control Panel Tablet Button Settings By default pressing the Fn Ent combination acts the same as if you had pressed Alt on a keyboard it selects a main menu in the typical Windows application Function Button Fujitsu Menu Utility The Function button works in conjunction with the other applicatio...

Page 22: ...able 1 4 Navigation Buttons Ctl Alt Del is the only Application button that can be used while the system is logging on or when the system is locked i e when you have the Logon or Computer Locked window showing on your desktop Buttons icons Purpose when pressed alone Primary function Purpose when pressed with Fn button Secondary function This button consists of Page Up and Page Down segments When t...

Page 23: ...he selected item if applicable to change to the next item Pressing this is the same as tapping the spacebar on a keyboard Escape Button Pressing the Esc button while the BIOS is open acts to escape from the BIOS This is the same as if you had tapped Esc on a keyboard Enter Button Pressing the Ent button while the BIOS is open acts the same as the Ent button on a keyboard Function Button Pressing t...

Page 24: ...em management Individual computers in a group environment should not use a common password A password consists of one to five button strokes plus the enter button A valid stroke consists of pushing one or up to four buttons simulta neously The following are valid button strokes Pushing 4 by itself Pushing 2 and 3 at the same time Pushing 1 2 and 4 at the same time Pushing 1 2 3 and 4 at the same t...

Page 25: ...e beeping will stop and the Tablet PC will resume normal operation If no password is entered or an invalid password is entered while the system beeps the system will return to its previous locked state standby or off and the Security Indicator will go off To reactivate the Tablet PC after a password failure you must press the Suspend Resume button then enter a correct password PRECAUTIONS Low Batt...

Page 26: ...anel Application Supervisor folder on the CD and double click the setup exe file The Installing Security Panel Applica tion window will appear Follow the instructions on the screen 2 Go to the Utilities Security Panel Application User folder on the CD and double click the setup exe file The Installing Security Panel Application window will appear Follow the instructions on the screen Supervisor an...

Page 27: ...Digital SD Card or a Memory Stick Microphone jack Connect an external microphone The internal microphone is disabled when you plug in an external microphone Headphone jack Connect stereo headphones or powered external speakers The internal speaker is disabled when you plug in external headphones or powered speakers IrDA FIR port An infrared transceiver built into the Tablet PC allows you to commun...

Page 28: ...d drives to your Tablet PC Suspend Resume button The Suspend Resume Power On button allows you to suspend Tablet PC activity without powering off resume your Tablet PC from suspend mode and power on the system when it has been shut down from Windows Page Up Page Down The Page Up Page Down button allows you to navigate quickly from page to page without scrolling Local Area Network LAN The LAN RJ 45...

Page 29: ...19 2 Using Your Stylistic ST5000 Series Tablet PC ...

Page 30: ...20 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o ...

Page 31: ...r input when in Suspend to RAM mode Refer to the Resuming System Operation section later in this chapter for information on returning the system to the On state Hibernate mode Save to Disk S4 System operation is suspended All system functions are turned off to conserve power Active data in programs that were running before suspending system operation is stored on the hard disk drive The system doe...

Page 32: ...e system SHUTTING DOWN THE SYSTEM Follow these steps to shut down and turn off your system 1 If system operation has been suspended resume system operation See Resuming System Opera tion later in this chapter for details 2 Save your work and close all running programs 3 Choose Shut Down from the Windows Start menu 4 Carry out the Shut Down command The system is now in the Off state SUSPENDING SYST...

Page 33: ...may be configured to enter Hibernate mode automatically after a period of time in Suspend to RAM mode The system uses a small amount of battery power when in Suspend to RAM mode Eventually the battery will become fully discharged If the battery charge drops to a Low Battery Warning level while the system is running the system will beep periodically If this occurs suspend system operation shut down...

Page 34: ...ing recognition also allow you to write characters directly on the screen with the pen You can also use the pen as a drawing tool Figure 2 1 Stylistic ST5000 Series Pen The screen reacts when the pen tip is approximately 1 8 inch 3 5mm from the screen The pen has three switches a tip switch and a barrel button toggle switch with switches at both ends When activated the tip switch corresponds to th...

Page 35: ...nd of the pen tether with the larger loop to the attachment point on your pen tablet To do so insert the end of the pen tether through the attach ment point then feed the pen through the large loop in the tether REPLACING THE PEN TIP With use the pen tip may become worn or may pick up foreign particles that can scratch the screen A damaged or worn tip may not move freely causing unpredictable resu...

Page 36: ... PC 1 Choose one of the following If a charged battery is available you can suspend system operation A built in bridge battery will maintain the system in Suspend to RAM mode for about 5 minutes while the battery is removed this allows time for replacement with a charged battery If a charged battery is not available save your work and close all running programs then shut down the system or Hiberna...

Page 37: ...supports Memory Stick and SD flash memory cards on which you can store and transfer data to and from a variety of digital devices These cards use flash memory architecture which means they don t need a power source to retain data Memory Stick is a flash memory technology developed by Sony Electronics Memory Stick allows you to record transfer and share digital content such as digital pictures movi...

Page 38: ...gure 2 6 Installing a PC Card Removing a PC Card To remove a PC Card first click the Safely Remove Hardware icon in the system tray in the bottom right hand corner of the display Select PC Card from the list and click Stop Press the PC Card eject button so that it pops out Once the button has popped out press it firmly to eject the card See Figure 2 7 for location Figure 2 7 Removing a PC Card REM...

Page 39: ... module is installed in the Tablet PC and you can now use the system Removing a Memory Module To remove a DIMM module 1 Ensure that the Tablet PC is off To do so carry out the Shut Down command in the Start menu Do not attempt to remove or install a DIMM module when the system is in Suspend mode or running 2 Remove the screws from the cover plate on the back of the Tablet PC and remove the cover p...

Page 40: ...30 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o ...

Page 41: ...31 3 Care and Maintenance ...

Page 42: ...32 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T h r e e ...

Page 43: ...en protector will help ensure the screen remains as clear as possible When installed the screen protector becomes a durable replaceable writing surface that protects the display screen from abrasion To obtain additional screen protectors use Fujitsu part number FPCSP08AP 6 pack when ordering Additional information about installation is included with the screen protectors To install a new screen pr...

Page 44: ...nsitive components system functions are auto matically limited or turned off to prevent damage To avoid overheating the Tablet PC do not obstruct the air vents on the top and bottom edges of the Tablet PC CLEANING THE DISPLAY SCREEN To clean the Tablet PC display screen wipe the screen surface gently using a soft cotton cloth slightly damp ened with water or isopropyl alcohol TROUBLESHOOTING Solut...

Page 45: ...eller or call Fujitsu Service and Support at 1 800 8Fujitsu 1 800 838 5487 for further assistance Speaker Headphone Volume Too Low If the audio volume on your Tablet PC speaker or external headphones is too low check the following Ensure the speaker or headphone output if using headphones is enabled To do so open the Control Panel and double click on the Sounds and Audio Devices icon Select the pr...

Page 46: ...not at the top of the list arrow down to the drive in the list and press the space bar or the key to move it to the top of the list The system attempts to boot from the devices in the order in which they are listed Note that the BIOS for some systems will indicate CD ROM Drive even when a DVD drive is connected 5 If you have an external DVD drive connected proceed to the next step otherwise procee...

Page 47: ...37 4 Specifications ...

Page 48: ...38 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F o u r ...

Page 49: ...icular model may vary To determine the specifications for your system please visit our Web site at http us fujitsu com computers 10 4 Display Reflective Color LCD Active Digitizer Outdoor viewable 16 bit color 10 4 TFT XGA 1024 x 768 16M colors Brightness 8 levels VRAM Intel 855GME chipset with 8MB shared memory using Unified Memory Architecture UMA delivers low power high performance 3D 2D graphi...

Page 50: ...ery 90 5 hours 100 6 hours Bridge Battery 6 cell NiMH 35 mAh Life with Suspend to RAM on bridge battery only 5 minutes from full charge AC Adapter Autosensing 100 240V supplying 16 VDC with a current of 3 75 A Stylistic ST5000 Specifications Continued Environmental Specifications Temperature Operating 41o 95o F 5o 35o C Non operational 5o 140o F 15o 60o C Humidity Operating 20 85 non condensing No...

Page 51: ...41 5 Agency Notices ...

Page 52: ...42 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F i v e ...

Page 53: ...he label The REN is used to deter mine the number of devices that may be connected to a telephone line Excessive RENs on a telephone may result in the devices not ringing in response to an incoming call In most but not all areas the sum of RENs should not exceed five 5 0 To be certain of the number of devices that may be connected to a line as determined by the total RENs contact the local telepho...

Page 54: ...icables au matériel terminal Cette confor mité est confirmée par le numéro d enregistrement Le sigle IC placé devant le numéro d enregistrement signifie que l enregistrement s est effectué conformé ment à une déclaration de conformité et indique que les spécifications techniques d Industrie Canada ont été respectées Il n implique pas qu Industrie Canada a approuvé le matériel Avant de connecter ce...

Page 55: ...k connection must be a line cord using a minimum 26 AWG wire For continued protection against risk of fire replace only with the same type and rating fuse Danger of explosion if Lithium clock battery is incorrectly replaced Replace only with the same or equivalent type recommended by the manufacturer Dis pose of used batteries according to the manufacturer s instruction Hg LAMP S INSIDE THIS PRODU...

Page 56: ...46 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F i v e ...

Page 57: ...47 Appendix A Wireless LAN Bluetooth User s Guide Optional devices ...

Page 58: ...48 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x A ...

Page 59: ...rference that may cause undesired operation of this device FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installa tion This equipment generates uses and can radiate radio frequency ...

Page 60: ...rates in both the 2 4 GHz and 5 GHz RF bands It does not require an FCC license to operate It uses Direct Sequence Spread Spectrum DSSS an RF modulation scheme that is resistant to noise This wireless module is Wi Fi compliant The wireless module can communicate at a maximum data rate of 54 Mbps The maximum communication range is approxi mately 80 feet 25 meters inside a building Please note that ...

Page 61: ...llowing precautions when using your wireless LAN module For optimum wireless communications it recom mended that operation of the wireless LAN module occur within 25 meters of the Access Point Wireless range is dependent on a multitude of factors including number of obstructions walls type of construction material reflective objects etc If the computer is unable to communicate properly change the ...

Page 62: ...Atheros Wireless Configuration Utility window will be displayed 2 Click the Wireless Networks tab 3 Click the Enable Radio box to clear it then click the OK button Wireless communications on off switching will be deactivated and the transmission of radio waves from the wireless LAN will be stopped STARTING TRANSMISSION To communicate using the wireless LAN function set the computer to a status fro...

Page 63: ...he network contact the network administrator for data settings 1 Make sure the Wireless LAN switch is switched on 2 Click the Start button first and then Control Panel 3 If the Control Panel is in Category view switch to Classic view by clicking Switch to Classic View under Control Panel the left frame If you are already in Classic view Switch to Category View will be displayed instead 4 Double cl...

Page 64: ...adecimal character code format The charac ters that can be used as the network key in this case are as follows 0 9 A Z a f For ad hoc connection Assign the same network key to all the personal computers to be con nected For access point infrastructure connection Assign the identical network key that is pro grammed into the access point For this setting refer to the access point manual or contact y...

Page 65: ...9 Click the OK button 10 Close the Network Connection window Following this operation confirm the names of the computer and the workgroup as follows Confirming the computer and work group names 1 Click the Start button then Control Panel 2 If the Control Panel is in Category view switch to Classic view by clicking Switch to Classic View under Control Panel the left frame If you are already in Clas...

Page 66: ...older in drive C as an example 1 Click the Start button first and then My Com puter 2 Double click Local disk C 3 Right click the work folder or whichever folder you want to share and then click Sharing and Security in the menu displayed The Folder Name Properties window will be displayed 4 Click Sharing if it isn t already selected 5 Click the link stating If you understand the secu rity risks bu...

Page 67: ...n use Infrastructure AP will be displayed If ad hoc connection is in use Ad hoc Peer to peer will be displayed Security Displays the encryption type currently used by the radio Speed Displays the current data rate used by the radio to transmit and receive data Band Frequency The current operating frequency band is displayed When communication is possible 802 11b 2 4 GHz is displayed Channel The ch...

Page 68: ...k Name SSID currently used by the radio Power Save Mode Displays the configured Power Save Mode currently used by the radio Off Normal or Maximum will be displayed BSSID Displays the Basic Service Set Identifier This is typically the MAC address of the Access Point or in the case of AdHoc networks is a randomly generated MAC address Frequency Displays the center frequency currently being used by t...

Page 69: ... the transmission power Setting of channels during ad hoc connection You can set channels during ad hoc connection Channel 11 is set by default When connecting to an existing ad hoc network no channel setting will be effective This setting is only effective during ad hoc connection it will be ineffective during access point connection Intel PROSet Wireless LAN 1 Click Start All Programs Intel Netw...

Page 70: ... ening the distance to the access point or removing any obstacles for better sight To check the wave condition refer to the following pages Confirming the status of the radio waves on page 57 Radio wave transmission has stopped Check if the wireless switch is turned ON Also verify Disable Radio is not checked in Network setting window Refer to Starting Transmis sion on page 52 The computer to be c...

Page 71: ...played as 169 254 XXX YYY or 0 0 0 0 IP address is not correctly fetched from the access point In that case restart the computer itself If the display is still unchanged check the setting of TCP IP If Cable Disconnected or Media Disconnected is displayed without showing IP address check the setting of network name SSID and network key Also set the network authentication according to the access poi...

Page 72: ...P environment IP addresses have global and private addresses A global address is a unique address in the world A private address is a unique address within a closed network LAN Local Area Network An environment connecting computers within a rela tively small range such as the same floor and building MAC address Media Access Control Address A physical address inherent to a network card For Ethernet...

Page 73: ...1 wireless LAN authentication method When a client attempts to associate to an access point the access point will send a challenge to the client The client encrypts the challenge with the network key and sends it back to the access point If the access point can decrypt the challenge then authentication has succeeded SSID Service Set Identifier See Network name Subnet mask TCP IP network is control...

Page 74: ...found in the network An IP address is expressed with four values in the range between 1 and 255 Set the each computer as follows The value in paren theses is a subnet mask Example Computer A 192 168 100 2 255 255 255 0 Computer B 192 168 100 3 255 255 255 0 Computer C 192 168 100 4 255 255 255 0 Computer X 192 168 100 254 255 255 255 0 IP addressing is much more complicated than can be briefly exp...

Page 75: ...acket traffic type of applications used etc The number of 10 provided by this document is meant only as a guideline and not a limitation of the technology Item Specification Type of network Conforms to IEEE 802 11a 802 11b g Wi Fi based Transfer rate Automatic switching 54 Mbps maximum data rate Active frequency 802 11b g 2400 2473 MHz 802 11a 4900 5850 MHz Number of channels 802 11a 8 independent...

Page 76: ...n select User s Guide For additional information about Bluetooth Technology visit the Bluetooth Web site at www bluetooth com FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment The transmitters in this device must not be co located or operated in conjunction with any other antenna or transmitter Canadian Notice To p...

Page 77: ...67 Appendix B Security Device User s Guide Optional devices ...

Page 78: ...68 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x B ...

Page 79: ...User Enrollment on page 70 You can determine whether OmniPass has already been installed by checking to see if the following are present The presence of the gold key shaped OmniPass icon in the system tray at the bottom right of the screen The presence of the Softex program group in the Programs group of the Start menu System Requirements The OmniPass application requires space on your hard drive ...

Page 80: ...omputer and enrolls an OmniPass user with username John_01 and password freq14 He then goes to his webmail site to log onto his account He inputs his webmail credentials as usual username John_02 and password tablet but instead of clicking Submit he directs OmniPass to Remember Password Now whenever he returns to that site OmniPass will prompt him to supply access credentials John enters his OmniP...

Page 81: ...ow Swiping too fast or too slow will result in a failed capture The Choose Finger screen has a Practice button click it to practice capturing your fingerprint When you are comfortable with how your fingerprint is captured proceed to enroll a finger 3 Once OmniPass has successfully acquired the finger print the Verify Fingerprint screen will automati cally appear To verify your enrolled fingerprint...

Page 82: ...to gain access to the site Click Finish to complete the remember password proce dure The site location the credentials to access the site and the OmniPass authentication settings for the site are now stored in the OmniPass secure database The OmniPass authentication settings Settings for this Pass word Site can always be changed in Vault Management Logging in to a Remembered Site Whether or not Om...

Page 83: ...y and click OK then click Apply You can now switch to the new identity and start remembering passwords To delete an identity highlight the identity you want to delete and click Delete Identity then click Apply To set the default identity highlight the identity you want as default and click Set as Default click Apply to ensure the settings are saved If you log in to OmniPass with a fingerprint devi...

Page 84: ...membered passwords I want to take all my passwords to new sys tem I export Tom s OmniPass user profile I go to my new system and using the Control Panel I create a user with the username Tom and the password Sun shine I can now successfully import the OmniPass user data to the new system If you export an OmniPass only user you can import that user to any computer running OmniPass pro vided that a ...

Page 85: ... check if you have a finger enrolled and click Next System Settings The OmniPass Startup Options interface can be found in the System Settings tab With these options you can specify how your OmniPass Logon is tied to your Windows Logon The first option Automatically log on to OmniPass as the current user will do just as it says during Windows login you will be logged on to OmniPass using your Wind...

Page 86: ...e difficulties persist then try the following procedure Click Start Control Panel Administrative Tools and Local Security Settings Expand Local Policies expand Security Options and double click Accounts Limit local account use of blank pass words to console login only This setting should be set to Disabled Dialog appears after OmniPass authentication during Windows Logon After installing OmniPass ...

Page 87: ...atically go to the setup exe file on the disc and double click on it 3 Follow the instructions that appear on your screen to load the drivers and applications for TPM 4 After loading the software you will be prompted to reboot your system Remove the CD from the drive then reboot 5 After rebooting the Security Platform Installation Wizard will open and lead you through the setup and customization o...

Page 88: ...78 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x B ...

Page 89: ...ophone 3 C calibrating the pen 25 care and maintenance 33 charge DC input icon 8 charging the battery pack 25 cleaning the display screen 34 configuring peripherals interface 35 connectors and peripheral interfaces 17 conserving battery power 26 conventions used in the guide v critically low battery level 23 cursor not tracking pen 35 D DC input connector 17 DC power connector 6 DIMM card removing...

Page 90: ...l accessories 2 carrying cases 2 docking options 2 input devices 2 media options 2 memory 2 power options 2 overheating avoiding 34 P page up page down 18 PC Card eject button 5 PC card slot 5 17 28 PC Cards removing 28 pen 5 7 installing a pen tether 25 not responding 35 replacing the tip 25 using 24 pen tether 25 pen tether point 5 peripheral connectors 17 power icon 8 22 blinking 22 23 not disp...

Page 91: ...ode 23 24 system interface connector 4 system states 21 22 Hibernate Save to Disk 21 Idle state 21 Off state 21 On state 21 Suspend to RAM 21 system status LEDs 3 system will not resume operation 34 T Tablet Dock latch point 4 Tablet Dock port 17 tertiary functions of application buttons 13 14 thermal suede 4 troubleshooting 34 Trusted Platform Module enabling the security chip in BIOS 77 getting ...

Page 92: ...82 S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C ...

Reviews: