Hybrid RPL
, which installs hybrid images (or files) on the hard disk. If your
computer is a Hybrid RPL client, each time the computer starts from the network,
LANClient Control Manager downloads a small
bootstrap
program to your
computer hard disk drive and avoids the network traffic associated with a
standard RPL.
DHCP is a protocol that lets network administrators centrally manage and
automate the assignment of Internet Protocol (IP) addresses on a network.
Remote Administration
A network administrator can use the Remote Administration feature to remotely
update the POST and BIOS code in your computer.
Network-management software, such as LANClient Control Manager (LCCM), is
required to take advantage of this feature.
LANClient Control Manager
LANClient Control Manager is a graphical, server-based program that aids in
system deployment by allowing mass unattended installations of operating
systems, complete software images, device drivers, and BIOS code updates to
remote systems. Used with Wake on LAN, LCCM can remotely turn on your
computer, which means that installation can be done while the computer is not
being used.
For more information or to download this software, visit
http://www.ibm.com/pc/us/desktop/lccm on the World Wide Web.
System Migration Assistant
System Migration Assistant (SMA) helps administrators remotely transfer
configurations, profile settings, printer drivers, and files from an IBM or non-IBM
PC to supported IBM systems.
For more information or to download this software, visit
http://www.pc.ibm.com/us/software/sysmgmt/products/sma on the World Wide
Web.
Desktop Management Interface
DMI is a method for gathering information about the hardware and software in
your computer. In a network environment, network administrators can use DMI to
remotely monitor and control your computer.
Using security features
To deter unauthorized use of your computer, you can use anti-intrusion features
and other security features that are provided with your computer.
Anti-intrusion features
IBM anti-intrusion features help protect against the theft of computer components,
such as the microprocessor, system memory modules, or hard disk drives.
A cover lock is built into your computer to prevent the cover from being removed.
Two identical keys for the cover lock are also supplied. A tag attached to the keys
has the key serial number and the address of the key manufacturer.
Chapter 3. Operating your computer
23
Содержание IntelliStation E Pro 6836
Страница 1: ...IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846 SC06 P456 60...
Страница 2: ......
Страница 3: ...IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846 SC06 P456 60...
Страница 16: ...xiv IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846...
Страница 34: ...18 IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846...
Страница 42: ...26 IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846...
Страница 48: ...32 IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846...
Страница 130: ...114 IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846...
Страница 132: ...116 IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846...
Страница 134: ...118 IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846...
Страница 150: ...134 IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846...
Страница 154: ...138 IBM IntelliStation E Pro User s Guide IntelliStation E Pro Types 6836 6846...
Страница 155: ......