Lenovo NetVista X40 Quick Reference for NetVista 2179 and 6643 systems (Dutch) - Page 39
Remote Administration, LANClient Control Manager, System Migration Assistant
View all Lenovo NetVista X40 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 39 highlights
Hybrid RPL, which installs hybrid images (or files) on the hard disk. If your computer is a Hybrid RPL client, each time the computer starts from the network, LANClient Control Manager downloads a small bootstrap program to your computer hard disk drive and avoids the network traffic associated with a standard RPL. DHCP is a protocol that lets network administrators centrally manage and automate the assignment of Internet Protocol (IP) addresses on a network. Remote Administration A network administrator can use the Remote Administration feature to remotely update the POST and BIOS code in your computer. Network-management software, such as LANClient Control Manager (LCCM), is required to take advantage of this feature. LANClient Control Manager LANClient Control Manager is a graphical, server-based program that aids in system deployment by allowing mass unattended installations of operating systems, complete software images, device drivers, and BIOS code updates to remote systems. Used with Wake on LAN, LCCM can remotely turn on your computer, which means that installation can be done while the computer is not being used. For more information or to download this software, visit http://www.ibm.com/pc/us/desktop/lccm on the World Wide Web. System Migration Assistant System Migration Assistant (SMA) helps administrators remotely transfer configurations, profile settings, printer drivers, and files from an IBM or non-IBM PC to supported IBM systems. For more information or to download this software, visit http://www.pc.ibm.com/us/software/sysmgmt/products/sma on the World Wide Web. Desktop Management Interface DMI is a method for gathering information about the hardware and software in your computer. In a network environment, network administrators can use DMI to remotely monitor and control your computer. Using security features To deter unauthorized use of your computer, you can use anti-intrusion features and other security features that are provided with your computer. Anti-intrusion features IBM anti-intrusion features help protect against the theft of computer components, such as the microprocessor, system memory modules, or hard disk drives. A cover lock is built into your computer to prevent the cover from being removed. Two identical keys for the cover lock are also supplied. A tag attached to the keys has the key serial number and the address of the key manufacturer. Chapter 3. Operating your computer 23