Lenovo PC 300PL User guide for IBM PC300PL (type 6584, 6594) systems - Page 46

IBM security solutions, Data protection

Page 46 highlights

The Asset ID EEPROM contains prerecorded information about the system, including its configuration and the serial numbers of key components. The Asset ID EEPROM also includes a number of blank fields you can record with your choice of information. The Asset ID can be scanned from a short distance. The scanning of the Asset ID does not require the computer cover to be removed or even require that the computer be removed from the box in which it is shipped. This type of wireless tracking enables quicker system deployment and improved asset control. For the latest information on personal computer security features, visit the IBM support page at http://www.pc.ibm.com/security/ on the World Wide Web. IBM security solutions IBM security solutions keep electronic business transactions safe. They include the following: Integrated security chip called the signature generation chip that gives you the functionality of a SMART card without the added cost Enhanced security support User Verification Manager software that helps manage authentication so you decide who has access to the components of your system Data protection You can lose data from the hard disk drive for a variety of reasons. Security violations, viruses, or hard disk drive failure can all contribute to the destruction of data files. To protect against the loss of valuable information, IBM has incorporated many data-saving features within your computer. SMART hard disk drive Your computer comes with a SMART (Self-Monitoring, Analysis, and Reporting Technology) hard disk drive that is enabled to report potential hard disk failures. If an error is detected, a DMI-compliant warning message is sent to the computer screen and, if the computer is part of a network, to an administrator console. Once an error is detected, the data on the hard disk can be backed up and the drive replaced. 32 PC 300PL User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194

The Asset ID EEPROM contains prerecorded information about the system,
including its configuration and the serial numbers of key components.
The
Asset ID EEPROM also includes a number of blank fields you can record
with your choice of information.
The Asset ID can be scanned from a short
distance.
The scanning of the Asset ID does not require the computer cover
to be removed or even require that the computer be removed from the box
in which it is shipped.
This type of wireless tracking enables quicker
system deployment and improved asset control.
For the latest information on personal computer security features, visit the
IBM support page at http://www.pc.ibm.com/security/ on the World
Wide Web.
IBM security solutions
IBM security solutions keep electronic business transactions safe.
They
include the following:
±
Integrated security chip called the
signature generation chip
that gives
you the functionality of a SMART card without the added cost
±
Enhanced security support
±
User Verification Manager software that helps manage authentication
so you decide who has access to the components of your system
Data protection
You can lose data from the hard disk drive for a variety of reasons.
Security violations, viruses, or hard disk drive failure can all contribute to
the destruction of data files.
To protect against the loss of valuable
information, IBM has incorporated many data-saving features within your
computer.
SMART hard disk drive
Your computer comes with a SMART (Self-Monitoring, Analysis, and
Reporting Technology) hard disk drive that is enabled to report potential
hard disk failures.
If an error is detected, a DMI-compliant warning
message is sent to the computer screen and, if the computer is part of a
network, to an administrator console.
Once an error is detected, the data on
the hard disk can be backed up and the drive replaced.
32
PC 300PL User Guide