Lithium-ion battery technology: Getting the most from Smart Batteries
Page 2
... HP Smart Battery Technology, and proper battery care practices. The temperature of the battery, the applications running on the notebook, any attached devices, the brightness of the display, and the notebook power management settings all determine the run time and lifespan. Lithium-ion batteries A lithium...current flow to the battery is not simple. Detailed in this document are described in parallel based on how and where the notebook is "How long will the battery last?" As mobile computing becomes more energy, and retain their lithium-ion rechargeable batteries in off mode. This...
... HP Smart Battery Technology, and proper battery care practices. The temperature of the battery, the applications running on the notebook, any attached devices, the brightness of the display, and the notebook power management settings all determine the run time and lifespan. Lithium-ion batteries A lithium...current flow to the battery is not simple. Detailed in this document are described in parallel based on how and where the notebook is "How long will the battery last?" As mobile computing becomes more energy, and retain their lithium-ion rechargeable batteries in off mode. This...
WLAN solutions for HP enterprise notebooks and Tablet PCs
Page 5
... however, is tested in -factory verification of the user; The adapter must be incomplete without addressing the solutions offered by combining standards-based and Ciscoproprietary technologies. The HP antennas are Cisco compatible, as verified through extensive independent testing. This allows customers to provide leading performance ...deploy in the laboratory, and then it is not enough. HP WLAN adapters HP notebooks and tablet PCs for WLAN devices assures compatibility between Cisco Aironet WLAN products and HP notebooks through the Cisco Compatible Extensions Program.
... however, is tested in -factory verification of the user; The adapter must be incomplete without addressing the solutions offered by combining standards-based and Ciscoproprietary technologies. The HP antennas are Cisco compatible, as verified through extensive independent testing. This allows customers to provide leading performance ...deploy in the laboratory, and then it is not enough. HP WLAN adapters HP notebooks and tablet PCs for WLAN devices assures compatibility between Cisco Aironet WLAN products and HP notebooks through the Cisco Compatible Extensions Program.
HP ProtectTools Security Manager
Page 2
... on a range of HP products • Biometrics and RFID (Radio Frequency Identification) are expected to boot • Device configuration lock down • Remote management capabilities While these security features increasingly rely on software modules, which provide important client...extensible and therefore can be used . Introduction As computers are getting increasingly mobile and better connected, threats to solving this problem. Client device security options feature a number of capabilities based on a variety of technologies: • Notebook and desktop computers can ...
... on a range of HP products • Biometrics and RFID (Radio Frequency Identification) are expected to boot • Device configuration lock down • Remote management capabilities While these security features increasingly rely on software modules, which provide important client...extensible and therefore can be used . Introduction As computers are getting increasingly mobile and better connected, threats to solving this problem. Client device security options feature a number of capabilities based on a variety of technologies: • Notebook and desktop computers can ...
Wireless Security
Page 3
... Security Manager - or TPM - In addition, security solutions can be difficult to deploy and use , all-in enabling product-based security attributes is often expensive and complex The HP ProtectTools Security Manager is also extensible and therefore can be added easily by using... solutions for data encryption and user authentication • The Trusted Platform Module - These include features such as they become available. Mobile Device Security and HP Protect Tools HP saw the need to span multiple technologies • Extensibility: solutions must adapt as security needs...
... Security Manager - or TPM - In addition, security solutions can be difficult to deploy and use , all-in enabling product-based security attributes is often expensive and complex The HP ProtectTools Security Manager is also extensible and therefore can be added easily by using... solutions for data encryption and user authentication • The Trusted Platform Module - These include features such as they become available. Mobile Device Security and HP Protect Tools HP saw the need to span multiple technologies • Extensibility: solutions must adapt as security needs...
Wireless Security
Page 4
...was developed by IEEE volunteers. Spoofing the MAC address is needed as they are emerging and IP networks are evolving to address these devices support TKIP and AES Encryption. Virtual Private Network Implementations HP solutions: HP Production WLAN HP Wireless Internet Access Vendor Solutions for WEP ... of WEP Key (40-64 bit WEB) Lucent 128 bit Agere 152 bit WEB US Robotics 256 bit WEP MAC Address Filtering Server based Access point based This extension of the WEP key did not help . Also, these concerns. We are focused on -site customers/vendors. Some solutions...
...was developed by IEEE volunteers. Spoofing the MAC address is needed as they are emerging and IP networks are evolving to address these devices support TKIP and AES Encryption. Virtual Private Network Implementations HP solutions: HP Production WLAN HP Wireless Internet Access Vendor Solutions for WEP ... of WEP Key (40-64 bit WEB) Lucent 128 bit Agere 152 bit WEB US Robotics 256 bit WEP MAC Address Filtering Server based Access point based This extension of the WEP key did not help . Also, these concerns. We are focused on -site customers/vendors. Some solutions...
Wireless Security
Page 5
...greater performance 5 It would be possible to address the vulnerabilities in TKIP. driven by the industry - Previous methods authenticated the device, but it is a robust security solution with enhancement of hardware and introduction of security for stronger network access control. WPA ... with the upcoming 802.11i standard. However, with the following features: • Implements 802.1X EAP (Extended Authentication Protocol) based authentication to enforce mutual authentication. • Applies Temporal Key Integrity Protocol (TKIP) on 802.11 Wireless LANs are always sent ...
...greater performance 5 It would be possible to address the vulnerabilities in TKIP. driven by the industry - Previous methods authenticated the device, but it is a robust security solution with enhancement of hardware and introduction of security for stronger network access control. WPA ... with the upcoming 802.11i standard. However, with the following features: • Implements 802.1X EAP (Extended Authentication Protocol) based authentication to enforce mutual authentication. • Applies Temporal Key Integrity Protocol (TKIP) on 802.11 Wireless LANs are always sent ...
Wireless Security
Page 6
...straightforward replacement to the need for home users. and challenged it to an authentication server. In these instances, most available consumer devices offer authentication within the device with a WPA pre-shared key. TKIP, AES, and others. IEEE 802.11i To address WEP security issues, IEEE ... Because authentication is generally recognized as CISCO 6 HP products are currently in development and will be extended or certificate-based, in addition to enhance the security features for the industry and will be affordable or available for certificate authentication. ...
...straightforward replacement to the need for home users. and challenged it to an authentication server. In these instances, most available consumer devices offer authentication within the device with a WPA pre-shared key. TKIP, AES, and others. IEEE 802.11i To address WEP security issues, IEEE ... Because authentication is generally recognized as CISCO 6 HP products are currently in development and will be extended or certificate-based, in addition to enhance the security features for the industry and will be affordable or available for certificate authentication. ...
Wireless Security
Page 9
...carry the WPA2 certification label. Over the past eight years, wireless security has undergone major changes to WPA, 802.11i - Users should ensure all HP mobile devices. This is no need for wireless security that attests to find stronger data protection and user authentication, as well as Hewlett-Packard, CISCO and Microsoft.... Microsoft Windows XP Service Pack 2 offers enhancements for an authentication server. In addition, WPA-Pre-Shared Key was released June 25th, 2004, and products based on almost all Access Points and routers have WPA or 802.11i certification.
...carry the WPA2 certification label. Over the past eight years, wireless security has undergone major changes to WPA, 802.11i - Users should ensure all HP mobile devices. This is no need for wireless security that attests to find stronger data protection and user authentication, as well as Hewlett-Packard, CISCO and Microsoft.... Microsoft Windows XP Service Pack 2 offers enhancements for an authentication server. In addition, WPA-Pre-Shared Key was released June 25th, 2004, and products based on almost all Access Points and routers have WPA or 802.11i certification.
HP ProtectTools: Authentication technologies and suitability to task
Page 2
.... Authentication support in order. The process of the box to combine the different authentication devices to provide multifactor authentication policies. Who the person is based on it's suitability to task. Credential Manager supports multiple authentication technologies centrally, and has... on suitability to task. However, if user authentication is based on the combination of the above traits, unauthorized access becomes that combine the above traits to provide a varying degree of hardware authentication devices, such as the pre-boot environment. A number of ...
.... Authentication support in order. The process of the box to combine the different authentication devices to provide multifactor authentication policies. Who the person is based on it's suitability to task. Credential Manager supports multiple authentication technologies centrally, and has... on suitability to task. However, if user authentication is based on the combination of the above traits, unauthorized access becomes that combine the above traits to provide a varying degree of hardware authentication devices, such as the pre-boot environment. A number of ...
HP ProtectTools: Authentication technologies and suitability to task
Page 4
... Drivelock security, by utilizing the TPM to validate the authentication data. Pros Can enable stronger device and user authentication Integrated into clients Enhanced hardware based security for HP ProtectTools adds a further layer of protection 2 Public Key Infrastructure (PKI): Technology... that employs encryption to authentication devices that the user be costly User credentials are not portable Smart ...
... Drivelock security, by utilizing the TPM to validate the authentication data. Pros Can enable stronger device and user authentication Integrated into clients Enhanced hardware based security for HP ProtectTools adds a further layer of protection 2 Public Key Infrastructure (PKI): Technology... that employs encryption to authentication devices that the user be costly User credentials are not portable Smart ...
HP ProtectTools: Authentication technologies and suitability to task
Page 7
... create a virtual token on the hard drive can be entered before any storage device connected to achieve multi-factor authentication. Virtual tokens are not cryptographic devices. What the person knows, what the person has and who the person is based on HP Yes Yes clients 6 Windows Logon via Credential Yes Yes Manager Can...
... create a virtual token on the hard drive can be entered before any storage device connected to achieve multi-factor authentication. Virtual tokens are not cryptographic devices. What the person knows, what the person has and who the person is based on HP Yes Yes clients 6 Windows Logon via Credential Yes Yes Manager Can...
Hardware Guide
Page 37
... num lock mode, you work, press the num lk key on the external keypad, not on or off. Press f10 while the F10 = ROM Based Setup message is turned on, the num lock light on the notebook turns on the Documentation Library CD to start up with the external keypad... preference in the lower left corner of the screen. ❏ To change the language, press f2. ❏ For navigation instructions, press f1. 3. Select Advanced > Device Options, then press enter. 2-14 Hardware Guide For more information about using Computer Setup, refer on . When num lock on an external keypad is displayed...
... num lock mode, you work, press the num lk key on the external keypad, not on or off. Press f10 while the F10 = ROM Based Setup message is turned on, the num lock light on the notebook turns on the Documentation Library CD to start up with the external keypad... preference in the lower left corner of the screen. ❏ To change the language, press f2. ❏ For navigation instructions, press f1. 3. Select Advanced > Device Options, then press enter. 2-14 Hardware Guide For more information about using Computer Setup, refer on . When num lock on an external keypad is displayed...
Hardware Guide
Page 92
...For more information and software installation instructions, refer to external power. Press f10 while the F10 = ROM Based Setup message is usually included with the device. Select Advanced menu > Device Options. 4. Powered hubs must enable USB legacy support to use a USB keyboard, mouse, or hub connected... to a USB connector on the notebook or an optional Port Replicator, or to other USB devices. Some USB devices may require additional support software, which is displayed in a non-Windows application or utility. Enabling USB Legacy Support You must ...
...For more information and software installation instructions, refer to external power. Press f10 while the F10 = ROM Based Setup message is usually included with the device. Select Advanced menu > Device Options. 4. Powered hubs must enable USB legacy support to use a USB keyboard, mouse, or hub connected... to a USB connector on the notebook or an optional Port Replicator, or to other USB devices. Some USB devices may require additional support software, which is displayed in a non-Windows application or utility. Enabling USB Legacy Support You must ...
Software Guide
Page 28
Save your preferences. For more information about Computer Setup, refer in this guide to select Advanced > Device Options. Use the arrow keys to the "Computer Setup" chapter. Use the arrow keys to enable or disable SpeedStep. Windows XP Processor Controls ...❏ Select Disable to run in Battery Optimized mode and disable all SpeedStep settings in the SpeedStep window. 3. Press f10 while the F10 = ROM Based Setup message is displayed in the Power Options window. 2-16 Software Guide To access the SpeedStep settings in Computer Setup: 1. Power Enabling SpeedStep in Computer...
Save your preferences. For more information about Computer Setup, refer in this guide to select Advanced > Device Options. Use the arrow keys to the "Computer Setup" chapter. Use the arrow keys to enable or disable SpeedStep. Windows XP Processor Controls ...❏ Select Disable to run in Battery Optimized mode and disable all SpeedStep settings in the SpeedStep window. 3. Press f10 while the F10 = ROM Based Setup message is displayed in the Power Options window. 2-16 Software Guide To access the SpeedStep settings in Computer Setup: 1. Power Enabling SpeedStep in Computer...
Software Guide
Page 36
... entered with embedded numeric keypad number keys. (For information about the embedded numeric keypad, refer on the Documentation Library CD to the Hardware Guide, "Pointing Devices and Keyboard" chapter.) Understanding Power-On Passwords A power-on password set with the same type of the notebook. A power-on password is set and entered... must be recognized if it is not case-sensitive. For example, a power-on password prevents unauthorized use of keys. Press f10 while the F10 = ROM Based Setup message is displayed in Computer Setup.
... entered with embedded numeric keypad number keys. (For information about the embedded numeric keypad, refer on the Documentation Library CD to the Hardware Guide, "Pointing Devices and Keyboard" chapter.) Understanding Power-On Passwords A power-on password set with the same type of the notebook. A power-on password is set and entered... must be recognized if it is not case-sensitive. For example, a power-on password prevents unauthorized use of keys. Press f10 while the F10 = ROM Based Setup message is displayed in Computer Setup.
Software Guide
Page 44
...To save your preferences, select File > Save Changes and Exit, then follow the instructions on or restarting the notebook. Disabling a Device From the Computer Setup Device Security menu, you exit Computer Setup and take effect when the notebook restarts. Your preferences are set when you can disable or ...preferences, use arrow keys to Disable, then press f10. 7. To save your preferences, press f10. 4. Press f10 while the F10 = ROM Based Setup message is displayed in the Old Password field, then press f10. 8. Use the arrow keys to select the location of the screen. ❏...
...To save your preferences, select File > Save Changes and Exit, then follow the instructions on or restarting the notebook. Disabling a Device From the Computer Setup Device Security menu, you exit Computer Setup and take effect when the notebook restarts. Your preferences are set when you can disable or ...preferences, use arrow keys to Disable, then press f10. 7. To save your preferences, press f10. 4. Press f10 while the F10 = ROM Based Setup message is displayed in the Old Password field, then press f10. 8. Use the arrow keys to select the location of the screen. ❏...
Software Guide
Page 69
...the notebook hard drive bay. 3. To open Computer Setup, turn on or restart the notebook. To enable a device or location for inclusion in MultiBoot. Press f10 while the f10 = ROM Based Setup message is associated with the NIC, changing the boot order of a NIC does not affect drive letters ...of the screen. ❏ To change the language, press f2. ❏ For navigation instructions, press f1. Enabling Bootable Devices in Computer Setup The notebook can...
...the notebook hard drive bay. 3. To open Computer Setup, turn on or restart the notebook. To enable a device or location for inclusion in MultiBoot. Press f10 while the f10 = ROM Based Setup message is associated with the NIC, changing the boot order of a NIC does not affect drive letters ...of the screen. ❏ To change the language, press f2. ❏ For navigation instructions, press f1. Enabling Bootable Devices in Computer Setup The notebook can...
Software Guide
Page 71
...starts up from a NIC does not affect logical drive designations because no drive letter is started or restarted. This feature prompts you for a startup device each time it is associated with Computer Setup: 1. Toggle the MultiBoot field to select Advanced > Boot Options, then press enter. 3. Press ...f10 while the F10 = ROM Based Setup message is started or restarted with the NIC. ■ Drives in an optional Port Replicator are treated like external USB devices in the boot sequence and must be enabled in the lower left of the ...
...starts up from a NIC does not affect logical drive designations because no drive letter is started or restarted. This feature prompts you for a startup device each time it is associated with Computer Setup: 1. Toggle the MultiBoot field to select Advanced > Boot Options, then press enter. 3. Press ...f10 while the F10 = ROM Based Setup message is started or restarted with the NIC. ■ Drives in an optional Port Replicator are treated like external USB devices in the boot sequence and must be enabled in the lower left of the ...
Software Guide
Page 78
... by USB can be used even when the operating system is working or will not load. you exit Computer Setup. ✎ Pointing devices are not supported in this chapter provide an overview of Computer Setup options. 8 Computer Setup Using Computer Setup Computer Setup is a preinstalled, ROM...-based utility that can be used with Computer Setup only if USB legacy support is enabled. If the operating system is not working , the...
... by USB can be used even when the operating system is working or will not load. you exit Computer Setup. ✎ Pointing devices are not supported in this chapter provide an overview of Computer Setup options. 8 Computer Setup Using Computer Setup Computer Setup is a preinstalled, ROM...-based utility that can be used with Computer Setup only if USB legacy support is enabled. If the operating system is not working , the...
HP Compaq nc8000 Business PC, HP Compaq nw8000 Mobile Workstation - Maintenance and Service Guide
Page 20
... Card flash media slot ■ Integrated 10/100/1000 BASE-T Ethernet local area network (LAN) NIC with RJ-45 connector ■ Integrated wireless support for Bluetooth® LAN and Mini PCI 802.11a/b/g LAN devices ■ Support for fixed optical drive and MultiBay device ■ Support for two Type II/Type III PC...
... Card flash media slot ■ Integrated 10/100/1000 BASE-T Ethernet local area network (LAN) NIC with RJ-45 connector ■ Integrated wireless support for Bluetooth® LAN and Mini PCI 802.11a/b/g LAN devices ■ Support for fixed optical drive and MultiBay device ■ Support for two Type II/Type III PC...