1 / 39

ideapad U350 BIOS & Software

Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!!. ideapad U350 BIOS & Software. TSC, lenovo. BIOS -- Enter BIOS Setup. Press ‘F2’ during POST to enter BIOS setup. BIOS -- Main Menu.

Télécharger la présentation

ideapad U350 BIOS & Software

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Please Note:Information contained in this document is consideredLENOVO CONFIDENTIALFor Lenovo Internal Use OnlyDo Not Copy or Distribute!!

  2. ideapad U350 BIOS & Software TSC, lenovo

  3. BIOS -- Enter BIOS Setup Press ‘F2’ during POST to enter BIOS setup

  4. BIOS -- Main Menu

  5. BIOS -- Advanced Menu

  6. BIOS -- Security Menu

  7. BIOS -- Boot Menu

  8. BIOS -- Exit Menu

  9. BIOS -- Other Videos of BIOS setup are provided:

  10. G550 Software Applications

  11. Software -- VeriFace™ 3.5 Face Recognition Face recognition software gives customers a cool and fun way to logon to the PC easily and friendly. NEW! Live detection Stops unauthorized users from using a photo of the owner to log in. Checks head movement and other characteristics to determine if a real person or a photo Users can enable/ disable the live detection or set the sensitivity level according to their preference. • Your face is your password • Supports multiple users Login log review Check who has tried to log into your computer Leave a video message Unauthorized users can leave a video message for the computer owner to view when they return. File encryption/decryptionEncrypt and decrypt sensitive files, using your face as the password!

  12. Software -- VeriFace™ 3.5 Face Recognition Enrolling Face Image 2 1 3 1. Create password first.

  13. Software -- VeriFace™ 3.5 Face Recognition Enrolling Face Image • Attention: • Due to the camera's limitation in light sensitivity, we strongly • recommend that you locate in an environment where the light • distribution is even and stable. The following situations can all • have possible negative effects on the result: • Bright dome light • Slanting desk lamp • Near a bright window • Dim light 2. Enroll face image as your password.

  14. Software -- VeriFace™ 3.5 Face Recognition Log Manager View all log and message records Settings About Help

  15. Live detection is disabled (Default) Software -- VeriFace™ 3.5 Face Recognition Setting The help file of this software is provided

  16. Your face is your password Software -- VeriFace™ 3.5 Face Recognition VeriFace Logon

  17. Cancel Logon You can leave a 30s video message Software -- VeriFace™ 3.5 Face Recognition Leave a video message

  18. Software -- ReadyComm 5.0 Integrated communications management software provides a single intuitive interface to create, manage and share internet connections.  Single user interface for all networking requirements Easy to set up direct peer-to-peer connections to quickly transfer files between 2 computers*  ReadComm Help Float Icon

  19. Software -- ReadyComm 5.0 Networks

  20. Refresh Clear Share the screen with other users Add my shared devices Download selected shared device Add games to the IGRS game Disable all current screen shares Send the invitation to share screens Add Send Refresh Add my shared files and folders Download selected shared files/folders Software -- ReadyComm 5.0 Sharing

  21. Clear Import Up Down Software -- ReadyComm 5.0 Options

  22. EasyCapture 3.5 Easy photo capture software with advanced effects, makes use of built-in webcam.  Take photos Record video Store and navigate picture & video files Apply special effects Apply backgrounds & borders Motion Control – activate camera based on user movement     

  23. Software -- Easy Capture User Interface settings Photo Mode Photos & videos captured Capture

  24. Software -- Easy Capture Media View Browse photos and videos

  25. Software -- Easy Capture Settings

  26. Software --Lenovo Energy Management Power Schemes Energy Management provides a total of five power usage schemes. Right-click or double-click the program icon on the taskbar and select any power scheme

  27. Software --Lenovo Energy Management UI State Super Energy Saver Settings Energy Star Balanced Power Saver High Performance Help Info

  28. Software --Lenovo Energy Management Settings

  29. Software --Lenovo Energy Management Battery Information

  30. Onekey 6.0 Main functions • Windows module • System backup • Backup system to local hard disk/DVD/other Removable Device • Incremental backup to local hard disk • Recovery disc creation • Burn the backup image to recovery disc • OneKey Rescue System module • System recovery • Restore system partition to factory default • Restore system partition to user’s backup • Data backup • Backup user data even system is damaged • Password management • Protect the unauthorized users to restore system

  31. Key features (Top 5 highlighted in blue) • Safe • Keep factory default in hidden partition from being damaged; • Strong stability itself; • Speedy • Full backup system at 400M/min-500M/min in average; • Quick incremental backup based on the changed data; • Restore system at 850M/min-1000M/min in average ; • Easy • The simple wizard for user; • The full helpful information in user interface; • Complete • Support to backup and restore system partition; • Support to copy user data to other device if necessary; • Support to create recovery disc;

  32. The main UI Windows module System backup Recovery disc creation • OneKey Rescue System module • System recovery • Data backup • Password managemet

  33. CYBERLINK CONFIDENTIAL Back up to default path and input description. 2 1 Select full back up. 3 Check summary 4 Begin back up. System backup-full backup

  34. CYBERLINK CONFIDENTIAL 2 Select incremental back up. Input description. • Incremental backup point number no limited. • Incremental backup point number depends on your space size of hard disk. • If your D:\ drive space not enough, you will see the messenger on the screen: The available space is not enough. 4 Check summary. Begin back up. System backup-Incremental backup 1 3

  35. System recovery-restore to factory default Select restore mode 1 1 2 2 summary • Restore to factory default would destroy all the data on the system partition. User can’t undo the operation • Restore to factory default would destroy all the data on the system partition. User can’t undo the operation

  36. System recovery-restore to user backup 1 1 Select restore mode 2 2 Select source 4 4 3 3 Select recover point or backup file. Summary

  37. Backup user data 1 1 Select source to backup 2 2 Select destination 3 Summary. Begin to backup 4

  38. Setting password Default no password 1 1 2 2 Setting password confirmation 3 Complete message.

More Related