420 likes | 790 Views
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!!. ideapad U350 BIOS & Software. TSC, lenovo. BIOS -- Enter BIOS Setup. Press ‘F2’ during POST to enter BIOS setup. BIOS -- Main Menu.
E N D
Please Note:Information contained in this document is consideredLENOVO CONFIDENTIALFor Lenovo Internal Use OnlyDo Not Copy or Distribute!!
ideapad U350 BIOS & Software TSC, lenovo
BIOS -- Enter BIOS Setup Press ‘F2’ during POST to enter BIOS setup
BIOS -- Other Videos of BIOS setup are provided:
Software -- VeriFace™ 3.5 Face Recognition Face recognition software gives customers a cool and fun way to logon to the PC easily and friendly. NEW! Live detection Stops unauthorized users from using a photo of the owner to log in. Checks head movement and other characteristics to determine if a real person or a photo Users can enable/ disable the live detection or set the sensitivity level according to their preference. • Your face is your password • Supports multiple users Login log review Check who has tried to log into your computer Leave a video message Unauthorized users can leave a video message for the computer owner to view when they return. File encryption/decryptionEncrypt and decrypt sensitive files, using your face as the password!
Software -- VeriFace™ 3.5 Face Recognition Enrolling Face Image 2 1 3 1. Create password first.
Software -- VeriFace™ 3.5 Face Recognition Enrolling Face Image • Attention: • Due to the camera's limitation in light sensitivity, we strongly • recommend that you locate in an environment where the light • distribution is even and stable. The following situations can all • have possible negative effects on the result: • Bright dome light • Slanting desk lamp • Near a bright window • Dim light 2. Enroll face image as your password.
Software -- VeriFace™ 3.5 Face Recognition Log Manager View all log and message records Settings About Help
Live detection is disabled (Default) Software -- VeriFace™ 3.5 Face Recognition Setting The help file of this software is provided
Your face is your password Software -- VeriFace™ 3.5 Face Recognition VeriFace Logon
Cancel Logon You can leave a 30s video message Software -- VeriFace™ 3.5 Face Recognition Leave a video message
Software -- ReadyComm 5.0 Integrated communications management software provides a single intuitive interface to create, manage and share internet connections. Single user interface for all networking requirements Easy to set up direct peer-to-peer connections to quickly transfer files between 2 computers* ReadComm Help Float Icon
Software -- ReadyComm 5.0 Networks
Refresh Clear Share the screen with other users Add my shared devices Download selected shared device Add games to the IGRS game Disable all current screen shares Send the invitation to share screens Add Send Refresh Add my shared files and folders Download selected shared files/folders Software -- ReadyComm 5.0 Sharing
Clear Import Up Down Software -- ReadyComm 5.0 Options
EasyCapture 3.5 Easy photo capture software with advanced effects, makes use of built-in webcam. Take photos Record video Store and navigate picture & video files Apply special effects Apply backgrounds & borders Motion Control – activate camera based on user movement
Software -- Easy Capture User Interface settings Photo Mode Photos & videos captured Capture
Software -- Easy Capture Media View Browse photos and videos
Software -- Easy Capture Settings
Software --Lenovo Energy Management Power Schemes Energy Management provides a total of five power usage schemes. Right-click or double-click the program icon on the taskbar and select any power scheme
Software --Lenovo Energy Management UI State Super Energy Saver Settings Energy Star Balanced Power Saver High Performance Help Info
Software --Lenovo Energy Management Settings
Software --Lenovo Energy Management Battery Information
Onekey 6.0 Main functions • Windows module • System backup • Backup system to local hard disk/DVD/other Removable Device • Incremental backup to local hard disk • Recovery disc creation • Burn the backup image to recovery disc • OneKey Rescue System module • System recovery • Restore system partition to factory default • Restore system partition to user’s backup • Data backup • Backup user data even system is damaged • Password management • Protect the unauthorized users to restore system
Key features (Top 5 highlighted in blue) • Safe • Keep factory default in hidden partition from being damaged; • Strong stability itself; • Speedy • Full backup system at 400M/min-500M/min in average; • Quick incremental backup based on the changed data; • Restore system at 850M/min-1000M/min in average ; • Easy • The simple wizard for user; • The full helpful information in user interface; • Complete • Support to backup and restore system partition; • Support to copy user data to other device if necessary; • Support to create recovery disc;
The main UI Windows module System backup Recovery disc creation • OneKey Rescue System module • System recovery • Data backup • Password managemet
CYBERLINK CONFIDENTIAL Back up to default path and input description. 2 1 Select full back up. 3 Check summary 4 Begin back up. System backup-full backup
CYBERLINK CONFIDENTIAL 2 Select incremental back up. Input description. • Incremental backup point number no limited. • Incremental backup point number depends on your space size of hard disk. • If your D:\ drive space not enough, you will see the messenger on the screen: The available space is not enough. 4 Check summary. Begin back up. System backup-Incremental backup 1 3
System recovery-restore to factory default Select restore mode 1 1 2 2 summary • Restore to factory default would destroy all the data on the system partition. User can’t undo the operation • Restore to factory default would destroy all the data on the system partition. User can’t undo the operation
System recovery-restore to user backup 1 1 Select restore mode 2 2 Select source 4 4 3 3 Select recover point or backup file. Summary
Backup user data 1 1 Select source to backup 2 2 Select destination 3 Summary. Begin to backup 4
Setting password Default no password 1 1 2 2 Setting password confirmation 3 Complete message.