HP Z2 Mini G3 Workstation Maintenance and Service Guide

Total Page:16

File Type:pdf, Size:1020Kb

HP Z2 Mini G3 Workstation Maintenance and Service Guide HP Z2 Mini G3 Workstation Maintenance and Service Guide Copyright Information Warranty Trademark Credits © Copyright 2016 HP Development Company, The information contained herein is subject to Microsoft and Windows are U.S. registered L.P. change without notice. The only warranties for trademarks of the Microsoft group of HP products and services are set forth in the companies. First Edition: December 2016 express warranty statements accompanying such products and services. Nothing herein Intel, Intel Xeon, and Intel Core are trademarks Part number: 902551-001 should be construed as constituting an of Intel Corporation in the U.S. and other additional warranty. HP shall not be liable for countries. technical or editorial errors or omissions contained herein. Bluetooth is a trademark owned by its proprietor and used by HP Company under Not all features are available in all editions of license. Windows. This computer may require upgraded and/or separately purchased hardware, drivers, ENERGY STAR is a registered trademark owned and/or software to take full advantage of by the U.S. Environmental Protection Agency Windows functionality. See (EPA). http://www.microsoft.com for details. Red Hat is a registered trademark of Red Hat, Inc. in the United States and other countries. NVIDIA and the NVIDIA logo are trademarks and/or registered trademarks of NVIDIA Corporation in the U.S. and other countries. About this guide This guide provides service and maintenance information. IMPORTANT: Removal and replacement procedures are now available in videos on the HP website. Go to the HP Customer Self Repair Services Media Library at http://www.hp.com/go/sml. Guide topics Hardware overview on page 1 System management on page 13 Component replacement information and guidelines on page 45 Diagnostics and troubleshooting on page 56 Resetting the password jumper on page 79 Linux technical notes on page 82 System board designators on page 84 NOTE: View the HP Z2 Mini G3 Workstation User Guide at http://www.hp.com/support/ workstation_manuals. iii iv About this guide Table of contents 1 Hardware overview ........................................................................................................................................ 1 Front ....................................................................................................................................................................... 2 Left ......................................................................................................................................................................... 3 Rear ........................................................................................................................................................................ 4 Performance model ............................................................................................................................. 4 Entry model ......................................................................................................................................... 5 Chassis components .............................................................................................................................................. 6 System board components .................................................................................................................................... 7 System board architecture .................................................................................................................................... 9 Computer specifications ...................................................................................................................................... 10 Physical characteristics and technical specifications ....................................................................... 10 Environmental specifications ............................................................................................................ 11 Ensuring proper ventilation .............................................................................................................. 12 2 System management ................................................................................................................................... 13 Adding monitors .................................................................................................................................................. 14 Planning for additional monitors ...................................................................................................... 14 Entry model ..................................................................................................................... 14 Performance model ........................................................................................................ 14 Planning process ............................................................................................................. 15 Matching graphics card connector to monitor connectors ............................................................... 16 Identifying monitor connection requirements ................................................................................. 16 Connecting and configuring monitors .............................................................................................. 16 Customizing the monitor display (Windows) .................................................................................... 17 Power management features .............................................................................................................................. 17 ERP compliance mode ....................................................................................................................... 17 Hyper-Threading Technology (HTT) .................................................................................................. 18 SATA Power Management ................................................................................................................. 18 Intel Turbo Boost Technology ........................................................................................................... 18 BIOS ROM ............................................................................................................................................................. 18 Computer Setup (F10) Utilities ............................................................................................................................ 18 Using Computer Setup (F10) Utilities ................................................................................................ 19 Computer Setup–Main ....................................................................................................................... 20 Computer Setup—Security ............................................................................................................... 22 Computer Setup—Advanced ............................................................................................................. 23 Desktop management ......................................................................................................................................... 29 v Initial computer configuration and deployment ............................................................................... 30 Installing a remote system ............................................................................................................... 30 Copying a setup configuration to another computer ....................................................................... 30 Updating and managing software .................................................................................................... 31 LANDesk Software ............................................................................................................................. 31 HP SoftPaq Download Manager ........................................................................................................ 31 HP System Software Manager .......................................................................................................... 31 ROM Flash .......................................................................................................................................... 32 Remote ROM Flash .......................................................................................................... 32 HPBiosUpdRec ................................................................................................................. 32 FailSafe Boot Block ............................................................................................................................ 32 Recovering the computer from Boot Block Recovery mode .......................................... 33 Computer security ............................................................................................................................. 33 Asset tracking ................................................................................................................. 33 SATA hard drive security ................................................................................................. 34 DriveLock applications ................................................................................. 34 Using DriveLock ............................................................................................ 35 Password security ..........................................................................................................
Recommended publications
  • The Resurrection of Permadeath: an Analysis of the Sustainability of Permadeath Use in Video Games
    The Resurrection of Permadeath: An analysis of the sustainability of Permadeath use in Video Games. Hugh Ruddy A research paper submitted to the University of Dublin, in partial fulfilment of the requirements for the degree of Master of Science Interactive Digital Media 2014 Declaration I declare that the work described in this research paper is, except where otherwise stated, entirely my own work and has not been submitted as an exercise for a degree at this or any other university. Signed: ___________________ Hugh Ruddy 28th February 2014 Permission to lend and/or copy I agree that Trinity College Library may lend or copy this research Paper upon request. Signed: ___________________ Hugh Ruddy 28th February 2014 Abstract The purpose of this research paper is to study the the past, present and future use of Permadeath in video games. The emergence of Permadeath games in recent months has exposed the mainstream gaming population to the concept of the permanent death of the game avatar, a notion that has been vehemently avoided by game developers in the past. The paper discusses the many incarnations of Permadeath that have been implemented since the dawn of video games, and uses examples to illustrate how gamers are crying out for games to challenge them in a unique way. The aims of this are to highlight the potential that Permadeath has in the gaming world to become a genre by itself, as well as to give insights into the ways in which gamers play Permadeath games at the present. To carry out this research, the paper examines the motivation players have to play games from a theoretical standpoint, and investigates how the possibilty of failure in video games should not be something gamers stay away from.
    [Show full text]
  • Death Narratives: a Typology of Narratological Embeddings of Player's Death in Digital Games by Frank G
    Untitled. Photographer: Pawel Kadysz (https://stocksnap.io/photo/OZ4IBMDS8E). Special Issue Video Gaming and Death edited by John W. Borchert Issue 09 (2018) articles Introduction to a Special Issue on Video Gaming and Death by John W. Borchert, 1 Death Narratives: A Typology of Narratological Embeddings of Player's Death in Digital Games by Frank G. Bosman, 12 No Sympathy for Devils: What Christian Video Games Can Teach Us About Violence in Family-Friendly Entertainment by Vincent Gonzalez, 53 Perilous and Peril-Less Gaming: Representations of Death with Nintendo’s Wolf Link Amiibo by Rex Barnes, 107 “You Shouldn’t Have Done That”: “Ben Drowned” and the Uncanny Horror of the Haunted Cartridge by John Sanders, 135 Win to Exit: Perma-Death and Resurrection in Sword Art Online and Log Horizon by David McConeghy, 170 Death, Fabulation, and Virtual Reality Gaming by Jordan Brady Loewen, 202 The Self Across the Gap of Death: Some Christian Constructions of Continued Identity from Athenagoras to Ratzinger and Their Relevance to Digital Reconstitutions by Joshua Wise, 222 reviews Graveyard Keeper. A Review by Kathrin Trattner, 250 interviews Interview with Dr. Beverley Foulks McGuire on Video-Gaming, Buddhism, and Death by John W. Borchert, 259 reports Dying in the Game: A Perceptive of Life, Death and Rebirth Through World of Warcraft by Wanda Gregory, 265 Death Narratives: A Typology of Narratological Embeddings of Player's Death in Digital Games Frank G. Bosman Abstract Ludologically, the death of the game’s protagonist (also known as player’s death of avatar death) is one of the most prominent feedback systems of almost all digital games.
    [Show full text]
  • Game Review of Roberta Williams'
    Game Review of Roberta Williams’ Game Review of Roberta Williams’ Phantasmagoria Alicia Ong History of Computer Game Design: Technology, Culture, and Business February 22, 2001 Contents Publication Information Story and Gameplay Technical Aspects Design of the Game "Success" of the Game Endnotes Publication Information Title: Phantasmagoria Date of Release: Spring 1995 Company: Sierra Studios http://www.stanford.edu/~aradia/Phantasmagoria.htm (1 of 9) [2/23/2001 2:42:50 PM] Game Review of Roberta Williams’ Designed and Written By: Roberta Williams Story by: Roberta Williams, Andy Hoyos Director: Peter Maris Producers: Mark Seibert, J.Mark Hood, Roberta Williams Art Director: Andy Hoyos Game Directors: Roberta Williams, Andy Hoyos, Mark Seibert, J. Mark Hood Lead Programmer: Doug Oldfield Musicians: Jay Usher, Mark Seibert Movie Sequences Scored By: Mark Seibert Opening and Closing Themes: Consumite Furore by Mark Seibert performed by Mark Seibert and the CSUF Concert Choir conducted by: Dr. Gary Unruh Take a Stand by Mark Seibert performed by Mark Seibert Mike Berkowitz-Bass Jacqueline Goodwin-Lead Vocal Paul Thaxter-Drums Both recorded at Maximus and Engineered by Jeff Hall Choir on Movies: The Esoterics Additional Music by: Neal Grandstaff Quality Assurance Lead: Robin Bradley Video Production by Sierra Studios Video Production Supervisor: Bill Crow Lighting and Camera: Randy Littlejohn Assitant Lighting and Camera: Robert Ballew, Craig Denny UltiMatte and Video Engineer: Robert Koeppel Stage Manager: Robert Ballew Property Master:
    [Show full text]
  • Maryland District Test Coordinator Training Winter 2021 Transcript
    MARYLAND DISTRICT TEST COORDINATOR TRAINING WINTER 2021 TRANSCRIPT Slide 1. This presentation is for district test coordinators for the Dynamic Learning Maps® (DLM®) Alternate Assessment. Slide 2. This presentation includes an overview of the DLM assessment and the DLM website for any new district test coordinators not already familiar with the assessment and for returning district test coordinators who may find the information refreshing. The presentation will also address data management responsibilities, updates for 2020–2021, and the necessary steps for a student to be assessed. Slide 3. The following section explains the design of the assessment. Slide 4. Maryland requires students to be assessed in grades 3 through 8 and 11 in ELA and mathematics. Assessing grade 12 students is optional. The ELA portion of the assessment includes both reading and writing. For science, students in grades 5 and 8 are assessed on physical, life, and Earth and space science concepts, but grade 11 students are assessed on biology only. Slide 5. The DLM Essential Elements are the learning targets for the assessment. Essential Elements provide a bridge from grade-level content standards to academic expectations for students with the most significant cognitive disabilities and align to states’ grade-level standards. Slide 6. ELA, mathematics, and science each have a blueprint, and within each blueprint the Essential Elements assessed are listed by grade or grade band. In ELA and mathematics, the Essential Elements for each grade are sub-grouped into claims and conceptual areas. Science Essential Elements are grade-banded and sub-grouped into the domains of physical, life, and Earth and space science.
    [Show full text]
  • Video Game Music and Task Performance: Experiment and Review
    Western Oregon University Digital Commons@WOU Honors Senior Theses/Projects Student Scholarship Spring 2020 Video Game Music and Task Performance: Experiment and Review Whitley Harrel Follow this and additional works at: https://digitalcommons.wou.edu/honors_theses Video Game Music and Task Performance Experiment and review By Whitley Harrel An Honors Thesis Submitted in Partial Fulfillment of the Requirements for Graduation from the Western Oregon University Honors Program Dr. Brent King, Thesis Advisor Dr. Gavin Keulks, Honors Program Director June 2020 I would like to thank my friends, family, and advisor for their support during this project 2 Table of Contents Abstract . 4 Introduction . 5 Methods . 8 Participants . 8 Materials . 8 Procedure . 9 Results . 10 Conclusion . 11 Reflection . 13 Introduction . 13 Institutional Review Board . 13 Research Participation System . 13 Covid-19 . 15 Conclusion . 16 Appendix A . 17 Appendix B . 18 Appendix C . 19 Appendix D . 20 Appendix E . 21 Bibliography . 22 3 Abstract This study was an examination of the impact video game music may have had on the performance of a difficult cognitive task. Participants listened to music selected from the video game “Legend of Zelda: Twilight Princess” while simultaneously playing the 2-back version of the N-back test. Participants were split into four groups, video game player listening to battle music, video game player and town music, non-player and boss music, and non-player and town music. The task was administered on a computer and results were measured by percent correct. Scores were analyzed with a two by two ANOVA with no significant difference found. This leads to the conclusion that video game music does not have an impact on the performance of a mentally difficult task.
    [Show full text]
  • I Don't Take Kindly to Your Invasion of This Fine Gaming Culture”: Gender, Emotion, and Power in Digital Gaming Spaces As Demonstrated Through Dead Island
    “I DON'T TAKE KINDLY TO YOUR INVASION OF THIS FINE GAMING CULTURE”: GENDER, EMOTION, AND POWER IN DIGITAL GAMING SPACES AS DEMONSTRATED THROUGH DEAD ISLAND Nicole D. Reamer A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY December 2015 Committee: Radhika Gajjala, Advisor Lara M. Lengel Graduate Faculty Representative Kristine Blair Sandra Faulkner © 2015 Nicole D. Reamer All Rights Reserved iii ABSTRACT Radhika Gajjala, Advisor My dissertation focuses on intersections of gender, power, and emotion in different digital spaces, specifically video game-related spaces. I’m predominantly concerned with ways in which gender operates in the video gaming subculture in such a way that it can elicit a range of strong emotions that are often skirted or even neglected in academic studies of the medium. My primary focus is on a triangulation of visual and qualitative content analysis with participant observation to examine the different ways in which power and emotion manifest around the female body. Two of these areas include the different ways players, viewers, audiences, whatever one would call a person who comes into contact with the visual components of a video game, interact with playable- and non-playable video game characters. Additionally, I focus on digital non-gaming space interactions, such as those in discussion boards or popular media article comment sections. The entire dissertation is structured from a critical feminist perspective and uses the video game Dead Island (2011) as an anchor to ground the discussion. iv To all the feminist gaming scholars who came before me.
    [Show full text]
  • Based Learning in Cybersecurity Incident Detection and Handling
    Proceedings of the 53rd Hawaii International Conference on System Sciences | 2020 An e-ADR (elaborated Action Design Research) Approach Towards Game- based Learning in Cybersecurity Incident Detection and Handling Dixon Prem Daniel R Sundarraj R P Indian Institute of Technology – Madras Indian Institute of Technology – Madras [email protected] [email protected] Abstract provide value. We develop our gaming artefact using the e-ADR approach [6]. The growth of internet has significantly increased Cybersecurity is the top five most important IT the cybersecurity threat instances. Therefore to equip management concerns and also lists in the top five people with skills to mitigate such attacks, this paper largest IT investments [7]. The losses caused by breach provides a Cybersecurity game-based learning artefact in network security has always been an issue. As a designed using the e-ADR approach. The artefact result of lapses in security by organizations, enormous teaches the Incident Detection and Handling budgets have been set aside to protect information procedures that need to be undertaken in the event of a systems [8]. Internet has become all pervasive at home cybersecurity threat. As per NIST’s guide to malware and at workplace. Therefore online security is a high incident prevention and handling, an incident response priority task for the management in organizations, process has four major phases: preparation, detection computer users at home and also the society [9]. and analysis, containment/eradication/recovery, and Security being a primary issue, leads to expanding post-incident activity. Our gaming artefact delves into expenditures with respect to firewalls, authentication the detection and containment phase to design a game systems and other techniques that are concerned with that teaches users to detect and then perform the systems.
    [Show full text]
  • Passworld: a Serious Game to Promote Password
    Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise Gokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, and Sachin Premsukh Lodha, TCS Research, Tata Consultancy Services Limited, Pune, India; Sankalp Suneel Pandit, Former employee of TCS Research, Tata Consultancy Services Limited, Pune, India https://www.usenix.org/conference/soups2020/presentation/jayakrishnan This paper is included in the Proceedings of the Sixteenth Symposium on Usable Privacy and Security. August 10–11, 2020 978-1-939133-16-8 Open access to the Proceedings of the Sixteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise Gokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Premsukh Lodha, Sankalp Suneel Pandit1 TCS Research, Tata Consultancy Services Limited, Pune, India (1former employee) {gokul.cj, gangadhara.sirigireddy, sukanya.vaddepalli, vijayanand.banahatti, sachin.lodha}@tcs.com, [email protected] Abstract still prevalent [54, 57]. Even the method of two-factor Usage of weak passwords for authentication within an authentication generally consists of passwords as one of its organization can be exploited during cyberattacks leading factors [3, 40]. The human element involved in password to unauthorized account access, denial of service, data and creation is one of the major factors affecting password identity theft, sabotage etc. Such attacks could bring strength [35]. Studies show that people are more likely to financial and reputational losses apart from legal use weaker and easily memorable passwords because of the consequences. Organizational password policies came into lack of knowledge in creating stronger passwords [20] or being in an attempt to encourage users to create more due to the limitations in memorizing passwords [56].
    [Show full text]
  • Never Tell Your Password to Anyone. 25. Maj 2014 Elowin: Uhm Yeah
    Never tell your password to anyone. 25. maj 2014 Elowin: uhm yeah? Elowin: wait Elowin: oh Elowin: oh wow Elowin: wooow Elowin: i thought you asked whether it was a hidden technique or not Elowin: not really sure how i read that wrong Chronische: Chronische: is the hidden mist jutsu a thing Elowin: no, actually. Elowin: it's not Elowin: i must be tired Elowin: yeah Elowin: i thought you asked whether it was a hidden Elowin: i should probably go to sleep i'm obviously tired as fuck Chronische: me first Elowin: no me!!!! Elowin: 2fast4u Chronische: nerts is going to run a short all-skeleton campaign after my dungeon crawl Chronische: it will be glorious Elowin: spoopy Chronische: quite! Elowin: chronische Chronische: elowin Elowin: i need to ask you a deep philosophical question Chronische: shoot Elowin: why is it that good games like shinobido are completely forgotten by eve ryone while trash like final fantasy 13 is common knowledge Chronische: Usually because of marketing Elowin: marketing is officially the spawn of satan Chronische: Well it IS needed for people to hear about the game at all but the p roblem is that AAA titles spend a good portion of their many MANY millions on ma rketing, drowning out the good games Chronische: Indeed, FF 13 being trash ALSO made it well known Chronische: All publicity is still publicity Elowin: at least Beyond Good and Evil got recognized ten years after it got wrec ked Chronische: You haven't even seen Cromartie High, and hadn't seen Samurai Jack Chronische: poor Beyond Good and Evil Chronische: I remember hearing lots of good things about it when it came out Chronische: there were a LOT of good games coming out back then, before AAA titl es absoultely trashed the regular marketplace Elowin: yeah Elowin: it's too bad a lot of them were completely unknown even back then Elowin: and most didn't even get recognized later like Beyond Good and Evil did Elowin: ;< Chronische: Well, again, marketing.
    [Show full text]
  • Steam Summer Catalog 2019
    Steam Summer Catalog 2019 JULY 8 - AUGUST 15 FOR AGES 8 - 13 Campers can unleash their creativity this summer when they are empowered to be as creative as they were all born to be! Every program is powered by the campers’ imagination, and designed to bring their ideas to life in a fun, hands-on, learning program based around science, technology, engineering, art, and math. STEAM activities will prepare students for success in the upcoming school year and beyond. From concept to creation, students will demonstrate their masterpiece to the world at the end of each week! OPEN HOUSES WILL BE HELD AT THE CSI MAIN CAMPUS—BUILDING 2M, ROOM 212 Features Pricing Camp hours 9:00 am to 4:00 pm Monday - Thursday Half-Day Camp - $200/week Choose from Full-Day or Half-Day Camps Monday - Thursday Full-Day Camp - $400/week Morning: 9:00am - Noon $25 additional surcharge for Virtual Reality and Afternoon: 1:00pm - 4:00pm Adventures in Augmented Reality Combine 2 classes for 4 full days of camp Sibling Discount 5% per sibling enrolled $30 registration fee Call 718.982.2182 to reserve your child’s seat Office of Workforce Development & Innovation Division of Economic Development, Continuing Studies, & Government Relations July 8 - July 11 9:00am - Noon Monday - Thursday Minecraft® Modders Modify and create your own Minecraft® characters, tools, mobs, and more! Use your favorite game to learn the basics of modding and foundations of programming. Learn scripting and logic statements as you create your first mods! Introductory coding will also be taught through a simulated environment inspired by Minecraft®.
    [Show full text]
  • Esports Overview
    eSports Overview What is eSports? • eSports are a form of sport competition using video games. • There are multiple types of eSports in the exact same way that there are multiple types of sports. The most common eSports games fall into the following genres: action, strategy, and sports. • Each of these games are played on one or multiple video game systems, often referred to as consoles. The most commonly known consoles types are the PlayStation 4, XBOX ONE, and Nintendo Switch. • Video games are one of the most popular activities in the world today. There are 2.5 billion active gamers across the world with 211 million in the United States alone. With so many people playing games, it’s important to ask who these people are, why gaming is so popular and what impact (positive or negative) these games are having on the people who play them. Who is a Special Olympics NY eSports Player? • Anyone that plays competitively online against others in a game on a compatible console, or personal computer • Athletes & Unified Partners must be 8 years or older to participate in Special Olympics NY's eSports • Athletes aged 8-18 must have parent/guardians’ permission to participate in Special Olympics NY’s eSports. Benefits to eSports Video games can benefit gamers in the following ways: • Cognitive benefits - Multiple studies have found that video games strengthen a wide range of cognitive skills including problem-solving, spatial attention, multi-tasking and short term & long- term memory. • Communication & teamwork benefits - gaming provides teambuilding and communication training. For many of the most popular competitive video games, individuals compete on a team and cannot win unless they communicate strategies with each other, not unlike traditional sports.
    [Show full text]
  • The Official Pro Guide
    The official Pro guide Last updated: September 2020 Go to the next level and become a Pro Ready to become a Pro? We’re so excited that you’ve decided to join our growing community of educators! Each page of this guide will take you one step closer to becoming a Pro in using CoSpaces Edu and being fully prepared to implement it in your school. Once you’ve covered all you need to know, we’d like to invite you to go deeper into the world of CoSpaces Edu and introduce you to its community of educators and the various resources available online. So sit comfortably, get your computer or tablet and let’s get started! FREE CoSpaces Edu Pro trial! Enter the trial code: COSPRO20 to test CoSpaces Edu Pro for 30 days with 100 seats (1 teacher + 99 students) including all Pro features and add-ons! 2 Table of contents Click the links to jump to a specific chapter. Chapter 1. Getting started with Pro 5 Tech check 6 Key concepts & lingo 7 Setting up your account 9 Upgrading to CoSpaces Edu Pro 10 Chapter 2. Creating like a Pro 11 Creating a first CoSpace 12 Setting up a first scene 13 The 3D camera 14 Creating for the MERGE Cube 15 The CoSpaces Edu Library 16 Uploading external files 17 Chapter 3. Coding like a Pro 18 CoBlocks 19 Scripting languages 21 The Physics engine 22 Chapter 4. Mastering VR, AR and more 23 Exploring CoSpaces 24 Switching between devices 25 The Virtual Reality mode 26 The Augmented Reality mode 27 The MERGE Cube mode 28 3 Chapter 5.
    [Show full text]