Reference

 

 

 

 

 

User Accessible

 

 

Remedial Action

 

 

 

 

 

 

 

 

 

 

 

 

 

Description

 

 

 

 

Volatility Description

 

 

 

 

(action necessary to

 

 

 

 

Designator

 

 

 

 

for external data

 

 

 

 

 

 

 

 

 

 

 

 

 

 

lose data)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

RTC CMOS

 

BATTERY

 

Volatile Battery back-backed

 

No

 

Removing the on

 

 

 

 

 

 

 

 

CMOS memory 256 bytes

 

 

 

 

board Coin Cell

 

 

 

 

 

 

 

 

Stores CMOS information

 

 

 

 

battery

 

 

 

 

 

 

 

 

 

 

 

Video

 

UMA

 

Volatile memory in off state.

 

No

 

Enter S3-S5 state

 

memory –

 

architecture-

 

UMA uses main system

 

 

 

 

below.

 

type – see

 

uses system

 

memory size allocated out of

 

 

 

 

 

 

next column

 

DDR3.

 

main memory.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Hard drive

 

User replaceable

 

Non Volatile magnetic media,

 

Yes

 

Low level format

 

 

 

 

 

 

 

 

various sizes in GB

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CD-

 

User replaceable

 

Non Volatile optical/magnetic

 

Yes

 

Low level format /

 

ROM/RW/

 

 

 

 

media

 

 

 

 

erase

 

DVD/

 

 

 

 

 

 

 

 

 

 

 

 

DVD+RW/

 

 

 

 

 

 

 

 

 

 

 

 

Diskette

 

 

 

 

 

 

 

 

 

 

 

 

Drives

 

 

 

 

 

 

 

 

 

 

 

 

All other components on the motherboard will lose data once power is removed from the system. Primary power loss (Unplug the power cord and remove the battery) will destroy all user data on the memory (DDR3, 1600/ 1333MHz). Secondary power loss (removing the on board coincell battery) will destroy system data on the system configuration and time-of-day information.

In addition, to clarify memory volatility and data retention in situations where the system is put in different ACPI power states the following is provided (those ACPI power states are S0, S1, S3, S4 and S5):

S0 state is the working state where the dynamic RAM is maintained and is read/write by the processor.

S1 state is a low wake-up latency sleeping state. In this state, no system context is lost (CPU or chip set) and hardware maintains all system contexts.

S3 is called “suspend to RAM” state or stand-by mode. In this state the dynamic RAM is maintained. Dell systems will be able to go to S3 if the OS and the peripherals used in the system supports S3 state. Windows 7, Ubuntu support S3 state.

S4 is called “suspend to disk” state or “hibernate” mode. There is no power. In this state, the dynamic RAM is not maintained. If the system has been commanded to enter S4, the OS will write the system context to a non-volatile storage file and leave appropriate context markers. When the system is coming back to the working state, a restore file from the non-volatile storage can occur. The restore file has to be valid. Dell systems will be able to go to S4 if the OS and the peripherals support S4 state. Windows 7, support S4 state.

S5 is the “soft” off state. There is no power. The OS does not save any context to wake up the system. No data will remain in any component on the system board, i.e. cache or memory. The system will require a complete boot when awakened. Since S5 is the shut off state, coming out of S5 requires power on which clears all registers.

Page 2

Page 2
Image 2
Dell 3010 manual RTC Cmos Battery, Uma, DDR3

3010 specifications

The Dell PowerEdge T310 is a versatile tower server that is designed for small to medium-sized businesses looking for a reliable and efficient server solution. The T310 offers a range of features and technologies to meet various IT needs, making it a popular choice among businesses.

One of the standout features of the Dell T310 is its robust processing power. It is equipped with Intel's Xeon processor, which delivers outstanding performance and energy efficiency. This multi-core architecture allows for enhanced multitasking capabilities, ensuring that businesses can run multiple applications simultaneously without degradation in performance.

In terms of memory, the T310 supports up to 32GB of DDR3 RAM, providing ample space for data-intensive tasks. This capacity makes it suitable for applications such as virtualization, database management, and file sharing, empowering organizations to operate more efficiently.

Storage options on the Dell PowerEdge T310 are also impressive. The server supports multiple hard drive configurations, including up to four 3.5-inch SATA or SAS drives. This scalability allows businesses to customize their storage solutions based on their specific requirements for data storage and retrieval. RAID configurations offer additional data protection and improved performance, ensuring that critical data is always safe.

The T310 also features advanced management technologies, including Dell's OpenManage systems management console. This tool provides IT administrators with the ability to monitor and manage systems with ease, enabling proactive maintenance and troubleshooting. This not only improves the server's uptime but also enhances overall operational efficiency.

Security is another critical aspect of the T310 design. Equipped with features such as a Trusted Platform Module (TPM) and system lock, the server provides robust protection against unauthorized access. These security features ensure that sensitive business data remains protected from potential threats.

Furthermore, the Dell PowerEdge T310 has a compact form factor, making it an excellent choice for businesses with limited space. Its quiet operation and efficient cooling system allow it to blend seamlessly into office environments without causing disturbances.

In conclusion, the Dell PowerEdge T310 is a powerful, flexible, and secure server that caters to the needs of small to medium-sized businesses. With its advanced processing capabilities, significant memory capacity, versatile storage options, and strong management features, the T310 stands out as a reliable solution for various IT demands. Its combination of performance, scalability, and security makes it an ideal choice for businesses looking to enhance their IT infrastructure.