Sunday, September 27, 2015

Add Your Gmail Account to Outlook 2010 Using IMAP

Enable IMAP in Gmail
First log into your Gmail account and open the Settings panel. Click on the Forwarding and POP/IMAP tab and verify IMAP is enabled and save changes.
1imap
Next open Outlook 2010, click on the File tab to access the Backstage view. Click on Account Settings and Add and remove accounts or change existing connection settings.
2imap
In the Account Settings window click on the New button.
3imap
Enter in your name, email address, and password twice then click Next.
4imap
Outlook will configure the email server settings, the amount of time it takes will vary.
5imap
Provided everything goes correctly, the configuration will be successful and you can begin using your account.
6imap
16imap
Manually Configure IMAP Settings
If the above instructions don’t work, then we’ll need to manually configure the settings. Again, go into Auto Account Setup and select Manually configure server settings or additional server types and click Next.
7imap
Select Internet E-mail – Connect to POP or IMAP server to send and receive e-mail messages.
8imap
Now we need to manually enter in our settings similar to the following. Under the Server Information section verify the following.
  • Account Type: IMAP
  • Incoming mail server: imap.gmail.com
  • Outgoing mail server (SMTP): smtp.gmail.com
9imap
Note: If you have a Google Apps account make sure to put the full email address (user@yourdomain.com) in the Your Name and User Name fields.
Note: If you live outside of the US you might need to use imap.googlemail.com and smtp.googlemail.com
Next, we need to click on the More Settings button…
10imap
In the Internet E-mail Settings screen that pops up, click on the Outgoing Server tab, and check the box next to My outgoing server (SMTP) requires authentication. Also select the radio button next to Use same settings as my incoming mail server.
11imap
In the same window click on the Advanced tab and verify the following.
  • Incoming server: 993
  • Incoming server encrypted connection: SSL
  • Outgoing server encrypted connection TLS
  • Outgoing server: 587
Note: You will need to change the Outgoing server encrypted connection first, otherwise it will default back to port 25. Also, if TLS doesn’t work, we were able to successfully use Auto. Click OK when finished.
12imap
Now we want to test the settings, before continuing on…it’s just easier that way incase something was entered incorrectly. To make sure the settings are tested, check the box Test Account Settings by clicking the Next button.
13imap
If you’ve entered everything in correctly, both tasks will be completed successfully and you can close out of the window. and begin using your account via Outlook 2010.
14imap
You’ll get a final congratulations message you can close out of…
15imap
And begin using your account via Outlook 2010.
16imap

Add Your Gmail Account to Outlook 2010 using POP

Log into your Gmail account an go to your settings page. Under the Forwarding and POP/IMAP tab make sure POP is enabled.  You can choose to enable POP access for all new mail that arrives from now on, or for all mail in your Gmail account.  On the second option, we suggest you chose keep Gmail’s copy in the Inbox so you can still access your emails on the Gmail server.

sshot-2010-05-16-[02-10-50]
Add Your Account to Outlook 2010
If you haven’t run Outlook 2010 yet, click Next to start setup and add your email account.
SNAGHTML29d6c7f
Select Yes to add an email account to Outlook.  Now you’re ready to start entering your settings to access your email.
SNAGHTML29f5fc3
Or, if you’ve already been using Outlook and want to add a new POP account, click File and then select Add Account under Account Information.
sshot-2010-05-16-[03-20-13]
Outlook 2010 can often automatically find and configure your account with just your email address and password, so enter these and click Next to let Outlook try to set it up automatically.
sshot-2010-05-16-[02-20-38]
Outlook will now scan for the settings for your email account.
sshot-2010-05-16-[02-23-24]
If Outlook was able to find settings and configure your account automatically, you’ll see this success screen.  Depending on your setup, Gmail is automatically setup, but sometimes it fails to find the settings.  If this is the case, we’ll go back and manually configure it.
sshot-2010-05-16-[02-30-53]
Manually Configure Outlook for Gmail
Back at the account setup screen, select Manually configure server settings or additional server types and click Next.
sshot-2010-05-16-[02-35-03]
Select Internet E-mail and then click Next.
sshot-2010-05-16-[02-38-16]
Enter your username, email address, and log in information. Under Server information enter in the following:
  • Account Type: POP3
  • Incoming mail server: pop.gmail.com
  • Outgoing mail server: smtp.gmail.com
Make sure to check Remember password so you don’t have to enter it every time.
sshot-2010-05-16-[02-46-55]
After that data is entered in, click on the More Settings button.
sshot-2010-05-16-[02-48-24]
Select the Outgoing Server tab, and check My outgoing server (SMTP) requires authentication.  Verify Use same settings as my incoming mail server is marked as well.
sshot-2010-05-16-[02-49-34]
Next select the Advanced tab and enter the following information:
  • Incoming Server (POP3): 995
  • Outgoing server (SMTP): 587
  • Check This server requires an encrypted connection (SSL)
  • Set Use the following type of encrypted connection to TLS
You also might want to uncheck the box to Remove messages from the server after a number of days.  This way your messages will still be accessible from Gmail online.
sshot-2010-05-16-[02-54-22]
Click OK to close the window, and then click Next to finish setting up the account.  Outlook will test your account settings to make sure everything will work; click Close when this is finished.
sshot-2010-05-16-[02-56-16]
Provided everything was entered in correctly, you’ll be greeted with a successful setup message…click Finish.
sshot-2010-05-16-[02-57-09] 
Gmail will be all ready to sync with Outlook 2010.  Enjoy your Gmail account in Outlook, complete with fast indexed searching, conversation view, and more!
sshot-2010-05-16-[03-02-35]

CDPO0814WBTS - Client Devices Portfolio Overview



1. Your customer is implementing a BYOD strategy and is compiling a list of devices that their employees can choose from. Why would XPS be a great fit for your customer?
XPS systems deliver the design and experience employees will enjoy at home and at work, with IT-friendly features that will make them easy for IT to manage.
XPS systems are first to market with the latest technologies and custom ecosystems that the employees will enjoy wherever they work.
XPS systems are crafted with premium components like machined aluminum, carbon fiber, and Corning® Gorilla® Glass NBT, so they will hold up wherever the employees will need to use them.
XPS systems deliver uncompromised experiences with features like eye-popping displays, innovative connectivity options, and solid state hard drives.
2. Which of Dells client devices meet Dell's most secure, most manageable, with outstanding reliability claim? (Choose four)
Latitude
Optiplex
Precision
Rugged
XPS
Vostro
3. How does Dell deliver manageable commercial PCs?
Dell builds business-class systems with management capabilities that allow for easier deployment, configuration, monitoring and updating.
Dell provides comprehensive solutions that protect data wherever it goes without sacrificing IT control or end-user productivity.
Dell builds systems in a variety of form factors that are designed to fit into whichever environment your customers need them to.
Dell has strict component qualifications and reliability testing that ensures high quality and a consistent user experience.
4. Which of the following customers are potential Rugged customers? (Choose four)
Manufacturing and industrial workers
Military personnel
Public service workers (police officers)
Scientists and researchers
Call center representatives
Office task workers
5. Your customer is looking for highly portable devices that will integrate into their environment. Which is the best way to position Dell Venue tablets to this customer?
Dell Venue tablets are the perfect solution for you because they offer the adaptability and portability your employees want while maintaining enterprise-level management and security.
Our Venue tablets would be a great fit for you because your employees can use them as primary devices to catch up on the latest news and social media updates from their couch.
Your employees will love our Dell Venue tablets because they are available in a variety of portable form factors and come with a cutting-edge look that they will be proud to carry.
The Dell Venue tablet family is the best option for you because you can choose from Windows and Android operating systems to find the best fit for your employees.
6. Why is it important to sell peripherals like printers and displays? (Choose three)
Peripherals create a comprehensive ecosystem to enhance your customers' experience with our client devices.
Your customers are likely going to purchase these products anyway.
Your customers cannot purchase Dell-branded peripherals after the point of sale.
Dell's client portfolio is only compatible with Dell-branded peripherals.
Peripherals add incremental revenue and margin onto each client device sale.
7. How does Dell deliver secure commercial PCs?
Dell endpoint security solutions protect data wherever it goes without sacrificing IT control or end-user productivity.
Dell builds business-class systems that allow for easier deployment, configuration, monitoring, and updating.
Dell designs systems to continuously improve performance, quality, and user experience.
With Dell solutions, IT can remotely inventory systems to determine which require updates and proactively monitor systems to prevent failures.
8. Choose the best response to a customer who says, We don't have enough manpower to be constantly replacing our employee's computers.
Dell has done some exclusive work with Intel to create unique vPro extensions that will help you manage your fleet of systems, whether they're powered on or off.
Dell systems go through a variety of reliability tests, including military and cycle tests, to ensure that they will thrive under your conditions.
Dell's endpoint security solution offers one-touch, preset templates that simplify the process of meeting security regulations, but won't interfere with existing IT processes.
Dell's manageability solutions are designed to speed up your deployment. Our automation tools import your drivers in 17 fewer steps than our competitors, which will save you about an hour per computer.
9. Which line of client devices would be the best fit for an architectural firm looking for systems to create 3D models?
Precision
Optiplex
Latitude
XPS
10. What are the most critical things you should ask your customers to effectively position our client devices? (Choose three)
What will your end-users be doing with these systems?
What kinds of applications will your employees be using?
Where will your employees be using these PCs?
Which Dell product lines are you most interested in?
How many devices are you looking to purchase?

Thursday, September 24, 2015

How To Difference between RDIMM and UDIMM

There are some differences between UDIMMs and RDIMMs that are important in choosing the best options for memory performance. First, let’s talk about the differences between them.

RDIMMs have a register on-board the DIMM (hence the name “registered” DIMM). The register/PLL is used to buffer the address and control lines and clocks only. Consequently, none of the data goes through the register /PLL on an RDIMM (PLL is Phase Locked Loop. On prior generations (DDR2), the Register - for buffer the address and control lines - and the PLL for generating extra copies of the clock were separate, but for DDR3 they are in a single part).

There is about a one clock cycle delay through the register which means that with only one DIMM per channel, UDIMMs will have slightly less latency (better bandwidth). But when you go to 2 DIMMs per memory channel, due to the high electrical loading on the address and control lines, the memory controller use something called a “2T” or “2N” timing for UDIMMs.
Consequently every command that normally takes a single clock cycle is stretched to two clock cycles to allow for settling time. Therefore, for two or more DIMMs per channel, RDIMMs will have lower latency and better bandwidth than UDIMMs.
Based on guidance from Intel and internal testing, RDIMMs have better bandwidth when using more than one DIMM per memory channel (recall that Nehalem has up to 3 memory channels per socket). But, based on results from Intel, for a single DIMM per channel, UDIMMs produce approximately 0.5% better memory bandwidth than RDIMMs for the same processor frequency and memory frequency (and rank). For two DIMMs per channel, RDIMMs are about 8.7% faster than UDIMMs.
For the same capacity, RDIMMs will be require about 0.5 to 1.0W per DIMM more power due to the Register/PLL power. The reduction in memory controller power to drive the DIMMs on the channel is small in comparison to the RDIMM Register/PLL power adder.
RDIMMs also provide an extra measure of RAS. They provide address/control parity detection at the Register/PLL such that if an address or control signal has an issue, the RDIMM will detect it and send a parity error signal back to the memory controller. It does not prevent data corruption on a write, but the system will know that it has occurred, whereas on UDIMMs, the same address/control issue would not be caught (at least not when the corruption occurs).
Another difference is that server UDIMMs support only x8 wide DRAMs, whereas RDIMMs can use x8 or x4 wide DRAMs. Using x4 DRAMs allows the system to correct all possible DRAM device errors (SDDC, or “Chip Kill”), which is not possible with x8 DRAMs unless channels are run in Lockstep mode (huge loss in bandwidth and capacity on Nehalem). So if SDDC is important, x4 RDIMMs are the way to go.
In addition, please note that UDIMMs are limited to 2 DIMMs per channel so RDIMMs must be used if greater than 2 DIMMs per channel (some of Dell’s servers will have 3 DIMMs per channel capability).
In summary the comparison between UDIMMs and RDIMMs is

  • Typically UDIMMs are a bit cheaper than RDIMMs
  • For one DIMM per memory channel UDIMMs have slightly better memory bandwidth than RDIMMs (0.5%)
  • For two DIMMs per memory channel RDIMMs have better memory bandwidth (8.7%) than UDIMMs
  • For the same capacity, RDIMMs will be require about 0.5 to 1.0W per DIMM than UDIMMs
  • RDIMMs also provide an extra measure of RAS
    • Address / control signal parity detection
    • RDIMMs can use x4 DRAMs so SDDC can correct all DRAM device errors even in independent channel mode
  • UDIMMs are currently limited to 1GB and 2GB DIMM sizes from Dell
  • UDIMMs are limited to two DIMMs per memory channel

 

DIMM Count and Memory Configurations

Recall that you are allowed up to 3 DIMMs per memory channel (i.e. 3 banks) per socket (a total of 9 DIMMs per socket). With Nehalem the actually memory speed depends upon the speed of the DIMM itself, the number of DIMMs in each channel, the CPU speed itself. Here are some simple rules for determining DIMM speed.
  • If you put only 1 DIMM in each memory channel you can run the DIMMs at 1333 MHz (maximum speed). This assumes that the processor supports 1333 MHz (currently, the 2.66 GHz, 2.80 GHz, and 2.93 GHz processors support 1333 MHz memory) and the memory is capable of 1333 MHz
  • As soon as you put one more DIMM in any memory channel (two DIMMs in that memory channel) on any socket, the speed of the memory drops to 1066 MHz (basically the memory runs at the fastest common speed for all DIMMs)
  • As soon as you put more than two DIMMs in any one memory channel, the speed of all the memory drops to 800 MHz
So as you add more DIMMs to any memory channel, the memory speed drops. This is due to the electrical loading of the DRAMs that reduces timing margin, not power constraints.
If you don’t completely fill all memory channels there is a reduction in the memory bandwidth performance. Think of these configurations as “unbalanced” configurations from a memory perspective.