Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Jautāt
Warning: Last items in stock!
Availability date: 12.11.2024
Intel® Trusted Execution Technology Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.Intel® Virtualization Technology for Directed I/O (VT-d) Intel® Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and Itanium® processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments.Intel® Virtualization Technology (VT-x) Intel® Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.Intel® AES New Instructions Intel® AES New Instructions (Intel® AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.TPM Version TPM (Trusted Platform Module) is a component that provides hardware level security upon system boot-up via stored security keys, passwords, encryption and hash functions.Intel® ME Firmware Version Intel® Management Engine Firmware (Intel® ME FW) uses built-in platform capabilities and management and security applications to remotely manage networked computing assets out-of-band.Max Turbo Frequency Max Turbo Frequency is the maximum single-core frequency at which the processor is capable of operating using Intel® Turbo Boost Technology and, if present, Intel® Turbo Boost Max Technology 3.0 and Intel® Thermal Velocity Boost. Frequency is typically measured in gigahertz (GHz), or billion cycles per second.Intel vPro® Platform Eligibility The Intel vPro® platform is a set of hardware and technologies used to build business computing endpoints with premium performance, built-in security, modern manageability and platform stability.Intel® HD Audio Technology Intel® High Definition Audio (Intel® HD Audio) is capable of playing back more channels at higher quality than previous integrated audio formats. In addition, Intel® HD Audio has the technology needed to support the latest and greatest audio content.Integrated Graphics Integrated graphics allow for incredible visual quality, faster graphic performance and flexible display options without the need for a separate graphics card.Intel® Optane™ Memory Supported Intel® Optane™ memory is a revolutionary new class of non-volatile memory that sits in between system memory and storage to accelerate system performance and responsiveness. When combined with the Intel® Rapid Storage Technology Driver, it seamlessly manages multiple tiers of storage while presenting one virtual drive to the OS, ensuring that data frequently used resides on the fastest tier of storage. Intel® Optane™ memory requires specific hardware and software configuration.TPM Trusted Platform Module (TPM) is a component on the desktop board that is specifically designed to enhance platform security above-and-beyond the capabilities of today's software by providing a protected space for key operations and other security critical tasks. Using both hardware and software, the TPM protects encryption and signature keys at their most vulnerable stages - operations when the keys are being used unencrypted in plain-text form. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|