MSC C10M-BT / MSC C10M-BTC
User Manual
80 / 90
Intel
®
VT and VT-d
Increasing manageability, security, and flexibility in IT environments,
virtualization technologies like hardware-assisted Intel
®
Virtualization
Technology (Intel
®
VT) combined with software-based virtualization
solutions provide maximum system utilization by consolidating multiple
environments into a single server or PC. By abstracting the software away
from the underlying hardware, a world of new usage models opens up that
reduce costs, increase management efficiency, strengthen security, while
making your computing infrastructure more resilient in the event of a
disaster.
For
more
information
about
the
technology
please
visit:
http://www.intel.com/technology/virtualization/
VT-d supports the remapping of I/O DMA transfers and device-generated
interrupts. The architecture of VT-d provides the flexibility to support
multiple usage models that may run un-modified, special-purpose, or
"virtualization aware" guest OSs. The VT-d hardware capabilities for I/O
virtualization complement the existing Intel
®
VT capability to virtualize
processor and memory resources. Together, this roadmap of VT
technologies offers a complete solution to provide full hardware support
for the virtualization of Intel
®
platforms.
Reference:
http://ark.intel.com/VTList.aspx
http://www.intel.com/technology/itj/2006/v10i3/2-io/7-conclusion.htm
Fast Boot
Fast Boot supported by Aptio provides faster boot time by learning the
system configuration on the first boot. On the Next boot system boots
faster because the bios will only use the best boot path from the first OS
boot. It configures only devices needed for the OS to boot. It adapts when
system changes.
Note: Enabling Fast Boot makes only sense with Windows 8 and above. The speedup is
minimal and only recommended if complete system configuration is tested with Fast Boot
enabled.
Trusted Platform Module (TPM)
A TPM is a cryptoprocessor that can store cryptographic keys that protect
information.
The Trusted Platform Module offers facilities for the secure generation of
cryptographic keys, and limitation of their use, in addition to a hardware
pseudo-random number generator. It also includes capabilities such as
remote attestation and sealed storage.
"Remote attestation" creates a nearly unforgettable hash-key summary of
the hardware and software configuration. The program encrypting the
data determines the extent of the summary of the software. This allows a
third party to verify that the software has not been changed.
"Binding" encrypts data using the TPM endorsement key, a unique RSA
key burned into the chip during its production, or another trusted key
descended from it.