MSC CXC-BT
User Manual
76 / 84
Intel
®
VT and VT-d
Increasing manageability, security, and flexibility in IT environments,
virtualization technologies like hardware-assisted Intel
®
Virtualization
Technology (Intel
®
VT) combined with software-based virtualization
solutions provide maximum system utilization by consolidating multiple
environments into a single server or PC. By abstracting the software
away from the underlying hardware, a world of new usage models opens
up that reduce costs, increase management efficiency, strengthen
security, while making your computing infrastructure more resilient in the
event of a disaster.
For
more
information
about
the
technology
please
visit:
http://www.intel.com/technology/virtualization/
VT-d supports the remapping of I/O DMA transfers and device-
generated interrupts. The architecture of VT-d provides the flexibility to
support multiple usage models that may run un-modified, special-
purpose, or "virtualization aware" guest OSs. The VT-d hardware
capabilities for I/O virtualization complement the existing Intel
®
VT
capability to virtualize processor and memory resources. Together, this
roadmap of VT technologies offers a complete solution to provide full
hardware support for the virtualization of Intel
®
platforms.
Reference:
http://ark.intel.com/VTList.aspx
http://www.intel.com/technology/itj/2006/v10i3/2-io/7-conclusion.htm
Fast Boot
Fast Boot supported by Aptio provides faster boot time by learning the
system configuration on the first boot. On the Next boot system boots
faster because the bios will only use the best boot path from the first OS
boot. It configures only devices needed for the OS to boot. It adapts
when system changes.
Note: Enabling Fast Boot makes only sense with Windows 8 and above. The speedup is
minimal and only recommended if complete system configuration is tested with Fast Boot
enabled.
Trusted Platform Module (TPM)
A TPM is a cryptoprocessor that can store cryptographic keys that
protect information.
The Trusted Platform Module offers facilities for the secure generation of
cryptographic keys, and limitation of their use, in addition to a hardware
pseudo-random number generator. It also includes capabilities such as
remote attestation and sealed storage.
"Remote attestation" creates a nearly unforgettable hash-key summary
of the hardware and software configuration. The program encrypting the
data determines the extent of the summary of the software. This allows a
third party to verify that the software has not been changed.
"Binding" encrypts data using the TPM endorsement key, a unique RSA
key burned into the chip during its production, or another trusted key
descended from it.
Содержание Avnet COM Express CXC-BT
Страница 10: ...MSC CXC BT User Manual 10 84 2 2 Block diagram...