Your Browsing History

Intel Virtualization Technology (VT-x)Increasing manageability, security, and flexibility in IT environments, virtualization technologies like hardware-assisted Intel Virtualization Technology (Intel VT) combined with software-based virtualization solutions provide maximum system utilization by consolidating multiple environments into a single server or PC. By abstracting the software away from the underlying hardware, a world of new usage models opens up that reduce costs, increase management efficiency, strengthen security, while making your computing infrastructure more resilient in the event of a disaster.
Intel Virtualization Technology (Intel VT) for Directed I/O (Intel VT-d)Intel Virtualization Technology for Directed I/O (VT-d) extends Intel's Virtualization Technology (VT) roadmap by providing hardware assists for virtualization solution. VT-d continues from the existing support for IA-32 (VT-x) and Itanium processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environment. These inherently helps IT managers reduce the overall total cost of ownership by reducing potential down time and increasing productive throughput by better utilization of the data center resources.
Intel Trusted Execution Technology (Intel TXT)Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. Intel Trusted Execution Technology provides hardware-based mechanisms that help protect against software-based attacks and protects the confidentiality and integrity of data stored or created on the client PC. It does this by enabling an environment where applications can run within their own space, protected from all other software on the system. These capabilities provide the protection mechanisms, rooted in hardware, that are necessary to provide trust in the application's execution environment. In turn, this can help to protect vital data and processes from being compromised by malicious software running on the platform.
Intel Turbo Boost TechnologyIntel Turbo Boost technology automatically allows processor cores to run faster than the base operating frequency if it's operating below power, current, and temperature specification limits, maximizing speed for demanding applications, dynamically accelerating performance to match your workload-more performance when you need it the most.
Intel Hyper-Threading Technology (HT Technology)Intel Hyper-Threading Technology delivers thread-level parallelism on each processor resulting in more efficient use of processor resources—higher processing throughput—and improved performance on the multi-threaded software of today and tomorrow.
Execute Disable Bit (EDB)Intel's Execute Disable Bit function can prevent certain classes of malicious "buffer overflow" attacks when combined with a supporting operating system. Execute Disable Bit allows the processor to classify areas in memory where application code can execute and where it cannot. When a malicious worm attempts to insert code in the buffer, the processor disables code execution, preventing damage or worm propagation.