Intel D975XBX2 Product Specification - Page 35
Alert Standard Format ASF Support, Intel, Active Management Technology Optional - bios recovery
UPC - 735858186179
View all Intel D975XBX2 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 35 highlights
Product Description 1.11.3 Alert Standard Format (ASF) Support The board provides the following ASF support for PCI Express x1 bus add-in LAN cards and PCI Conventional bus add-in LAN cards: • Monitoring of system firmware progress events, including: ⎯ BIOS present ⎯ Primary processor initialization ⎯ Memory initialization ⎯ Video initialization ⎯ PCI resource configuration ⎯ Hard-disk initialization ⎯ User authentication ⎯ Starting operating system boot process • Monitoring of system firmware error events, including: ⎯ Memory missing ⎯ Memory failure ⎯ No video device ⎯ Keyboard failure ⎯ Hard-disk failure ⎯ No boot media • Boot options to boot from different types of boot devices • Reset, shutdown, power cycle, and power up options • LAN Subsystem Software LAN software and drivers are available from Intel's World Wide Web site. 1.11.4 Intel® Active Management Technology (Optional) Intel Active Management Technology (Intel AMT) offers IT organizations tamperresistant and persistent management capabilities. Specifically, Intel AMT is a hardware-based solution that offers encrypted and persistent asset management and remote diagnostics and/or recovery capabilities for networked platforms. With Intel AMT, IT organizations can easily get accurate platform information, and can perform remote updating, diagnostics, debugging and repair of a system, regardless of the state of the operating system and the power state of the system. Intel AMT enables IT organizations to discover, heal, and protect all of their computing assets, regardless of system state in the manner described below. • Discovering hardware and software computing assets: ⎯ Intel AMT stores hardware and software asset information in non-volatile memory and allows IT to read the asset information anytime, even if the PC is off ⎯ Users cannot remove or prevent IT organization access to the information because it does not rely on software agents 35