Intel DB75EN Technical Product Specification - Page 32

Intel, Virtualization Technology for Directed I/O, Anti-Theft Technology

Page 32 highlights

Intel Desktop Board DB75EN Technical Product Specification 1.11.3 Intel® Virtualization Technology for Directed I/O Intel® Virtualization Technology for Directed I/O (Intel® VT-d) allows addresses in incoming I/O device memory transactions to be remapped to different host addresses. This provides Virtual Machine Monitor (VMM) software with: • Improved reliability and security through device isolation using hardware assisted remapping • Improved I/O performance and availability by direct assignment of devices. For information about Intel Virtualization Technology for Directed I/O Refer to http://www.intel.com/technology/itj/2006/v10i3/2-io/4virtualization-techniques.htm 1.11.4 Intel® Anti-Theft Technology Intel® Anti-Theft (Intel® AT) provides local, tamper-resistant defense that works like a poison pill that disables the computer and access to its data even if the operating system (OS) is reimaged, a new hard drive is installed, or the computer is disconnected from the network. NOTE No computer system can provide absolute security under all conditions. Intel AT requires the computer system to have an Intel AT-enabled chipset, BIOS, firmware release, software, and an Intel AT-capable Service Provider/ISV application and service subscription. The detection (triggers), response (actions), and recovery mechanisms only work after the Intel AT functionality has been activated and configured. Certain functionality may not be offered by some ISVs or service providers and may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For information about Intel Anti-Theft Refer to http://antitheft.intel.com/welcome.aspx 32

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96

Intel Desktop Board DB75EN Technical Product Specification
32
1.11.3
Intel
®
Virtualization Technology for Directed I/O
Intel
®
Virtualization Technology for Directed I/O (Intel
®
VT-d) allows addresses in
incoming I/O device memory transactions to be remapped to different host addresses.
This provides Virtual Machine Monitor (VMM) software with:
Improved reliability and security through device isolation using hardware assisted
remapping
Improved I/O performance and availability by direct assignment of devices.
For information about
Refer to
Intel Virtualization Technology for Directed
I/O
virtualization-techniques.htm
1.11.4
Intel
®
Anti-Theft Technology
Intel
®
Anti-Theft (Intel
®
AT) provides local, tamper-resistant defense that works like a
poison pill that disables the computer and access to its data even if the operating
system (OS) is reimaged, a new hard drive is installed, or the computer is
disconnected from the network.
NOTE
No computer system can provide absolute security under all conditions. Intel AT
requires the computer system to have an Intel AT-enabled chipset, BIOS, firmware
release, software, and an Intel AT-capable Service Provider/ISV application and service
subscription. The detection (triggers), response (actions), and recovery mechanisms
only work after the Intel AT functionality has been activated and configured. Certain
functionality may not be offered by some ISVs or service providers and may not be
available in all countries. Intel assumes no liability for lost or stolen data and/or
systems or any other damages resulting thereof.
For information about
Refer to
Intel Anti-Theft