Specification Sheet
Product Description
19
NOTE
Intel AMT requires the Compute Stick to have network hardware and software, as well as
connection with a power source, a corporate network connection, and an Intel AMT-enabled
remote management console. Setup requires additional configuration of the platform.
For information about Refer to
Intel Active Management Technology http://www.intel.com/technology/platform-technology/intel-
amt/index.htm
1.12.1.2 Intel® Virtualization Technology
Intel Virtualization Technology (Intel VT) is a hardware-assisted technology that, when
combined with software-based virtualization solutions, provides maximum system utilization by
consolidating multiple environments into a single server or client.
NOTE
A processor with Intel VT does not guarantee that virtualization will work on your Compute Stick.
Intel VT requires enabling software and/or operating system, device drivers, and applications
designed for this feature.
For information about
Refer to
Intel Virtualization Technology http://www.intel.com/technology/virtualization/technology.htm
1.12.1.3 Intel® Virtualization Technology for Directed I/O
Only available on the STK2MV64CC. Intel Virtualization Technology for Directed I/O (Intel VT-d)
allows addresses in incoming I/O device memory transactions to be remapped to different host
addresses. This provides Virtual Machine Monitor (VMM) software with:
• Improved reliability and security through device isolation using hardware assisted remapping.
• Improved I/O performance and availability by direct assignment of devices.
For information about Refer to
Intel Virtualization Technology for Directed I/O https://software.intel.com/en-
us/node/139035?wapkw=vt+directed+io
1.12.1.4 Intel® Trusted Execution Technology
Only available on the STK2MV64CC. Intel Trusted Execution Technology (Intel TXT) is a
hardware security solution that protects systems against software-based attacks by validating
the behavior of key components at startup against a known good source. It requires that
Intel VT be enabled and the presence of a TPM.
For information about
Refer to
Intel Trusted Execution Technology http://www.intel.com/content/www/us/en/architecture-and-
technology/trusted-execution-technology/malware-reduction-
general-technology.html