Features CPU: Intel Core™ i 5-1135G7 Processor (8M Cache, up to 4.20 GHz). • RAM: Supports up to 64GB DDR4 SO-DIMM RAM. • Storage: Supports M.2 & 2.5" Storage. • Front IO: 2x USB (Universal Serial Bus) 3.2. • Rear IO: 2x USB (Universal Serial Bus) 4 (type C), 1x USB (Universal Serial Bus) 3.2, 1x USB (Universal Serial Bus) 2.0, 2.5 Gb E, Dual HDMI 2.0b. • Intel Wi-Fi 6 AX201. • Internal Headers: 1x USB (Universal Serial Bus) 3.2 on m.2 22x 42 (pins), 2x USB (Universal Serial Bus) 2.0 (headers), Serial Port via Internal Header, Front_panel (PWR, RST, 5V, 5 Vsby, 3.3 Vsby); Internal 2x 2 power connector. Intel Virtualization Technology for Directed I/O (VT-d) Intel Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) & Itanium processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security & reliability of the systems & also improve performance of I/O devices in virtualized environments. Intel ME Firmware Version 15 Intel Management Engine Firmware (Intel ME FW) uses built-in platform capabilities & management & security applications to remotely manage networked computing assets out-of-b&. Intel Virtualization Technology (VT-x) Intel Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers enhanced manageability by limiting downtime & maintaining productivity by isolating computing activities into separate partitions. Intel Platform Trust Technology (Intel PTT) Intel Platform Trust Technology (Intel PTT) is a platform functionality for credential storage & key management used by Windows 8* & Windows 10. Intel PTT supports Bit Locker* for hard drive encryption & supports all Microsoft requirements for firmware Trusted Platform Module (f TPM) 2.0. Intel AES New Instructions Intel AES New Instructions (Intel AES-NI) are a set of instructions that enable fast & secure data encryption & decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, & authenticated encryption.