Hyper-Threading Technology (HT Technology) Today's Intel Hyper-Threading Technology (Intel HT Technology) delivers thread-level parallelism on each processor resulting in more efficient use of processor resources?higher processing throughput?and enhanced performance on the multi-threaded software of today & tomorrow. Intel Virtualization Technology (Intel VT) Increasing manageability, security, & flexibility in IT environments, virtualization technologies like hardware-assisted Intel Virtualization Technology (Intel VT) combined with software-based virtualization solutions provide maximum system utilization by consolidating multiple environments into a single server or PC. By abstracting the software away from the underlying hardware, a world of new usage models opens up that reduce costs, increase management efficiency, strengthen security, while making your computing infrastructure more resilient in the event of a disaster. Intel Virtualization Technology (Intel VT) for Directed I/O (Intel VT-d) Intel Virtualization Technology for Directed I/O (VT-d) extends Intel's Virtualization Technology (VT) roadmap by providing hardware assists for virtualization solution. VT-d continues from the existing support for IA-32 (VT-x) & Itanium processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security & reliability of the systems & also improve performance of I/O devices in virtualized environment. These inherently helps IT managers reduce the overall total cost of ownership by reducing potential down time & increasing productive throughput by better utilization of the data center resources. Intel Trusted Execution Technology (Intel TXT) Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors & chipsets that enhance the digital office platform with security capabilities such as measured launch & protected execution. Intel Trusted Execution Technology provides hardware-based mechanisms that help protect against software-based attacks & protects the confidentiality & integrity of data stored or created on the client PC. It does this by enabling an environment where applications can run within their own space, protected from all other software on the system. These capabilities provide the protection mechanisms, rooted in hardware, that are necessary to provide trust in the application's execution environment. In turn, this can help to protect vital data & processes from being compromised by malicious software running on the platform. Intel 64 Architecture Intel 64 architecture delivers 64-bit computing on server, workstation, desktop & mobile platforms when combined with supporting software.&185; Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual & physical memory. Enhanced Intel Speed Step Technology Enhanced Intel Speed Step Technology is an advanced means of enabling very high performance while also meeting the power-conservation needs of mobile systems. Conventional Intel Speed Step Technology switches both voltage & frequency in tandem between high & low levels in response to processor load. Demand Based Switching (DBS) DBS is a power-management technology developed by Intel, in which the applied voltage & clock speed of a microprocessor are kept at the minimum necessary levels for optimal performance of required operations. A microprocessor equipped with DBS operates at a reduced voltage & clock speed until more processing power is required. This is achieved by monitoring the processor′s use by application-level workloads, reducing the CPU speed when it is running idle while increasing it as the load increases. This technology was introduced as Intel Speed Step Technology in the server marketplace. Intel Flex Memory Technology Facilitates easier upgrades by allowing different memory sizes to be populated & remain in dual-channel mode. Execute Disable Bit Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses & malicious-code attacks & prevent harmful software from executing & propagating on the server or network. Help protect your customers' business assets & reduce the need for costly virus-related repairs by building systems with built-in Intel Execute Disable Bit.