Intel NUC 11 i5 Tall Barebone - EU Cord

Intel NUC 11 i5 Tall Barebone - EU Cord
Brand: Intel
405.99 GBP
Buy Now

Features CPU: Intel® Core™ i5-1135G7 Processor (8M Cache, up to 4.20 GHz). • RAM: Supports up to 64GB DDR4 SO-DIMM RAM. • Storage: Supports M.2 and 2.5" Storage. • Front IO: 2x USB 3.2. • Rear IO: 2x USB 4 (type C), 1x USB 3.2, 1x USB 2.0, 2.5GbE, Dual HDMI 2.0b. • Intel® Wi-Fi 6 AX201. • Internal Headers: 1x USB 3.2 on m.2 22x42 (pins), 2x USB 2.0 (headers), Serial Port via Internal Header, Front_panel (PWR, RST, 5V, 5Vsby, 3.3Vsby); Internal 2x2 power connector. Intel Virtualization Technology for Directed I/O (VT-d) Intel® Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and Itanium® processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments. Intel ME Firmware Version 15 Intel® Management Engine Firmware (Intel® ME FW) uses built-in platform capabilities and management and security applications to remotely manage networked computing assets out-of-band. Intel Virtualization Technology (VT-x) Intel® Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions. Intel Platform Trust Technology (Intel PTT) Intel® Platform Trust Technology (Intel® PTT) is a platform functionality for credential storage and key management used by Windows 8* and Windows® 10. Intel® PTT supports BitLocker* for hard drive encryption and supports all Microsoft requirements for firmware Trusted Platform Module (fTPM) 2.0. Intel AES New Instructions Intel® AES New Instructions (Intel® AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.