This document describes the x2APIC architecture, extended from the xAPIC architecture. The xAPIC was first implemented on Intel® Pentium® 4 processors, and extended the APIC architecture implemented on Intel® Pentium® processor and P6 processors.
Video introduces Jasper Forest: the newest addition to the Intel® Xeon® processor family.
Video: Intel® Architecture, powerful, efficient, scalable, flexible storage solutions.
Explore Intel Fellow Mark Bohr's presentation from the Intel Developer Forum 2014, which covers some of the benefits of the new 14 nm transistor process, like improved area scaling, and microarchitecture optimizations for active power reduction.
The visual features built into the processor deliver everything you need to enjoy a stunning and seamless experience when viewing content on your PC.
White Paper: Provides usage models, software flows, and reporting mechanisms for enhanced MCA logging and I/O MCA in future Intel® Xeon® processors.
White Paper: Provides usage models, memory data structures, software flows, and reporting mechanisms for enhanced MCA logging and I/O MCA in future Intel® Xeon® processors.
Simplify two-factor VPN authentication with Intel® IPT with one-time password, removing the need for a separate physical token for no delays.
Simplify the two-factor VPN authentication process with Intel® Identity Protection Technology with one-time password, removing the need for separate physical tokens for a seamless, delay-free experience.
Secure transactions on Intel® Identity Protection Technology with protected transaction display, to identify humans and protect from malware scraping.
Secure transactions and prevent ACH fraud with Intel® Identity Protection Technology with protected transaction display, protecting PC display from malware scraping while proving human presence for transaction verification.
Verify transactions using Intel® IPT with Public Key Infrastructure certificates, authenticating users and servers to encrypt and digitally sign.
Verify Internet transactions using Intel® Identity Protection Technology with Public Key Infrastructure certificates, authenticating the user and server to each other to encrypt and digitally sign documents.