Miralinux Blog

  • Home
  • Linux
    • Scripts
    • CentOS
  • Apple
  • Microsoft
    • Features
    • Office
    • Windows
  • Learning
  • Games
  • Multimedia
    • XBMC
  • Other
    • About WordPress
  • Links
    • General
    • Software
      • Autocad
    • Hardware
      • BIOS
    • Linux
    • WiKieS

Posted on 2012/09/19 by arno Posted in Links

Power Management

PCI Express – Active State Power Management (ASPM)

We have one project in progress for the PCI Express subsystem, PCI Express (PCIe) Active State Power Management. Our goal with this project is to allow you to select PCIe ASPM dynamically, based on your changing power versus performance preference.

PCIe ASPM technology allows PCIe hardware to transition the link to lower power states. The link is the physical interface between the PCI endpoint and the PCI switch. When ASPM is enabled, we can reduce power consumption even when the devices are in a fully powered on state (D0). This technology is specified in the PCI Express Specification, which is available to PCI SIG members. A white paper about this technology can be found here.

While ASPM can be enabled by the BIOS, it is often enabled only for mobile systems because the latency to transition from lower to fully powered state can cause a drop in performance. However, depending on the administrator’s power policy, the OS should be able to switch this feature on or off at will, depending on whether the administrator wants to favor power over performance or vice versa.

Advanced

Intel – Trusted Execution Technology (TXT)

Malware Protection with Intel® TXT

Intel® Trusted Execution Technology (Intel® TXT) is a hardware security solution that protects IT infrastructures against software-based attacks by validating the behavior of key components within a server or PC at startup.

Using an infrastructure based in the Intel processor and known as the “root of trust,” Intel® TXT checks the consistency in behaviors and launch-time configurations against a verified benchmark called a “known good” sequence. The system can then quickly assess and alert against any attempts to alter or tamper with a system’s launch-time environment.

« VMware
Firewall Subnets »
  • Login
  • Mother of all Portals
  • .Handy .Handig
  • Links – wikis – wikies

Archives

  • June 2022
  • October 2021
  • June 2021
  • September 2016
  • April 2016
  • March 2016
  • November 2014
  • September 2014
  • August 2014
  • July 2014
  • April 2014
  • March 2014
  • November 2013
  • October 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • February 2013
  • December 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
CyberChimps ©2025