Intel® Compute Card CD1C64GK

Intel® Compute Card CD1C64GK

Specifications

Supplemental Information

Memory & Storage

Processor Graphics

I/O Specifications

  • Audio (back channel + front channel) Digital Display Interface
  • Integrated Wireless Intel® Dual Band Wireless-AC 7265
  • Integrated Bluetooth Yes

Package Specifications

  • Low Halogen Options Available No

Security & Reliability

Ordering and Compliance

Ordering and spec information

Intel® Compute Card CD1C64GK

  • MM# 956383
  • Ordering Code BLKCD1C64GK

Trade compliance information

  • ECCN 5A992C
  • CCATS G157815L2
  • US HTS 8471500150

PCN/MDDS Information

Downloads and Software

Launch Date

The date the product was first introduced.

Embedded Storage

Embedded Storage indicates the presence and size of onboard storage capacity that is built into the board, in addition to any drives that could be added via other interfaces.

Included Memory

Pre-Installed Memory indicates presence of memory that comes factory loaded on the device.

Max Memory Size (dependent on memory type)

Max memory size refers to the maximum memory capacity supported by the processor.

Memory Types

Intel® processors come in four different types: a Single Channel, Dual Channel, Triple Channel, and Flex Mode.

Max # of Memory Channels

The number of memory channels refers to the bandwidth operation for real world application.

ECC Memory Supported

ECC Memory Supported indicates processor support for Error-Correcting Code memory. ECC memory is a type of system memory that can detect and correct common kinds of internal data corruption. Note that ECC memory support requires both processor and chipset support.

Integrated Graphics

Integrated graphics allow for incredible visual quality, faster graphic performance and flexible display options without the need for a separate graphics card.

Graphics Output

Graphics Output defines the interfaces available to communicate with display devices.

Intel® vPro™ Platform Eligibility

Intel® vPro™ Technology is a set of security and manageability capabilities built into the processor aimed at addressing four critical areas of IT security: 1) Threat management, including protection from rootkits, viruses, and malware 2) Identity and web site access point protection 3) Confidential personal and business data protection 4) Remote and local monitoring, remediation, and repair of PCs and workstations.

Intel® Remote Wake Technology

Intel® Remote Wake technology (Intel® RWT) enables home PCs, enabled services, and mobile devices to communicate with one another remotely over the Internet, for 24/7 access while maintaining PC energy efficiency. Built on the Intel® Management Engine, Intel RWT allows you to remotely wake up home PCs from an enabled Internet application or service, while in energy efficient sleep mode.

Intel® HD Audio Technology

Intel® High Definition Audio (Intel® HD Audio) is capable of playing back more channels at higher quality than previous integrated audio formats. In addition, Intel® HD Audio has the technology needed to support the latest and greatest audio content.

Intel® Virtualization Technology (VT-x)

Intel® Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.

Intel® Platform Trust Technology (Intel® PTT)

Intel® Platform Trust Technology (Intel® PTT) is a platform functionality for credential storage and key management used by Windows 8* and Windows® 10. Intel® PTT supports BitLocker* for hard drive encryption and supports all Microsoft requirements for firmware Trusted Platform Module (fTPM) 2.0.

Intel® Trusted Execution Technology

Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.