Browse Definitions :
Definition

Intel Xeon D-2100

The Intel Xeon D-2100 processor is a system on a chip (SoC) designed with low power requirements for computing data at the device-level of the Internet of Things (IoT) and smart devices.

The Xeon D-2100 processor enables processing for smart devices to happen directly at the device for the fastest, most responsive processing with minimal latency. Low latency and fast calculations enable time-sensitive operations such as industrial sensor area networks, self-driving vehicles and processor-intensive IoT devices.

Intel Xeon D-2100 processors were announced with features including:

  • 14nm photolithographic process.
  • 4-18 cores with base clock speeds from 1.6-2.2Ghz boost clock speed up to 3Ghz.
  • Thermal design point between 60-110 watts.
  • Available Intel Quick Assist 100Gbs cryptographic acceleration.
  • 512GB memory addressing.
  • Up to 4 built-in 10Gigabit Ethernet ports.

Putting processing power on the device level or edge contrasts with the centralized processing model of client-server or cloud models. Recent trends have seen storage, applications and processing moving to the cloud. However, there are now processors designed to perform the processing onboard smart devices, autonomous vehicles and drones. In some cases, the change is because the application demands instantaneous response.

Onboard processing is part of the cyclical nature of computing models. As compute requirements are ever increasing, the computing world has traditionally moved to a centralized processing model - until developments in processors enable more to be computed on the device with less power. The move is also made in recognition that the sheer number of things in the IoT will make the possibility of all of them, depending on a connection to the cloud, a recipe for network congestion.

This was last updated in March 2018

Continue Reading About Intel Xeon D-2100

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

  • hardware security module (HSM)

    A hardware security module (HSM) is a physical device that provides extra security for sensitive data.

  • buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

Close