Browse Definitions :
Definition

Mini-ITX

Contributor(s): Jason Williams

Mini-ITX is a compact motherboard configuration designed to support relatively low-cost computers in small spaces such as in automobiles, set-top box es, and network devices. The Mini-ITX can also be used in making thin client computers.

The Mini-ITX is similar and backward compatible to predecessor motherboards, the Micro-ATX and the Flex-ATX, but it has several features that set it apart. The Mini-ITX is very small, measuring 170 mm x 170 mm (6.75 inches x 6.75 inches). The power supply is less than 100 watt s. The Mini-ITX processors are ultra low power x86 processor s that are soldered to the motherboard and are cooled by a heatsink only instead of a heatsink and a fan. Video, audio, and local area network (LAN) connection are built into the Mini-ITX. It also has two universal serial bus ( USB ) ports, a serial and parallel port, audio input and output, and a Peripheral Component Interconnect ( PCI ) slot that can support two devices with a riser card . There is no floppy drive interface, but there is a CD-ROM and DVD-ROM interface. A case (a Micro-ATX and Flex-ATX case will work), memory, a hard drive, and a power supply complete an inexpensive computer.

A computer built with a Mini-ITX could be used for simple, everyday tasks such as e-mail, Web browsing, word processing, and listening to music. The Mini-ITX was developed by VIA Technologies.

This was last updated in September 2005

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close