Acpi settings, Cpu configuration – NEXCOM ICES 254 User Manual
Page 83
Copyright © 2012 NEXCOM International Co., Ltd. All Rights Reserved.
69
ICEK 254-T2 Starter Kit User Manual
Chapter 4: BIOS Setup
Exit
Advanced
Chipset
PCIPnP
Security
Main
Version 2.14.1219. Copyright (C) 2011 American Megatrends, Inc.
Aptio Setup Utility - Copyright (C) 2011 American Megatrends, Inc.
←
Select Screen
↑↓
Select Item
+/-
Change Field
Tab
Select Field
F1
General Help
F10
Save & Exit
ESC
Exit
Select the highest ACPI sleep
state the system will enter when
the SUSPEND button is pressed.
ACPI Settings
ACPI Sleep State
[S3 (Suspend to RAM)]
ACPI Settings
This section is used to configure ACPI Settings.
ACPI Sleep State
Select the highest ACPI sleep state the system will enter when the suspend
button is pressed. The options are Suspend Disabled, S1 (CPU Stop Clock)
and S3 (Suspend to RAM).
Advanced
Version 2.14.1219. Copyright (C) 2011 American Megatrends, Inc.
Aptio Setup Utility - Copyright (C) 2011 American Megatrends, Inc.
→←: Select Screen
↑↓: Select Item
Enter: Select
+/-: Change Opt.
F1: General Help
F2: Previous Values
F3: Optimized Defaults
F4: Save & Exit
ESC: Exit
Enabled for Windows XP and
Linux (OS optimized for Hyper-
Threading Technology) and
Disabled for other OS (OS not
optimized for Hyper-Threading
Technology).
CPU Configuration
Processor Type
EMT64
Processor Speed
System Bus Speed
Ratio Status
Actual Ratio
System Bus Speed
Processor Stepping
Microcode Revision
L1 Cache RAM
L2 Cache RAM
Processor Core
Hyper-Threading
Hyper-Threading
Execute Disable Bit
Limit CPUID Maximum
Intel(R) Atom (TM) CPU
Supported
1865 MHZ
533 MHZ
14
14
533 MHZ
30661
259
2x56 k
2x512 k
Dual
Supported
[Enabled]
[Enabled]
[Disabled]
CPU Configuration
This section is used to configure the CPU.
Hyper-Threading
This field is used to enable or disable hyper-threading.
Execute Disable Bit
This field is used to enable or disable execute disable bit. When this field is
set to Disabled, it will force the XD feature flag to always return to 0. XD can
prevent certain classes of malicious buffer overflow attacks when combined
with a supporting OS (Windows Server 2003 SP1, Windows XP SP2, SuSE
Linux 9.2, RedHat Enterprise 3 Update 3)