Browse Definitions :
Definition

Mini-ITX

Mini-ITX is a compact motherboard configuration designed to support relatively low-cost computers in small spaces such as in automobiles, set-top box es, and network devices. The Mini-ITX can also be used in making thin client computers.

The Mini-ITX is similar and backward compatible to predecessor motherboards, the Micro-ATX and the Flex-ATX, but it has several features that set it apart. The Mini-ITX is very small, measuring 170 mm x 170 mm (6.75 inches x 6.75 inches). The power supply is less than 100 watt s. The Mini-ITX processors are ultra low power x86 processor s that are soldered to the motherboard and are cooled by a heatsink only instead of a heatsink and a fan. Video, audio, and local area network (LAN) connection are built into the Mini-ITX. It also has two universal serial bus ( USB ) ports, a serial and parallel port, audio input and output, and a Peripheral Component Interconnect ( PCI ) slot that can support two devices with a riser card . There is no floppy drive interface, but there is a CD-ROM and DVD-ROM interface. A case (a Micro-ATX and Flex-ATX case will work), memory, a hard drive, and a power supply complete an inexpensive computer.

A computer built with a Mini-ITX could be used for simple, everyday tasks such as e-mail, Web browsing, word processing, and listening to music. The Mini-ITX was developed by VIA Technologies.

This was last updated in September 2005
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close