Memory
| Supported memory clock speeds |
1600, 1866 MHz |
| Memory bandwidth (max) |
14.9 GB/s |
| ECC |
N |
| Supported memory types |
DDR3L-SDRAM |
| Memory voltage |
1.35 V |
| Memory channels |
Dual |
| Memory slots type |
SO-DIMM |
| Number of memory slots |
2 |
| Maximum internal memory |
16 GB |
Ports & interfaces
| Infrared data port |
Y |
| Combo headphone/mic port |
Y |
| Number of SATA III connectors |
1 |
| S/PDIF out port |
Y |
| HDMI version |
2.0 |
| DC-in jack |
Y |
| USB 3.0 (3.1 Gen 1) Type-A ports quantity |
4 |
| Consumer infrared headers |
Y |
| HDMI ports quantity |
1 |
| VGA (D-Sub) ports quantity |
1 |
Graphics
| Maximum graphics adapter memory |
8 MB |
| On-board graphics adapter |
Y |
| Graphics adapter family |
Intel |
Motherboard
| Number of processors supported |
1 |
| Processor socket |
BGA 1296 |
Processor
| Processor boost frequency |
2.30 GHz |
| Processor lithography |
14 nm |
| Thermal Design Power (TDP) |
10 W |
| Processor threads |
4 |
| Processor cores |
4 |
| Built-in processor |
Y |
| Processor frequency |
1.50 GHz |
Processor special features
| Intel Rapid Storage Technology |
N |
| Execute Disable Bit |
Y |
| Idle States |
Y |
| Thermal Monitoring Technologies |
Y |
| Intel Trusted Execution Technology |
N |
| Intel Smart Connect Technology |
N |
| Intel® Small Business Advantage (Intel® SBA) |
N |
| Intel Stable Image Platform Program (SIPP) |
N |
| Intel® Quick Sync Video Technology |
Y |
| Intel® Insider™ |
N |
| Intel 64 |
Y |
| Intel Clear Video Technology |
Y |
| Intel® Smart Response Technology |
N |
| Embedded options available |
N |
| Intel Virtualization Technology for Directed I/O (VT-d) |
Y |
| Intel® Anti-Theft Technology (Intel® AT) |
N |
| Intel® Identity Protection Technology (Intel® IPT) |
Y |
| Intel Hyper-Threading Technology |
N |
| Intel® Turbo Boost Technology |
N |
| Intel® Secure Key |
Y |
| Intel® Virtualization Technology (Intel® VT) |
VT-d, VT-x |
| Intel vPro Technology |
N |
| Intel VT-x with Extended Page Tables (EPT) |
Y |
| Enhanced Intel SpeedStep Technology |
Y |
| Intel® OS Guard |
N |
| Intel® Wireless Display (Intel® WiDi) |
N |
| Intel® Clear Video HD Technology (Intel® CVT HD) |
Y |
Storage
| Number of storage drives supported |
2 |
| Compatible memory cards |
SDXC |
| Card reader integrated |
Y |
Audio
| Audio output channels |
7.1 channels |
| Audio system |
ALC283 |
Networking
| Bluetooth version |
4.2 |
| Wi-Fi |
Y |
| Bluetooth |
Y |
Power
| Number of power supply units |
1 |
| AC adapter output voltage |
12-19 V |
| Power supply type |
External AC adapter |
Design
| Product family |
Intel NUC |
| Product series |
Intel NUC kit |
| Product codename |
Arches Canyon |
| Cooling type |
Active |
| Product type |
PC barebone |
Performance
| Trusted Platform Module (TPM) |
N |
Weight & dimensions
| Depth |
101.6 mm |
| Width |
101.6 mm |
Expansion slots
| PCI Express slots version |
2.0 |
Additionally
| InTru™ 3D Technology |
N |
| Intel HD Audio Technology |
Y |
| Colour of product |
Black, Grey |
| Graphics |
HD Graphics 500 |
| Ethernet LAN connection |
Y |
| On/Off switch |
Y |
| Intel AES New Instructions |
Y |
| AC adapter bundled |
Y |
| Ethernet LAN (RJ-45) ports quantity |
1 |
NUC Kit NUC6CAYS
Intel® Virtualization Technology for Directed I/O (VT-d)
Intel® Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) and Itanium® processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environments.
Intel® HD Audio Technology
Intel® High Definition Audio (Intel® HD Audio) is capable of playing back more channels at higher quality than previous integrated audio formats. In addition, Intel® HD Audio has the technology needed to support the latest and greatest audio content.
Intel® AES New Instructions
Intel® AES New Instructions (Intel® AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.