Dismantling Procedures

Please find below dismantling user guides for NVIDIA® products organized by product category.

Gateway Systems

Dismantling Guides Model No.
MBXXXX BridgeX® Based Gateway Systems (PDF 487 KB) MBX1020; MBX5020; MBX9020
MTBXXX BridgeX® Based Gateway Systems (PDF 597 KB) MTB4010; MTB4020
SwitchX® Based Gateway Systems (PDF 2.7 MB) SX6036G

Switch Systems

Dismantling Guides Model No.
8 Port InfiniScale® IV Unmanaged 40Gb/s InfiniBand Switch System (PDF 411 KB) IS5022
18 or 36 Port InfiniScale® IV Unmanaged 40Gb/s InfiniBand Switch System (PDF 342 KB) IS5023; IS5024
18 or 36 Port InfiniScale® IV Managed and Unmanaged InfiniBand Switch Systems (PDF 532 KB) IS5025; IS5030; IS5031; IS5035
InfiniScale IV/ SwitchX® Modular Switch Platforms (PDF 733 KB) IS5100; IS5200; IS5300; IS5600; SX6512; SX6518; SX6536
1U SwitchX® Based Switch Systems (PDF 2.7 MB) SX1012; SX1016; SX1024; SX1035; SX1036; SX1400; SX1700
SX6005; SX6012; SX6015; SX6018; SX6025; SX6036; TX6000; TX6100; TX6240; TX6280
648-Port EDR InfiniBand Switch-IB Switch Dismantling Guide (PDF 1.2 MB) CS7500
324-Port EDR InfiniBand Switch-IB Switch Dismantling Guide (PDF 1.1 MB) CS7510
216-Port EDR InfiniBand Switch-IB Switch Dismantling Guide (PDF 1.1 MB) CS7520
36 Port InfiniScale® III Switch Platform (PDF 421 KB) MTS3600
324 Port InfiniScale® III Switch Platform (PDF 1.6 MB) MTS3610

You agree not to use the Applications to post any Content or take any action or actions that:

1. Infringe, dilute, misappropriate, or otherwise violate any of our privacy, intellectual property, publicity, or other personal rights, including, without limitation, copyrights, patents, trademarks, trade secrets or other proprietary information (including unauthorized use of domain names);

2. Express or imply that any of your statements, activities, or causes are endorsed by Mellanox, without our prior written consent in each instance;

3. Violate any applicable law, statute, ordinance, or regulation, or encourage any conduct that could constitute a criminal offense or give rise to civil liability;

4. Are obscene, libelous, defamatory, threatening, harassing, invasive of privacy, abusive, tortious, hateful, discriminatory, or pornographic, or that advocates violence;

5. Transmit any trade secret or other material, non-public information about any person, company, or entity without the authorization to do so;

6. Bypass the measures we may use to prevent or restrict access to the Applications, including, without limitation, features that prevent or restrict use or copying of any content or enforce limitations on use of the Applications or the content therein;

7. Modify, adapt, sub-license, translate, sell, reverse engineer, decompile, or disassemble any portion of the Applications or Information or otherwise attempt to extract the source code of the software underlying the Applications or any part thereof unless expressly permitted or required by law, and in any case, without providing prior written notice to Mellanox;

8. Remove any copyright, trademark or other proprietary rights notices contained in or on the Applications;

9. Sublicense, sell, rent, lease, transfer, assign, or convey any rights under this Agreement to any third party, or otherwise commercially exploit or profit from the Information or content of the Applications, or any portion thereof, in any manner whatsoever, except as expressly permitted herein;

10. Copy, "frame" or "mirror" any part of the Applications without our prior written authorization;

11. Distribute any virus, worm or other similar or deleterious files, scripts or programming routines;

12. Involve the preparation or distribution of junk mail, spam, chain letters, pyramid schemes, or other deceptive or unsolicited bulk or commercial email, or violate in any way the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CANSPAM Act of 2003);

13. Attempt to disrupt, degrade, impair or violate the integrity, functionality or security of the Applications or the computers, services, Accounts or networks of any other party (including, without limitation, "hacking," "denial of service" attacks, etc.);

14. Manipulate identifiers in order to disguise the origin of any submission;

15. Use the Applications for any commercial solicitation purposes; and/or

16. Harvest or collect information about any Applications visitors or members, including any personally identifiable information, without their express consent.

Improper use of the Applications may result in termination of your access to and use of the Applications, and/or civil or criminal liabilities.