3rd Generation Intel Core™ i 5 Processor Enjoy rich visuals plus an automatic burst of speed when you need it on your PC. Get an automatic burst of speed whenever you need it for performance that adapts to you. Intel Turbo Boost Technology Intel Turbo Boost Technology dynamically increases the processor's frequency as needed by taking advantage of thermal & power headroom to give you a burst of speed when you need it, & increased energy efficiency when you don′t. Intel v Pro Technology Intel v Pro™ Technology is a set of security & manageability capabilities built into the processor aimed at addressing four critical areas of IT security: 1) Threat management, including protection from rootkits, viruses, & malware 2) Identity & web site access point protection 3) Confidential personal & business data protection 4) Remote & local monitoring, remediation, & repair of PCs & workstations. Intel Virtualization Technology (VT-x) Intel Virtualization Technology (VT-x) allows one hardware platform to function as multiple virtual" platforms. It offers enhanced manageability by limiting downtime & maintaining productivity by isolating computing activities into separate partitions. Intel Virtualization Technology for Directed I/O (VT-d) Intel Virtualization Technology for Directed I/O (VT-d) continues from the existing support for IA-32 (VT-x) & Itanium processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security & reliability of the systems & also improve performance of I/O devices in virtualized environments. Intel Trusted Execution Technology Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors & chipsets that enhance the digital office platform with security capabilities such as measured launch & protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system. AES New Instructions Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast & secure data encryption & decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, anthentication, random number generation, & authenticated encryption. Intel 64 Intel 64 architecture delivers 64-bit computing on server, workstation, desktop & mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual & physical memory. Intel Anti-Theft Technology Intel Anti-Theft Technology (Intel AT) helps keep your laptop safe & secure in the event that it′s ever lost or stolen. Intel AT requires a service subscription from an Intel AT-enabled service provider. Idle States Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, & so on, where more power saving actions are taken for numerically higher C-states. Enhanced Intel Speed Step Technology Enhanced Intel Speed Step Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel Speed Step Technology switches both voltage & frequency in tandem between high & low levels in response to processor load. Enhanced Intel Speed Step Technology builds upon that architecture using design strategies such as Separation between Voltage & Frequency Changes, & Clock Partitioning & Recovery. Thermal Monitoring Technologies Thermal Monitoring Technologies protect the processor package & the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, & the thermal management features reduce package power consumption & thereby temperature when required in order to remain within normal operating limits. Intel Fast Memory Access Intel Fast Memory Access is an updated Graphics Memory Controller Hub (GMCH) backbone architecture that improves system performance by optimizing the use of available memory bandwidth & reducing the latency of the memory accesses. Intel Flex Memory Access Intel Flex Memory Access facilitates easier upgrades by allowing different memory sizes to be populated & remain in dual-channel mode. Execute Disable Bit Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses & malicious-code attacks & prevent harmful software from executing & propagating on the server or network. Intel VT-x with Extended Page Tables (EPT) Intel VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel Virtualization Technology platforms reduces the memory & power overhead costs & increases battery life through hardware optimization of page table management.