INTEL Processor Core [i5-4460]




SocketLGA1150 
Jumlah Inti / Core
Jumlah Benang / Thread
Kecepatan Clock3.2 GHz
  • Max Turbo Frequency: 3.9 GHz  
Cache6 MB 
Instruction Set64-bit 
Litography22 nm 
Maks. TDP84 W 
Maks. Memori32 GB 
Tipe MemoriDDR3-1333/1600 
Number of Memory Channel
Kesesuaian Memori ECCNo 
Processor GraphicsIntel® HD Graphics 4600 
PCI Express Revision3.0 
Teknologi
  • Intel® Turbo Boost Technology: 2.0  
  • Intel® Hyper-Threading Technology
    • Intel® Hyper-Threading Technology (Intel® HT Technology) delivers two processing threads per physical core. Highly threaded applications can get more work done in parallel, completing tasks sooner.  
     
  • Intel® Virtualization Technology (VT-x)
    • Intel® Virtualization Technology (VT-x) allows one hardware platform to function as multiple “virtual” platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.  
     
  • Intel® VT-x with Extended Page Tables (EPT)
    • Intel® VT-x with Extended Page Tables (EPT), also known as Second Level Address Translation (SLAT), provides acceleration for memory intensive virtualized applications. Extended Page Tables in Intel® Virtualization Technology platforms reduces the memory and power overhead costs and increases battery life through hardware optimization of page table management.  
     
  • AES New Instructions
    • Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, anthentication, random number generation, and authenticated encryption.  
     
  • Intel® 64
    • Intel® 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software.¹ Intel 64 architecture improves performance by allowing systems to address more than 4 GB of both virtual and physical memory.  
     
  • Intel® Anti-Theft Technology
    • Intel® Anti-Theft Technology (Intel® AT) helps keep your laptop safe and secure in the event that it’s ever lost or stolen. Intel® AT requires a service subscription from an Intel® AT–enabled service provider  
     
  • Idle States
    • Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is doing useful work. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states.  
     
  • Enhanced Intel SpeedStep® Technology
    • Enhanced Intel SpeedStep® Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep® Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep® Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.  
     
  • Thermal Monitoring Technologies
    • Thermal Monitoring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, and the thermal management features reduce package power consumption and thereby temperature when required in order to remain within normal operating limits  
     
  • Execute Disable Bit
    • Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.  
     
  • Intel® Secure Key
    • Intel® Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms.  
     
  • Intel® Identity Protection Technology
    • Intel® Identity Protection Technology is a built-in security token technology that helps provide a simple, tamper-resistant method for protecting access to your online customer and business data from threats and fraud. Intel® IPT provides a hardware-based proof of a unique user’s PC to websites, financial institutions, and network services; providing verification that it is not malware attempting to login. Intel® IPT can be a key component in two-factor authentication solutions to protect your information at websites and business log-ins.  

Komentar

Postingan populer dari blog ini

Gitkraken

DATA SPASIAL

Measurement, Euclidean, Cost-Weighted Distance, Path-Distance Analysis