∆Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families. See www.intel.com/products/ processor_number for details.
1Intel® Active Management Technology (Intel® AMT) requires the computer system to have an Intel® AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the management console or further integration into existing security frameworks to enable certain functionality. It may also require modifications of implementation of new business processes. With regard to laptops, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see http://www.intel.com/technology/platform- technology/intel-amt/.
2KVM Remote Control (Keyboard Video Mouse) is only available with dual-core Intel® Core™ i5 vPro™ processors and i7 vPro™ processors with active integrated graphics. Discrete graphics are not supported.
3Intel® Turbo Boost Technology available on the Intel® Core™ i7 processor and the Intel® Core™ i5 processor only. Intel® Turbo Boost Technology requires a PC with a processor with Intel Turbo Boost Technology capability. Intel Turbo Boost Technology performance varies depending on hardware, software and overall system configuration. Check with your PC manufacturer on whether your system delivers Intel Turbo Boost Technology. For more information, see http://www.intel.com/technology/turboboost.
4Intel® Anti-Theft Technology – PC Protection (Intel® AT-p). No computer system can provide absolute security under all conditions. Intel® Anti-Theft Technology (Intel® AT-p) requires the computer system to h ave an Intel® AT-enabled chipset, BIOS, firmware release, software and an Intel AT-capable Service
Provider/ISV application and service subscription. The detection (triggers), response (actions), and recovery mechanisms only work after the Intel® AT functionality has been activated and configured.
Certain functionality may not be offered by some ISVs or service providers and may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof.
5Source: Intel. Actual time saved depends on network traffic conditions, the amount of user data migrated, and applications, drivers, or policies downloaded during the migration process. Data collected by Intel on various desktop and laptop PCs migrated to Windows 7 under various conditions. MMS demo showing remote, wireless Windows 7 upgrade on Win XP laptops: http://www.vimeo. com/4430604.
6Intel® Hyper-Threading Technology (Intel® HT Technology) requires a computer system with an Intel® processor supporting Intel HT Technology and an Intel HT Technology enabled chipset, BIOS, and operating system. Performance will vary depending on the specific hardware and software you use.
See www.intel.com/products/ht/hyperthreading_more.htm for more information including details on which processors support Intel HT Technology.
7Source: “Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles”, Wipro
Technologies, March 2009 (www.wipro.com/industryresearch). Based on a survey of 106 firms in
North America and representing 15 different industries and projections based on a Model Company developed by Wipro Technologies. Computer system price data updated November 2009. Actual results may vary based on the number of use-cases implemented and may not be representative of results that individual businesses may realize. For additional implementation examples refer
to Intel Case Studies available at http://communities.intel.com/openport/docs/DOC-1494. Study commissioned by Intel.
8AES-NI is a set of instructions that consolidates mathematical operations used in the Advanced Encryption Standard (AES) algorithm. Enabling AES-NI requires a computer system with an AES-NI-enabled processor as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on Intel® Core™ i5-600 Desktop Processor Series, Intel® Core™ i7-600 Mobile Processor Series, and Intel® Core™ i5-500 Mobile Processor Series. For further availability of AES-NI enabled processors or systems, check with your reseller or system manufacturer. For more information, see http://softwarecommunity.intel.com/isn/downloads/ intelavx/AES-Instructions-Set_WP.pdf.
9Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM) and, for some uses, certain computer system software enabled
for it. Functionality, performance or other benefits will vary depending on hardware and software configurations and may require a BIOS update. Software applications may not be compatible with all operating systems. Please check with your application vendor.
10Source: Business World – IT Matters - http://www.itmatters.com.ph/ovum.php?id=111108a.
11Cross client claim based on lowest performance data number when comparing desktop and laptop benchmarks. Configurations and performance test as follows:
(Laptop) Comparing pre-production Intel® Core™ i5-520M processor based laptops to theoretical installed base of Intel® Core™2 Duo processor T5500. Laptop system configurations: Intel® Core™ i5-520M (3 MB Cache, 2.4 GHz), with Intel® Turbo Boost Technology and Intel® Hyper-Threading Technology on pre-production Intel® Ibex Peak HM55, Dual-channel Micron* 4 GB (2x2 GB) DDR3- 1066 7-7-7-20 with Intel® Graphics Media Accelerator HD graphics, Hitachi* 320 GB HDD, Intel® Matrix Storage Manager 8.9.0.1023 (BIOS, Intel® INF and Graphics: pre-production, Imoncompliant with VRD 11.1 requirements), Microsoft* Windows* 7 Ultimate 64-bit RTM. Intel® Core™2 Duo processor T5500 (2 MB Cache, 1.66 GHz, 667 MHz FSB) in Lenovo* Thinkpad* T60 laptop, Laptop Intel® 945GM Express Chipset, Micron* PC5300 DDR2 667 2x1 GB 5-5-5-15 memory, Intel® GMA 950 graphics
224 MB Dynamic video memory technology, Hitachi* Travelstar* HTS721010G9SA00 SATA 100 GB 7200RPM HDD, BIOS Lenovo* 79ETD7WW 2.17 with default settings, Microsoft* Windows* Vista Ultimate. Business productivity claims based on SYSmark* 2007 preview is BAPCo’s latest version of the mainstream office productivity and Internet content creation benchmark tool used to characterize the performance of the business client. SYSmark 2007 preview features user-driven workloads and usage models developed by application experts. Multitasking claims based on financial calculations workload consisting of advanced spreadsheet calculation measured using Microsoft* Excel* Monte Carlo Simulation plus Virus Scan. Security workload consists of Winzip*12 decompressing an encrypted archive containing 200 photos, 125 of which are 10MP photos and 75 which are 6MP photos. The photos are in jpeg format. The total size of all the photos is about 830 MB.
(Desktop) Comparing pre-production Intel® Core™ i5-650 processor based desktops to theoretical installed base of Intel® Core™2 Duo Processor E6400 with comparable frequency. Desktop configurations: pre-production Intel® Core™ i5-650 processor (4MB Cache, 3.20 GHz) on pre- production Intel® Ibex Peak P55, Dual-channel DS Micron* 4 GB (2x2 GB) DDR3-1333 9-9-9-24 with Intel® Graphics Media Accelerator HD graphics @ 900 MHz, Seagate* 1TB HDD, Intel® Matrix Storage Manager 8.9.1023 (BIOS, Intel® INF and Graphics: pre-production, Imon compliant with VRD 11.1 requirements), Microsoft* Windows* 7 Ultimate 64-bit RTM Intel® Core™2 Duo Processor E6400 (2M Cache, 2.13 GHz, 1066 MHz FSB) on Intel® DQ45CB, Dual channel DS Micron* 2 GB (2x1 GB) DDR2-800 5-5-5-18 with Integrated Intel® GMA 3000 onboard graphics subsystem, Seagate* 320 GB HDD, (BIOS:0059, Intel® Chipset INF: 8.4.0.1016, Graphics: 7.14.10.1329), Microsoft* Windows* 7 Ultimate 64-bit RTM, Microsoft* Windows* Vista Ultimate 32-bit. Business productivity and energy claims based on SYSmark* 2007 preview is BAPCo’s latest version of the mainstream office productivity and Internet content creation benchmark tool used to characterize the performance of the business client. SYSmark 2007 preview features user-driven workloads and usage models developed by application experts. Multitasking claims based on financial calculations workload consists of advanced spreadsheet calculation measured using Microsoft* Excel* Monte Carlo Simulation plus Virus Scan. Security workload consists of Winzip*14 decompressing an encrypted archive containing 200 photos, 125 of which are 10 MP photos and 75 which are 6 MP photos. The photos are in jpeg format. The total size of all the photos is about 830 MB.
12Results shown are from the 2007 EDS Case Studies with Intel® Centrino® Pro and the 2007 EDS case studies with Intel® vPro™ processor technology, by LeGrand and Salamasick., 3rd party audit commissioned by Intel, of various enterprise IT environments and the 2007 Benefits of Intel® Centrino® Pro Processor Technology in the Enterprise, Wipro Technologies study commissioned by Intel. The EDS studies compare test environments of Intel® Centrino® Pro and Intel® vPro™ processor technology equipped PCs vs. non-Intel®vPro™ processor technology environments. Tested PCs were in multiple OS and power states to mirror a typical working environment. The Wipro study models projected ROI of deploying Intel® Centrino® Pro processor technology. Actual results may vary and may not be representative of the results that can be expected for smaller businesses. The study is available at www.intel.com/vpro, www.eds.com and www.wipro.com. Studies commissioned by Intel.