Orders placed after 4PM on weekdays will not ship until the next business day. Orders placed after 11AM Fridays will not ship until the following Monday.
Faster shipping methods may be available; just upgrade during checkout.
*Some exclusions apply.
Enjoy Extended Returns thru Feb 1, 2017!
You have until Feb 1, 2017 to return or exchange items purchased between Nov 1, 2016 and Jan 1, 2017. All other standard return policy conditions apply.
Enter new zip code to refresh estimated delivery time.
The Celeron G1830 2.8 GHz Processor from Intel features 2 cores and 2 threads and can be installed in a FCLGA1150 socket. This processer comes equipped with 2MB cache. You can connect a variety of peripherals to a PC equipped with this processor as it supports PCIe revision up to 3.0 in x16, x8, and x4 configurations. In addition, this processor includes Enhanced Intel SpeedStep Technology, Thermal Monitoring Technologies, Secure Key, and more.
"Conflict free" means "DRC conflict free", which is defined by the U.S. Securities and Exchange Commission rules to mean products that do not contain conflict minerals (tin, tantalum, tungsten, and/or gold) that directly or indirectly finance or benefit armed groups in the Democratic Republic of the Congo (DRC) or adjoining countries.
ECC Memory Supported
ECC memory is a type of system memory that can detect and correct common kinds of internal data corruption. Note that ECC memory requires both processor and chipset support.
Intel Quick Sync Video
Intel Quick Sync Video delivers fast conversion of video for portable media players, online sharing, and video editing, and authoring.
Intel Virtualization Technology (VT-x)*
Intel Virtualization Technology allows one hardware platform to function as multiple "virtual" platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions.
Intel VT-x with Extended Page Tables (EPT)*
Intel VT-x with Extended Page Tables, also known as Second Level Address Translation (SLAT), provides acceleration for memory-intensive virtualized applications. Extended Page Tables in Intel Virtualization Technology platforms reduce the memory and power overhead costs, and increase battery life through hardware optimization of page table management.
Intel 64 architecture delivers 64-bit computing on server, workstation, desktop, and mobile platforms when combined with supporting software. Intel 64 architecture improves performance by allowing systems to address more than 4GB of both virtual and physical memory.
Idle States (C-states) are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is performing useful tasks. C1 is the first idle state, C2 the second, and so on, where more power saving actions are taken for numerically higher C-states.
Enhanced Intel SpeedStep Technology
Enhanced Intel SpeedStep Technology is an advanced means of enabling high performance while meeting the power-conservation needs of mobile systems. Conventional Intel SpeedStep Technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep Technology builds upon that architecture using design strategies such as Separation between Voltage and Frequency Changes, and Clock Partitioning and Recovery.
Thermal Monitoring Technologies
Thermal Monitoring Technologies protect the processor package and the system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature, and the thermal management features reduce package power consumption (and thereby temperature, when required) in order to remain within normal operating limits.
Intel Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms.
Execute Disable Bit*
Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks, and prevent harmful software from executing and propagating on the server or network.
Note:*These features may not be available on all computing systems.