Orders placed after 4PM on weekdays will not ship until the next business day. Orders placed after 11AM Fridays will not ship until the following Monday.
Faster shipping methods may be available; just upgrade during checkout.
*Some exclusions apply.
Enjoy Extended Returns thru Feb 1, 2017!
You have until Feb 1, 2017 to return or exchange items purchased between Nov 1, 2016 and Jan 1, 2017. All other standard return policy conditions apply.
Enter new zip code to refresh estimated delivery time.
The Core i5-4570S 3.6 GHz Processor from Intel is a quad core processor with additional 6MB cache. The processor features Intel HD graphics 4600 for graphics capabilities. The Intel Wireless Display feature enables wireless streaming of movies, photos, websites and more from an UltrabookTM or PC to an HDTV. In addition, the quad processor includes Intel Quick Sync Video, Intel InTru 3D technology, Intel Insider technology, Intel Clear Video HD technology and an option to embed.
The processor also features advanced technologies such as Intel Turbo Boost technology, Intel Virtualization technology (VT-x), Intel vPro technology, Intel TSX-NI, Intel Virtualization technology for Directed I/O (VT-d), Enhanced Intel SpeedStep technology, Execute Disable Bit and more.
Intel Quick Sync Video
Delivers fast conversion of video for portable media players, online sharing and video editing and authoring
Intel InTru 3D Technology
Provides stereoscopic 3D Blu-ray playback in full 1080p resolution over HDMI 1.4 and premium audio
Intel Insider Technology
Delivers premium HD content to an Ultrabook or PC
Intel Wireless Display
Enables wireless streaming of movies, photos, websites and more from an Ultrabook or PC to an HDTV
Intel Clear Video HD Technology
Delivers high definition quality playback for movies and games
Intel Turbo Boost 2.0 Technology
Dynamically increases the processor's frequency as needed, by taking advantage of thermal and power headrooms. This allows the processor to run faster and makes it more energy efficient
Intel vPro Technology
Intel vPro technology includes a set of security and manageability capabilities built into the processor aimed to address four critical areas of IT security:
Threat management, including protection from rootkits, viruses and malware
Identity and website access point protection
Confidential personal and business data protection
Remote and local monitoring, remediation and repair of PCs and workstations
Intel Virtualization Technology (VT-x)
Allows one hardware platform to function as multiple virtual platforms. It offers improved manageability by limiting downtime and maintaining productivity by isolating computing activities into separate partitions
Intel Virtualization Technology for Directed I/O (VT-d)
This technology continues from the existing support for IA-32 (VT-x) and Itanium processor (VT-i) virtualization, adding new support for I/O-device virtualization. Intel VT-d helps improve security and reliability of systems as well as performance of I/O devices in virtualized environments
Intel VT-x with Extended Page Tables (EPT)
Also known as Second Level Address Translation (SLAT), this technology provides acceleration for memory intensive virtualized applications. The Extended Page Tables in Intel Virtualization Technology platforms reduce memory as well as power overhead costs and increase battery life through hardware optimization of page table management
Intel Trusted Execution Technology
Intel Trusted Execution technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets which enhances the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system
Advanced Encryption Standard New Instructions (AES-NI)
Advanced Encryption Standard New Instructions (AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI is valuable for a wide range of cryptographic applications, including applications that perform bulk encryption/decryption, authentication, random number generation and authenticated encryption
Intel Transactional Synchronization Extensions New Instructions (Intel TSX-NI)
Intel Transactional Synchronization Extensions New Instructions (Intel TSX-NI) are a set of instructions focused on multi-threaded performance scaling. This technology helps make parallel operations more efficient via improved control of locks in software
Intel 64 Architecture
Intel 64 architecture delivers 64-bit computing on server, workstation, desktop and mobile platforms when combined with supporting software. It also improves performance by allowing systems to address more than 4GB of both virtual and physical memory
Intel Anti-Theft Technology (Intel AT)
Helps keep your laptop safe and secure in the event that it's ever lost or stolen. Intel AT requires a service subscription from an Intel AT-enabled service provider
Idle States (C-States)
Idle States are used to save power when the processor is idle. C0 is the operational state, meaning that the CPU is performing useful tasks. C1 is the first idle state, C2 is the second and so on, where more power-saving actions are performed by numerically higher C-states
Enhanced Intel SpeedStep Technology
It is an advanced means of enabling high performance while meeting the power conservation needs of mobile systems. Conventional Intel SpeedStep technology switches both voltage and frequency in tandem between high and low levels in response to processor load. Enhanced Intel SpeedStep technology builds upon that architecture using design strategies such as separation between voltage and frequency changes and clock partitioning and recovery
Thermal Monitoring Technologies
Thermal Monitoring technologies protect the processor package and system from thermal failure through several thermal management features. An on-die Digital Thermal Sensor (DTS) detects the core's temperature. The thermal management features reduce package power consumption and thereby temperature when required in order to remain within normal operating limits
Execute Disable Bit
Execute Disable Bit is a hardware-based security feature that reduces exposure to viruses and malicious code attacks. It also prevents harmful software from executing and propagating on the server or network
Intel Secure Key
Intel Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms
Intel Identity Protection Technology (IPT)
Intel Identity Protection technology is a built-in security token technology that helps provide a simple, tamper-resistant method for protecting access to your online customer and business data from threats and fraud. Intel IPT furnishes a hardware-based proof of a unique user's PC to websites, financial institutions and network services, providing verification that it is not malware attempting to login. This technology serves as a key component in two-factor authentication solutions to protect your information at websites and business log-ins