The Core Duo mobile processors break new ground in high-efficiency, low-power mobile computing. Two cores give you true multi-tasking and multi-threading allowing you to play a game while downloading music in the background.
Since you don’t always run your system at max load, the Enhanced Intel SpeedStep Technology lets the operating system throttle down the processor’s speed. When the processor is slowed down, it uses less power. Less power means lower electricity bills. Also, if it’s running with less power it is running cooler which will extend battery life.
Digital Media Boost is a set of technologies that accelerates CAD tools, 3D and 2D modeling, editing and gaming. This is one of the key ingredients in Intel’s Viiv technology that gives you a truly rich multimedia experience. With all these features, you'll wonder why it doesn't cost more!
- Specialized Dual-core MicroarchitectureThe Intel Core Duo processor includes two mobile-optimized execution cores in a single processor to enable execution of parallel threads or applications on separate cores with dedicated CPU resources. The results enable outstanding dual-core performance and greater system response when running multi-threaded or multiple demanding applications simultaneously.
- Intel Smart Cache – 2MB L2 cache with Advanced Transfer Cache ArchitectureDelivers a smarter and more efficient cache and bus to enable enhanced dual-core performance and power savings.
- Enhanced Intel SpeedStep Technology (EIST)EIST allows the system to dynamically adjust processor voltage and core frequency to decrease average power consumption and average heat production. Combined with existing power saving features, EIST may provide an excellent balance between providing power when you need it and conserving power when you don’t.
- Execute Disable Bit (EDB)Intel's Execute Disable Bit function can prevent certain classes of malicious "buffer overflow" attacks when combined with a supporting operating system. Execute Disable Bit allows the processor to classify areas in memory where application code can execute and where it cannot. When a malicious worm attempts to insert code in the buffer, the processor disables code execution, preventing damage or worm propagation.