Specification Sheet

8TH GENERATION INTEL® COREDESKTOP PROCESSOR FEATURES AT A GLANCE
FEATURES
1
BENEFITS
Intel® Turbo Boost Technology 2.0
Dynamically increases the processor’s frequency, as needed, by taking advantage of thermal and power
headroom when operating below specied limits.
Intel® Hyper-Threading Technology
Delivers two processing threads per physical core. Highly threaded applications can get more work done
in parallel, completing tasks sooner.
Intel® Smart Cache Dynamically allocates shared cache to each processor core, based on workload, reducing latency and
improving performance.
Integrated Memory Controller Oers stunning memory read/write performance through ecient prefetching algorithms, lower latency,
and higher memory bandwidth.
Intel® UHD Graphics
Play 4K UHD videos with exceptional clarity, view and edit even the smallest details of photos, and play
today’s modern games.
Intel® Quick Sync Video – Delivers excellent video conferencing capability, fast video conversion, online
sharing, and fast video editing and authoring.
Processor Core/Memory/
Graphics Overclocking
2
When unlocked processors are paired with select chipset SKUs, processor core, graphics, and
memory can be set to run at frequencies above the specication frequency of the processor resulting
in higher performance.
PCI Express* 3.0 Interface
Offers up to 8 GT/s for fast access to peripheral devices with up to 16 lanes.
4
The lanes can be configured
as 1x16, 2x8, or 1x8 and 2x4 depending on motherboard designs.
Intel® Optane™ Memory Support
Provides performance improvements as well as fast app response times for system acceleration and
responsiveness when paired with an Intel Optane memory module.
Intel® Power Optimizer
and Processor C-States
Intel® Power Optimizer increases periods of silicon sleep state across the platform ingredients, including
the processor, chipset, and third-party system components, to reduce power. Processor C-states (C8-
C10) provide low idle power.
In
tel® Virtualization Technology
Allows one hardware platform to function as multiple “virtual” platforms. Oers improved manageability by
limiting downtime and maintaining productivity by isolating computing activities into separate partitions.
VMCS Shadowing VMCS shadowing allows a Virtual Machine Manager (VMM) running in a guest (nested virtualization) to
access a shadow VMCS memory area using the normal VMRead/VMWrite instructions. This technology
reduces overhead for a more natural and responsive user experience. It also allows users to take control
of their personal and professional data and apps while being protected by game-changing security.
Intel® Advanced Encryption Standard
New Instructions (Intel® AES-NI)
A set of instructions that can be used to accelerate a variety of encryption apps, including whole disk
encryption, le storage encryption, conditional access of 4K UHD content, Internet security, and VoIP.
Consumers benet from protected internet and email content, plus fast, responsive disk encryption.
In
tel® Transactional Synchronization
Extensions (Intel® TSX)
A set of instructions focused on enterprise-level multithreaded performance scaling, making parallel
operations more ecient via improved control of software threads and locks. This oers performance
benets for enterprise-level big data analytics/business intelligence and visualization apps, which
involve multi-user collaboration.
Intel® Advanced Vector Extensions 2
(Intel® AVX2)
3
A set of 256-bit instructions to deliver enhanced performance on oating point- and integer-intensive
apps. Includes instructions for FMA (Fused Multiply Add) which can deliver better performance on media
and oating point computations, including face recognition, professional imaging, high-performance
computing, consumer video and imaging, compression, and encryption.
Intel® Software Guard Extensions
(Intel®
SGX)
A collection of instructions, APIs, libraries, and tools to help protect select code and data from disclosure
or modication through the use of enclaves, which are protected areas of execution in memory.
In
tel® BIOS Guard
An augmentation of existing chipset-based BIOS ash protection capabilities targeted to address the
increasing malware threat to BIOS ash storage. It helps protect the BIOS ash from modication without
platform manufacturer authorization, helps defend the platform against low-level DOS (denial of service)
attacks, and restores BIOS to a known good state after an attack.
In
tel® Boot Guard
Hardware-based boot integrity protection that helps prevent unauthorized software and malware
takeover of boot blocks critical to a system’s function, thus providing added level of platform security
based on hardware. Congurable boot types include:
Measured Boot – measures the initial boot block into the platform storage device such as a trusted
platform module (TPM) or Intel® Platform Trust Technology.
Veried Boot – cryptographically veries the platform initial boot block using the boot policy key.
Intel® OS Guard
A hardware-based security feature that protects the OS (operating system) kernel. OS Guard helps
prevent use of malicious data or attack code located in areas of memory marked as user mode pages
from taking over or compromising the OS kernel. OS Guard is not application-specic and protects the
kernel from any application.
I
ntel® Identity Protection Technology
Protect your one-time-password (OTP) credentials and public key infrastructure (PKI) certicates and
add a layer of encrypted, second factor authentication for online transactions.
Intel® Secure Key
Security hardware-based random number generator that can be used for generating high-quality keys
for cryptographic (encryption and decryption) protocols. Provides quality entropy that is highly sought
after in the cryptography world for added security.
3