Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 335 Results
  • Items Per Page

4th Gen Intel® Core™ i5-4570 Processor Benchmark

Compares the 4th generation Intel® Core™ i5-4570 processor to the Intel® Core™2 Duo E8400 processor video conversion and gaming performance tests.

4th Gen Intel® Core™, Intel® Xeon® Processor E3-1268L v3: Addendum

Addendum: 4th gen Intel® Core™ processor, Intel® Xeon® processor E3-1268L v3 power numbers, and platform, benchmark, and temp info. (v.1, June 2013)

Preview | Download

4th Gen Intel® Core™ i7-4700EQ Processor Development Kit: Guide

User Guide: Describes the hardware set-up procedures for the 4th gen Intel® Core™ i7-4700EQ processor development kit. (v.1.1, July 2013)

Desktops Powered by Intel

See how new desktops with Intel Inside® help you embrace the digital world, with desktop systems and products for home, enthusiasts, and business.

Intel® Desktops for Home: Stylish Computing for the Whole Family

Discover how the latest devices from All-in-Ones to traditional home desktops with Intel Inside® deliver more secure, powerful, immersive experiences.

Intel® Core™ Processor Family

The 5th generation Intel® Core™ processor family provides a difference that you can see and feel with longer battery life and built-in security.

What Is a Mini PC?

See how Intel delivers big desktop power in a tiny package, with stunning visuals and high-end performance for games and business, in a mini PC.

2nd Gen Intel® Core™ Processor, Pentium® Processor: Spec Update

Spec Update: 2nd generation Intel® Core™ processor family desktop and Intel® Pentium® processor family desktop for LGA-1155 Socket. (v.35, Feb. 2015)

Preview | Download

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

How Intel Is Changing Enterprise Protection

Intel is working with companies to make security software that is enhanced with hardware, expanding enterprise protection from boot time to run time.