Painel

Localizar conteúdo

Refinar resultados
Conteúdo relacionado

Marcadores ativos

  • 399 Resultados
  • Itens por página

Intel® 64 and IA-32 Architectures Optimization Reference Manual

Manual de referência Intel® 64 and IA-32 Architectures, information on Intel® Core™ processors, Intel NetBurst® and other Intel® microarchitecture.

Visualizar | Fazer download

How Intel Security Defends Against Malware

Intel arms your software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities and defend against malware.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

Remote Healthcare System Speeds Diagnosis: Case Study

Case Study: AI-EKG* system by A N D Technologies Pvt. Ltd. enables patients in remote areas to send results to healthcare clinics. (v.1, Mar. 2013)

Visualizar | Fazer download

Hexapod Robot Using Intel® Atom™ Processor

Features Black Sand applications built using Intel® Embedded Development Board 1-N450 including a student-built hexapod robot.

Guangzhou Zhiyuan Designs a High-Performance Industrial PC

Case Study: Guangzhou Zhiyuan high-performance embedded industrial PC uses Intel® Atom™ processors for better control of factory floor equipment.

Visualizar | Fazer download

Intel's Industrial Controller in Concert

Demo highlighting the scalability of multi-core Atom products reveals how Atom can be used real-time in the industrial environment.

Chipset Intel® H61 Express

As plataformas para PC baseadas no chipset Intel® H61 Express e na família de processadores Intel® Core™ oferecem novas tecnologias e recursos inovadores

Família de processadores Intel® Core™

Obtenha uma diferença que se pode ver e sentir com a 4ª geração dos processadores Intel® Core com maior autonomia da bateria e segurança integrada.

Processadores Intel® Core™ vPro™

4th generation Intel® Core™ vPro™ processors come with embedded security that delivers unprecedented protection for your clients and business data.