Intel® Core™ i7-900 Processor Extreme Edition Series and LGA1366 Socket
VídeosExibir mais vídeos
Intel® WiDi with 4th Gen Intel® Core™ Processors
See how easily Intel® Wireless Display sends content to a TV, monitor, or set-top box.
Overview: 4th Gen Intel® Core™ Processors
Look Inside™ and see the technology and benefits that the 4th gen Intel® Core™ processor brings.
What’s Changed: 4th Gen Intel® Core™ Processors
See what’s changed with 4th gen Intel® Core™ processor performance, battery life, and visuals.
Adaptive Performance, Stunning Visual Experience
Intel® Core™ processors secure mobility, online rich media, business operations. (1:55)
Intel® Quick Sync Video
Quickly convert and share videos faster with Intel® Quick Sync Video. (0:41)
Intel® Insider™ for UltraViolet*
Purchase, rent, and stream UltraViolet* movies and entertainment wirelessly to your TV.
Intel® Graphics Technology Intensifies Gaming Experience
Intel® HD Graphics and Iris™ graphics require no extra card and are ideal for gaming and video. (0:51)
Multitask with Intel® Hyper-Threading Technology
Intel® Hyper-Threading Technology enables Intel® Core™ processors to simultaneously perform multiple tasks. (0:51)
Built-in Visual Features Deliver Stunning Content
Visual features optimize graphics to deliver stunning and seamless PC viewing experiences. (2:22)
Intel® Quick Sync Video Increases Production Speed
Technology improves the speed at which users can download, create, edit, and share video. (1:28)
Testimonial: NCR Retail Solutions on the 3rd Gen Intel®...
NCR on how 3rd gen Intel® Core™ processor-based transaction retail solutions support their innovation strategy.
Kitty & Lala
A Intel apresenta a Kitty & Lala - 80 Impression, uma empresa de fotografia de casamento na China. (6:36)
Animador de Rock 'n' Rol:
Um Filme com Inteligência que se vê Intel® apresenta o animador de Rock 'n' Roll Christen Bach. (6:03)
A violoncelista Zoe Keating cria "um mundo de sentimentos, emoções, cores e luzes"
Crimeware Protection on 4th Gen Intel® Core™ vPro™...
See how built-in technologies offer protection in threat mitigation, identity, data, and monitoring.