Dashboard

Find Content

Refine Results
Embedded Content Library

Selected Filters

  • 129 Results
  • Items Per Page

Digital Security Solutions Processor Comparison Chart

Select the right Intel® processor for digital security surveillance solutions by comparing features and benefits. (v.001, Mar. 2013)

Preview | Download

4th Gen Intel® Core™ Processor, Intel® QM87/HM86 Chipset: Diagram

Block Diagram: Covers the functions, capabilities, and connectivity within the 4th gen Intel® Core™ processor and the Intel® QM87/HM86 Chipsets.

2nd Gen Mobile Intel® Core™ Processor Family Datasheet, Vol. 2

Datasheet, Vol. 2: Mobile Intel® Core™ processor family configuration space registers, device-specific control, and status registers. (v.1, Jan. 2011)

Preview | Download

Intel® Core™ i7 Processor 2715QE: Power Guideline Addendum

Guideline Addendum: Updates Intel® Core™ i7 processor 2715QE app power guidelines with power numbers from real life applications. (v.001, Jan. 2012)

Preview | Download

Intel® Core™ i5-3610ME Processor Development Kit: Brief

Product Brief: Covers the Intel® Core™ i5-3610ME processor and mobile Intel® QM77 Express Chipset development kit overview and specs. (v.1, Dec. 2012)

Preview | Download

Intel® Core™ i5-3610ME Processor Development Kit Quick Start Guide

Quick Start Guide: Describes required peripherals and start-up procedure for the Intel® Core™ i5-3610ME processor development kit. (v.2, Jan. 2013)

Preview | Download

4th Gen Intel® Core™ i7-4700EQ Processor Development Kit: Guide

User Guide: Describes the hardware set-up procedures for the 4th gen Intel® Core™ i7-4700EQ processor development kit. (v.1.1, July 2013)

Preview | Download

Intel® Core™ i5-3610ME Processor: Application Power Guide Addendum

App Power Guideline Addendum: Provides power numbers for the Intel® Core™ i5-3610ME processor while running real-life applications. (v.1, July 2012)

Preview | Download

Intel® Active Management Technology and Security Surveillance

Watch how Intel® Active Management Technology monitors, manages, repairs, and protects digital security surveillance networks. (v.10, June 2012)

Digital Security Surveillance: People Count

Demonstrates the security capabilities of surveillance digital video recorders by counting as people enter and exit a building. (v.001 Dec. 2008)