The visual features built into the processor deliver everything you need to enjoy a stunning and seamless experience when viewing content on your PC.
Old laptops are bulky, slow, and lack the youthful panache of an Ultrabook™, which is sleek, responsive, convertible, and filled with new technology.
Ultrabook™, powered by 4th gen Intel® processors, offers flexible computing options, including touch- and voice-enabled apps and long battery life.
Ultrabook™, powered by 4th generation Intel® processors, offers flexible computing options for mobile business and recreational use, including touch- and voice-enabled applications, wireless connectivity to multimedia devices, and long battery life.Full View >
Watch how Ultrabook™ provides quicker booting, longer battery life, and faster video conversion, enabling a mom to focus on what matters, her family.
Intel IT’s Cathy Spence discuss their developer training for cloud aware applications.
See how the ThinkPad* Tablet 2 is ideal for businesses, with built-in security, Windows 8*, long battery life, and more for a new retail experience.
See how the Lenovo ThinkPad* Tablet 2 is ideal for retail business solutions, offering built-in security, Windows 8* applications, long battery life, USB and HDMI ports, a digital pen, dock, and more for a new retail experience.Full View >
Intel® RealSense™ technology redefines computing, enabling natural, intuitive, and immersive experiences with voice, facial, and gesture recognition.
Redefining how to interact with a PC, Intel® RealSense™ technology enables natural, intuitive, and immersive computing experiences, with voice command and facial and gesture recognition for simple, secure access and rich, visceral interactions.Full View >
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use with software and hardware security.
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use that meets regulatory compliance with end-to-end hardware and software security technologies.Full View >