Intel Capital Success Stories

Total Page:16

File Type:pdf, Size:1020Kb

Intel Capital Success Stories Intel Capital Success Stories NEXT << Investing in Global Innovation: Stories of Intel Capital’s Impact on Portfolio Companies For questions or to submit a story, contact [email protected] (U.S.) This book is a resource to help you to convey the impact Intel Capital [email protected] (Asia) can have on a start-up. Inside is a series of stories on how individual [email protected] (EMEA) portfolio companies have benefitted from an Intel Capital investment. For each story there is a PowerPoint slide for download, background information, supporting facts, and summaries. All assets on each page are approved for external use. Use these resources in speaking engagements, pipeline meetings, presentations, and other channels. 2 << PREVIOUS NEXT << Table of Contents COMPANY INVESTOR CONSISTENT MARKET EMERGING NETWORK GLOBAL IPO ITD SUCCESS M&A EXPERTISE TECHNOLOGY ADD VALUE REGION Anobit ● ● ● ● Israel Aternity ● ● ● U.S.A./Israel Borqs ● ● ● ● ● China Crisp Media ● ● U.S.A. Fulcrum Microsystems ● ● U.S.A. Gudeng ● ● ● ● Taiwan Happiest Minds ● ● ● India IPTEGO ● ● ● Germany Mall.CZ ● ● ● ● ● Czech Republic Miartech ● ● ● ● China NetPosa ● ● ● China Solera ● ● ● ● ● U.S.A. SweetLabs ● ● ● ● U.S.A. V-Cube ● ● ● Japan Virtustream ● ● ● U.S.A. WS02 ● ● ● ● Sri Lanka 3 << << TABLE OF CONTENTS PREVIOUS NEXT << Anobit SUMMARY: POWERPOINT/TALKING POINTS: Recognizing the huge potential of Anobit’s flash memory technology, Intel Capital invested significantly in the company in 2010 and helped pave the way for the company’s acquisition by Apple in 2012. FULL STORY/BACKGROUND: In recent years, a number of high-tech companies have moved away from hard drives in favor of solid state storage, using flash memory chips to make truly mobile computing devices that are small, compact, and energy efficient. As a result, advancements in flash memory capabilities have become increasingly important. Founded in Israel in 2006, fabless semiconductor company Anobit developed a key component to improve the performance of flash memory chips. The company’s proprietary Memory Signal Processing (MSP) technology was designed to improve the speed, endurance, and performance of solid state storage systems while also driving down the cost. Working with colleagues in Intel’s Non-Volatile Memory (NVM) Solutions Group, Intel Capital recognized the huge potential of Anobit’s new technology. Plus, investment managers in Israel were already familiar with Anobit co-founders Ehud Weinstein and Ariel Maislos because both were serial entrepreneurs with successful track records. Years before, Intel Capital had invested in Weinstein’s Libit Signal Processing, acquired by Texas Instru- ments in 1999, and also in Maislos’ Passavé, acquired by PMC-Sierra in 2006. So when Weinstein and Maislos approached them regarding funding for their third investment round, Intel Capital was in. While the investment funds were extremely important, Weinstein says the relationship offered far SUPPORTING FACTS • International investing increased from less than 5 percent of Intel Capital’s investment dollars in more than just money. For starters, the Intel and Intel Capital name itself offered Anobit huge 1998 to about 57 percent in 2012. credibility. Additionally, there were multiple meetings, not just with the investment team, but with Intel business units, including the NVM Solutions group, which both led to an agreement and also • Intel Capital has a 3 person team based in Israel focused exclusively on investing in innovative Israeli technologies. included collaborative discussions on industry issues and potential solutions. What’s more, Anobit executives participated in the Intel Capital Global Summit where they had the opportunity to INVESTMENT SUMMARY connect with potential partners and customers from other companies around the world. Date Invested: 2010 All of these elements added to the value of the company which was ultimately aquired by Location: Israel Apple in 2012. Sector: Manufacturing & Labs Exit: M&A/2012 DOWNLOAD ASSETS: CONTACT INFORMATION: PowerPoint: Download Now Investment Manager: Uri Arazy Managing Director: Marcos Battisti Marketing Contact: Johnny Waterschoot 4 << << TABLE OF CONTENTS PREVIOUS NEXT << Aternity SUMMARY: POWERPOINT/TALKING POINTS: Recognizing the value of Aternity, Intel Capital invested in the company in 2007 and has provided support and connections that have helped the company generate significant revenue. FULL STORY/BACKGROUND: IT organizations face many challenges in their quest to support computing functions across an entire enterprise. One challenge, in particular, is to constantly increase end user productivity by reducing business disruptions. Aternity, an IT Management company, developed a technology that monitors any application on any physical, virtual, or mobile device providing a user-centric vantage point that closes the existing visibility gap with network- and server-centric application performance management tools. By effectively transforming every device into a user experience aware self-monitoring platform, organizations can dramatically reduce business disruptions and increases user productivity. Still, no matter how innovative any solution is, breaking into Fortune 1000 enterprises is a challenge, combined with complex sales cycles. As part of a large corporation itself, Intel Capital is inherently familiar with the challenges of securing large businesses as customers. So when Intel Capital invested in Aternity in 2007, Intel Capital worked collaboratively with the company to help them through the doors of Fortune 1000 companies via events like the Intel Capital Global Summit and Intel Capital Technology Days. One particularly successful exchange took place in 2010, when Aternity President and CEO Trevor Matz was invited to participate in an Intel Capital Technology Day sponsored by a major global financial services firm based in the U.S. At the meeting, Aternity made a presentation to senior IT SUPPORTING FACTS management and technologists from the financial firm on their software and the value it can • After an Intel Capital Technology Day, 80 percent of portfolio companies report some sort of provide to IT Operations and Line of Business application owners. follow-up with the host company. The very next morning the VP of end user services at the financial firm contacted Aternity’s sales • In 2012, Intel Capital facilitated 3,500+ engagements between portfolio companies and customers organization. The company had been searching for a solution to enable it to be more proactive at from Global 2000 companies. the desktop in terms of resolving end user application issues. In addition, the IT team had been seeking a solution to help them benchmark and validate shifts to Windows 7 and VDI. These INVESTMENT SUMMARY benchmarks were conducted around the use of Outlook, as well as boot and log-on times. Date Invested: 2007 Within six months, Aternity closed an initial deal worth $500,000. Within a year, they’d sealed a Location: US/Israel second deal worth $1.2 million. Today, Aternity is deployed on over 15,000 end points throughout the global company, supporting several lines of business. As Matz attests, “Intel Capital Technology Days represent a unique opportunity for young companies to rapidly engage with the decision makers of the Global 2000.” DOWNLOAD ASSETS: CONTACT INFORMATION: To date, Aternity has participated in many of these events, which have influenced directly or PowerPoint: Download Now Investment Manager: Uri Arazy indirectly about half a dozen major business opportunities. Managing Director: Marcos Battisti Marketing Contact: Lee Sessions 5 << << TABLE OF CONTENTS PREVIOUS NEXT << Borqs SUMMARY: POWERPOINT/TALKING POINTS: Intel Capital investment in Borqs opens opportunities in the mobile computing ecosystem, extending Intel’s reach and enabling joint research and development efforts worldwide. FULL STORY/BACKGROUND: Borqs was formed in 2007, just as the mobile computing industry was taking off. Thanks in part to an investment from Intel Capital, the company has quickly risen to the forefront of the industry, commercially launching more than 40 Android* terminal products in 15 countries, with sales exceeding 4 million units. Borqs is dedicated to providing customizable, integrated Android software and hardware platform solutions and end-to-end service platform solutions for mobile operators, terminal OEMs, and chip manufacturers worldwide. The company has shipped a wide range of products, including Android phones, tablets, in-vehicle systems, and home appliances. For Intel, investing in Borqs made sense in part because of the possibility for collaboration. As just one example, in 2012, a team comprising members from Intel and Borqs joined forces in an office in Paris. Within six months, the team had successfully transplanted the Android operating system to the platform of Orange, a major French operator. Borqs is now involved in the research and development of every next-generation chip that Intel releases for the mobile ecosystem, including smartphones as well as tablets. With the help of the Intel Capital investment, Borqs has also expanded its focus to vehicle systems, wearable devices, and even a satellite communications program. Borqs is also an active participant in Intel Capital Technology Days, annual Global Summits, and other Intel Capital business development events. The company views these events as a valuable SUPPORTING FACTS way to extend its business network and grow the business regionally
Recommended publications
  • On Client Ledger System™ Software
    Focus on Client Ledger System™ Software A Financial MicroSystems, Inc. Publication • Volume 18, Issue 1 • 4th Quarter of 2012 CLS II (1.61) and CLS-DOS (6.3) Updates are Scheduled for Release December 4th Year-end CLS updates for both CLS II and CLS-DOS are currently scheduled for release December 4th. We originally planned to discontinue CLS-DOS at the end of this year, because it has become increasingly difficult for us to make the required programming changes. However, we have decided to release one final year-end update for CLS-DOS and will continue to support it through September 2013. All future development will focus on CLS II. CLS updates include the new 2012 W-2 and 1099/1098 formats for both laser-printed plain-paper and preprinted forms. Dot-matrix preprinted W-2 and 1099 forms are available only in CLS-DOS. Formats for the standard, two-up, preprinted W-2 and W-3 forms are basically unchanged for 2012. However, the 1099- MISC form has alignment changes and formats for the 1099-INT, 1099-DIV, 1099-B, 1099-C, 1098 and 1096 forms are new. All W-2 and W-3 forms (including Copy A) may be printed on plain paper. Submittable 940, 941, 943 and 944 forms may also be printed on plain paper. For 1099, 1098 and 1096 forms, all copies except Copy A may be printed on plain-paper. Copy A must be filed using “official” scannable forms (the IRS may impose a penalty for using non-scannable forms). The CLS updates also include required changes to the federal 940, 941, 943 and 944 forms for the 2012 year-end.
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 20 | July through December, 2015 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Charlie Anthe Dana Kaufman Anthony Penta Cloud and Enterprise Security Azure Active Directory Team Safety Platform Nir Ben Zvi Nasos Kladakis Ina Ragragio Enterprise and Cloud Group Azure Active Directory Team Windows and Devices Group Patti Chrzan Daniel Kondratyuk Tim Rains Microsoft Digital Crimes Unit Azure Active Directory Team Commercial Communications Bulent Egilmez Andrea Lelli Paul Rebriy Office 365 - Information Windows Defender Labs Bing Protection Geoff McDonald Stefan Sellmer Elia Florio Windows Defender Labs Windows Defender Labs Windows Defender Labs Michael McLaughlin Mark Simos Chad Foster Identity Services Enterprise Cybersecurity Bing Group Nam Ng Roger Grimes Enterprise Cybersecurity Vikram Thakur Microsoft IT Group Windows Defender Labs Paul Henry Niall O'Sullivan Alex Weinert Wadeware LLC Microsoft Digital Crimes Unit Azure Active Directory Team Beth Jester Daryl Pecelj Terry Zink Windows Defender Microsoft IT Information
    [Show full text]
  • Secure Software Distribution System
    SECURE SOFTWARE DISTRIBUTION SYSTEM Tony Bartoletti ([email protected]), Lauri A. Dobbs ([email protected]), Marcey Kelley ([email protected]) Computer Security Technology Center Lawrence Livermore National Laboratory PO Box 808 L-303 Livermore, CA 94551 June 18, 1997 Abstract Authenticating and upgrading system software plays a critical role in information security, yet practical tools for assessing and installing software are lacking in today’s marketplace. The Secure Software Distribution System (SSDS) will provide automated analysis, notification, distribution, and installation of security patches and related software to network-based computer systems in a vendor-independent fashion. SSDS will assist with the authentication of software by comparing the system’s objects with the patch’s objects. SSDS will monitor vendors’ patch sites to determine when new patches are released and will upgrade system software on target systems automatically. This paper describes the design of SSDS. Motivations behind the project, the advantages of SSDS over existing tools as well as the current status of the project are also discussed. Keywords: security, distributed, software management DISCLAIMER This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or the University of California.
    [Show full text]
  • Kace Asset Management Guide
    Kace Asset Management Guide Metaphorical Lucio always evangelising his synarchy if Moishe is capitular or writhe sufferably. Hymenopterous Sibyl always politicks his decimators if Aub is alabastrine or site photogenically. Which Rodolph breezed so fined that Swen inculcated her speculator? With kace customers run quest kace systems management, united states merchant marine academy. Maintenance costs have been annualized over several period on three years to extract their harvest over time. Comparing suites from sap helps clients bring their asset management solutions provider hardinge inc, kace asset management are stored in lifecycle management feature relies on active assets. Learn how asset management leaders are ensuring a reliable and sustainable supply chain, Microsoft and Symantec all require the installation of an agent to perform OS and application discovery tasks, and Symantec problems. You need to unselect a conflict with. Using Custom fields Within software Asset where in Dell KACE, etc. Are you sure you as to delete your attachment? All four evaluated solutions include: antioch university as well as it opens a solution helps track down systems management? An integrated mechanism to report problems and service requests enables prompt response to end users and reduces administrative roadblocks. Product was easy to use. To analyze the opportunities in the market for stakeholders by identifying the high growth segments. Best Practices in Lifecycle Management: Comparing Suites from Dell, and complete security. Although Microsoft does not natively include vulnerability scans, this in proper way detracts from our investment in supporting operating systems regardless of equipment brand. Past performance is just poor indicator of future performance.
    [Show full text]
  • Installing and Removing Software
    CHAPTER 28 Installing and Removing Software One of the fun things about running any operating system is the ability to expand it—to add in new software over time to improve your workflow or just enhance entertainment value. Linux is blessed in this regard, because tens of thousands of software titles are avail- able to meet almost every need. However, even if you’ve tracked down the ideal software title, there’s just one barrier to overcome: installing it on your system. Installing software under Ubuntu isn’t the same as with Windows, and indeed you can’t simply install any application you come across on the Internet, because these are most likely to be Windows versions. See Chapter 11 for more information on Linux ver- sions of common Windows applications. Users are afforded a lot more power over what happens to their systems, but this comes at the expense of needing to take a little time to understand the terminology and techniques. That is what you’ll learn in this chapter. Software Installation Basics Installing programs on Windows is relatively easy. If you wish to use the WinZip archive tool, for example, you can browse to the web site, download the installer *ata file, and install the software. Although you might not realize it, a lot of work goes into making this apparently simple task possible. After the original software has been created by the pro- grammers, it must be made into a form that you, the end user, can deal with. The first thing to happen is that the software is compiled.
    [Show full text]
  • Download Literotica Android App to My Phone Download Literotica Android App to My Phone
    download literotica android app to my phone Download literotica android app to my phone. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67a15666ddcdc447 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Mobile devices help & learning. Your device. We’ll help you find the optimal setup for your Android or iPhone. Your apps. Link up Office, Outlook, and other apps that connect your phone to your PC. Your stuff. Learn how to make switching between your devices a little less complicated. Microsoft and Samsung—a partnership for your productivity. Learn how to connect your Samsung Galaxy or other Android device to your PC so you can make calls, respond to texts, sync your photos, and use your favorite mobile apps all in one place. Litapp. Older changelogs can be found on the releases page (Press . after version). Older APKs can be found in the releases folder. Features. Read stories Automatically open the next story in a series See story details, related stories, rate
    [Show full text]
  • Deploying Ipad to Patients Setup Guide
    Deploying iPad to Patients Setup Guide Contents Overview Overview Healthcare institutions are increasingly focused on engaging patients and delivering Getting Prepared a great experience throughout their stay in the hospital. Deploying iPad with Evaluate your infrastructure patient-centered apps enables hospitals to enhance each step of the patient journey, Create a configuration from check-in through discharge. With third-party iOS apps, hospitals can empower Automate device setup patients to access their daily schedule, connect with their care team, track their progress, Distribute apps get educated on their treatment plan, and personalize their entertainment—putting In-Room Storage patients in the center of care. Initial setup Reset your device This Setup Guide offers guidance to the hospital IT staff who are configuring and Centralized Storage deploying iPad for patients to use. iPad can be preconfigured with minimal setup so Set up Apple Configurator patients have access to iOS apps, and IT can use mobile device management (MDM) Automate device refresh to protect patient data while also preserving a great user experience. Once a patient Install Apple Remote Desktop has been discharged, the iPad can be securely wiped so all patient-generated data is Summary removed, and reset to factory settings so it’s ready for the next patient to use. A key decision when deploying iPad to patients is to choose between in-room versus centralized storage of the device (described in the In-Room Storage and Centralized Storage sections). Regardless of which deployment scenario you choose, the preparation steps described in this paper are important for any successful deployment.
    [Show full text]
  • Bigfix Lifecycle SWD User Guide
    BigFix Software Distribution User's Guide Special notice Before using this information and the product it supports, read the information in Notices (on page 144). Edition notice This edition applies to version 9.5 of BigFix and to all subsequent releases and modifications until otherwise indicated in new editions. Contents Chapter 1. Overview.......................................................................................................... 1 What's new in Software Distribution....................................................................................2 System requirements.......................................................................................................... 10 Supported package types...................................................................................................11 Chapter 2. Best practices................................................................................................13 Policy-based distributions...................................................................................................13 Authorization........................................................................................................................13 Prerequisites........................................................................................................................ 13 Site organization..................................................................................................................14 Chapter 3. Dashboards overview....................................................................................
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 22 | January through March, 2017 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Copyright © 2017 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Roger Capriotti Volv Grebennikov Carmen Liang Microsoft Edge Product Bing Windows Defender Research Marketing team Team Vidya Gururaja Rao Zheng Dong Windows Active Defense Data Ryan McGee Windows Defender ATP Engineering and Analytics Cloud and Enterprise Research Marketing Chris Hallum Eric Douglas Windows Active Defense Matt Miller Windows Defender Research Product Marketing team Windows Active Defense Team Paul Henry Chad Mills Matt Duncan Wadeware LLC Windows Defender ATP Windows Active Defense Research Susan Higgs Matthew Duncan Windows Defender ATP Phillip Misner Windows Active Defense Data Research Security Research Engineering and Analytics Michael Johnson Abdul Mohammed Sarah Fender Windows Defender Research Windows Defender Research Azure Security Team Team Meths Ferrer Kasia Kaplinska Hamish O'Dea Windows Active Defense Cloud and Enterprise Windows Defender Research Marketing Team Zarestel Ferrer Security Research Seema Kathuria
    [Show full text]
  • Deploying Ipad to Patients Setup Guide
    Deploying iPad to Patients Setup Guide Contents Overview Overview Healthcare institutions are increasingly focused on engaging patients to Getting Prepared become actively engaged in their health and delivering a great experience Evaluate your infrastructure throughout their stay in the hospital. Deploying iPad with patient-centered apps Create a configuration enables hospitals to enhance each step of the patient journey, from check-in Automate device setup through discharge. With third-party iPadOS apps, hospitals can empower In-Room Storage patients to access their daily schedule, connect with their care team, track Perform initial setup their progress, get educated on their treatment plan, and personalize their Reset your device entertainment—putting patients in the center of care. Centralized Storage This Setup Guide offers guidance to the hospital IT staff who are configuring Set up Apple Configurator and deploying iPad for patients to use. iPad can be preconfigured with minimal Automate device refresh setup so patients have access to iPadOS apps, and IT can use mobile device Install Apple Remote Desktop management (MDM) to protect patient data while also preserving a great user experience. Once a patient has been discharged, the iPad can be securely Summary wiped so all patient-generated data is removed, and reset to factory settings so it’s ready for the next patient to use. A key decision when deploying iPad to patients is to choose between in-room versus centralized storage of the device (described in the In-Room Storage and Centralized Storage sections). In-room storage is enabled by over-the-air (OTA) wiping and resetting of iPad, which allows devices to stay in the patient room at all times.
    [Show full text]
  • NEURAL COMPUTING 17 Sailee Chitre – T.Y.B.Sc
    Our Vision is to establish a leading centre of imparting Quality Education in the field of Science, Commerce and Management with emphasis on: ensuring that students learn the fundamental concepts in various disciplines. motivating students to apply the Scientific & Technological knowledge to develop problem solving capabilities. making students aware of the societal and environmental needs with specific appreciation of the emerging global context. Our mission is to provide : an educational environment where students can reach their full potential in their chosen discipline and become responsible citizens without compromising in ethics a scholarly environment where the talents of both, the faculty members and students are nurtured and used to create knowledge and technology for the benefit of the society. 1 INDEX Sr. No. Topic Page No. 1. 3D PASSWORD FOR MORE SECURE AUTHENTICATION 3 Manisha Patel – T.Y.B.Sc IT 2. ARTIFICIAL INTELLIGENCE IN PROGRAMMING 5 Jay Bhosale – T.Y.B.Sc. IT 3. COMPUTER THAT YOU CAN WEAR 9 Shailendra Mane – T.Y.B.Sc. IT 4. ETHICAL HACKING 12 Manali Darandale – T.Y.B.Sc. IT 5. FOOT PRINTING 14 Bhavesh Naik – S.Y.B.Sc IT 6. NEURAL COMPUTING 17 Sailee Chitre – T.Y.B.Sc. IT 7. ORGANIC LIGHT EMITTING DIODE DISPLAY 20 Angad Anand – T.Y.B.Sc. IT 8. VERIZON 4G LTE NETWORK 23 Dhaval Jain – T.Y.B.Sc. IT 9. MEEGO 25 Nivedita Tikadar – T.Y.B.Sc IT 10. A CHANGE FROM IPv4 TO IPv6 33 Vivek Kapadia – S.Y.B.Sc.I.T 11. BLACKBERRY MESSENGER 36 Rahul Nayak – S.Y.B.Sc.I.T 12.
    [Show full text]
  • PSG Consumer 2C14 Desktop Datasheet
    Datasheet HP Desktop PC 110-352na Just what you need. The HP 110 sticks to the basics, providing the competitive performance and familiar, essential features you need for routine tasks like email and social networking, homework and personal finances, or casual Web browsing and online shopping.1 The clean modern styling makes it reliable, easy-to-use, and extremely affordable. HP recommends Windows. An approachable design. The HP 110 blends in elegantly with its surroundings thanks to a simple, modern design that fits neatly into just about any space. Essentials you can rely on. Feel good about your purchase with a brand you trust. The HP 110 is the smart choice when you want to spend less and accomplish more. Save and share in a snap. Easily save and share your favorite files with the built-in, 6-in-1 media card reader. HP Connected Music. Get access to unlimited listening of radio playlists for 12 months2. Enjoy the latest songs of your favorite music styles, ad-free, and get a chance to win concert tickets and experiences with your preferred artists. 1 Internet access is required and not included. 2 Subject to purchasing a Windows 8 and 8.1 consumer HP Notebook or Desktop PC or Tablet between April 10th 2014 and June 30th 2015. Terms and Conditions apply. hp.com/go/music Datasheet HP Desktop PC HP recommends Windows. 110-352na Operating System Windows 8.1 64 Processor AMD Quad-Core A6-5200 APU with Radeon HD 8400 Graphics (2 GHz, 2 MB cache) Processor family: AMD Quad-Core A-Series processor Memory 8 GB DDR3 (1 x 8 GB); Total slots:
    [Show full text]