Genuine Windows® 7 Operating System
Genuine Windows® 7 is the easiest, fastest, and most engaging version of Windows® yet. Better ways to find and manage files such as Jump Lists and improved taskbar previews help you speed through everyday tasks. Faster and more reliable performance means your PC works just the way you want it to. And great features like Windows Media Center and Windows Touch make new things possible. Get to know Windows® 7, and see how it can simplify just about everything you do with your PC. Windows® 7 Professional provides a powerful combination of innovation and improved performance, delivering a PC experience your customers want. Designed to meet the needs of small and midsize businesses, Windows® 7 Professional is fast, reliable, and compatible. You can also connect to company networks effortlessly and more securely with Domain Join. Combined with all the exciting entertainment features of Windows® 7 Home Premium, it's a great choice for home and for business.

Bluetooth Wireless
The integrated Bluetooth feature provides wireless connectivity for wireless devices at close proximity. For example, Bluetooth can be used to wirelessly transfer/ synchronize data to and from different devices such as PDAs and cellular phones. It also communicates with peripherals such as mice, keyboards, and printers wirelessly, minimizing the constraints and clutter of cables. The typical transfer distance for a Bluetooth device is up to 30 feet. Designed to take advantage of a typical workspace or PAN (Personal Area Network), the purpose of Bluetooth is to simplify the exchange of information and interfacing of devices within a close proximity. When considering Bluetooth devices keep in mind that the system as well as the individual devices must support Bluetooth.

Biometrics
Fujitsu offers a built-in biometric fingerprint swipe sensor that eliminates the need for managing multiple passwords when accessing the network and managing email accounts and other protected systems. With a simple swipe of the finger, you can quickly and safely log onto the protected system and online accounts without having to enter passwords.

Trusted Platform Module (TPM)
The embedded TPM 1.2 protects digital identification and data, and authenticates you into your network. It also allows you to securely store private keys and certificates for file and folder encryption, Web, email, digital signature, and passwords. Trusted Platform Module (TPM) solutions can help play a strong role in assuring compliance with the Health Insurance Portability and Accountability Act (HIPAA) to protect medical records, as well as Graham-Leech-Bliley, Sarbanes-Oxley, and other regulations that impose privacy and security requirements.

Dual Digitizer
A dual digitizer employs both active and capacitive digitizer technologies. A capacitive digitizer senses the touch of a finger with very little pressure required to register an input. This relatively new technology is ideal for direct onscreen manipulation. A capacitive digitizer allows you to zoom, reduce and manipulate images and applications through the use of gestures. A dual digitizer provides the ultimate computing experience by combining the accuracy of the active digitizer and the convenience and utility of a capacitive digitizer while allowing the user to seamlessly switch between the two.

Keyboard Docking Station
The optional keyboard docking station transforms your STYLISTIC Q702 from a tablet to a clamshell notebook. The keyboard docking station includes an additional battery, chiclet keyboard, touchpad, pen garage, STATUS LED Indicators and a variety of ports. The additional battery (4-cell, 11.4V, 45 Wh, 3150 mAh) brings your total battery life up to 11 hours and 10 minutes. Ports: Two USB 2.0 ports, One 15-pin D-SUB connector for VGA external monitor, One LAN (RJ-45) connector, One DC-in connector, Docking connector (to dock with system)

Intel® Anti-Theft Technology
Built into 3rd Generation Intel® Core™ processor enabled Ultrabook™ and select laptops, Intel® AT helps lock down lost or stolen laptops, even if thieves attempt to reimage the OS, change the boot order, or install a new hard drive. When a laptop is lost or stolen, it can be locked down—automatically or by remote command. Once locked down, the laptop will not boot to the OS and is not functional. If the laptop is recovered, a reactivation code can be used to quickly return it to normal operation. Click here to view Intel® Anti-Theft Technology service providers. Select LIFEBOOK® models include a 90-day free trial of Absolute® Data Protect (ADP) service. Access the desktop shortcut to download and activate the trial ADP subscription to take advantage of this powerful anti-theft protection.

USB 3.0
Universal Serial Bus (USB) 3.0 ports allow you to connect USB devices. USB 3.0 technology is much faster than the previous generations of USB. USB 3.0 transfers data at up to 5Gbps and is backward-compatible with USB 1.1 and 2.0 devices, which transfer data at up to 12 Mbps and 480 Mbps, respectively. USB 3.0 ports can be distinguished from USB 1.1 and 2.0 ports by the blue “tongue” in the center of the port.

Computrace BIOS-enabled models
Integrated Computrace® BIOS tracking agent from Absolute Software embedded in the BIOS firmware is designed to provide innovative theft recovery solutions with optional Computrace software. Employing Computrace software solutions allows organizations to efficiently monitor system use, recover stolen or missing machines, and remotely delete data, if necessary. Computrace software solutions also provides the added value of proactively enforcing computer data security policies across the entire organization, increasing both end-user and administrator productivity.