Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 403 Results
  • Items Per Page

Intel IT Best Practices for Implementing Apache Hadoop* Software

In five weeks, Intel IT implemented an Intel® Distribution for Apache Hadoop* software-based big data platform for business intelligence value.

Preview | Download

Enhancing Security with Intel® Trusted Execution Technology

Video: enhancing server and cloud security with Intel® Trusted Execution Technology.

Securing the Cloud with Intel® Trusted Execution Technology

Jim Greene talks about trusted compute pools, secure on-boarding of virtual machines and auditing of the security posture in your cloud environment.

Cloud Computing Security Planning Guide for IT Managers

Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.

Preview | Download

10 Things to Know about Cloud: Cloud Computing Models

Provides a concise look at the core elements of a cloud strategy that meets both IT and business requirements.

Preview | Download

Security Technology Real-World Guide from Intel

A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models.

Preview | Download

Simplifying the Path for Building an Enterprise Private Cloud

Intel IT’s private cloud enables deployment of a virtual machine under 10 min., on-demand self-service, and rich software development services.

Preview | Download

HackensackUMC Accelerates ROI for Epic and Cache* Databases

Case Study: HackensackUMC standardizes databases on an Intel®-based virtualized environment for performance and scale to reduce TCO and speed ROI.

Preview | Download

Two-Factor Authentication in Intel® IPT

Simplify two-factor VPN authentication with Intel® IPT with one-time password, removing the need for a separate physical token for no delays.

Enterprise-Class Security for Server Virtualization Solution Brief

Brief: HyTrust and Intel developed an end-to-end security solution to address the risks associated with server virtualization and cloud technology.

Preview | Download