Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 537 Results
  • Items Per Page

Boost Meeting Productivity and Collaboration with Intel® Pro WiDi

Solution Brief: Streamline business meetings, simplify collaboration, and speed decisions on Intel® Pro WiDi, with security and manageability for IT.

Preview | Download

Intel IT Best Practices for Implementing Apache Hadoop* Software

In five weeks, Intel IT implemented an Intel® Distribution for Apache Hadoop* software-based big data platform for business intelligence value.

Preview | Download

TGAC: Understanding Life on Earth

TGAC uses high-performance computing solutions to assemble complex genome.

Preview | Download

Enhancing Security with Intel® Trusted Execution Technology

Video: enhancing server and cloud security with Intel® Trusted Execution Technology.

Securing the Cloud with Intel® Trusted Execution Technology

Jim Greene talks about trusted compute pools, secure on-boarding of virtual machines and auditing of the security posture in your cloud environment.

Cloud Computing Security Planning Guide for IT Managers

Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.

Preview | Download

10 Things to Know about Cloud: Cloud Computing Models

Provides a concise look at the core elements of a cloud strategy that meets both IT and business requirements.

Preview | Download

Security Technology Real-World Guide from Intel

A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models.

Preview | Download

Business Investment Strategy for Device Refresh

Build a business case for and plan a device upgrade and refresh strategy based on decisions that help manage costs and maximize user productivity.

Preview | Download

Hardware-Enhanced Security Changes Business Security Paradigm

White Paper: Change your security paradigm with hardware-enhanced security on Intel® architecture and better protect your business from threats.

Preview | Download