Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 153 Results
  • Items Per Page

Enterprise Mobility: Mobile Productivity Meets Enterprise Security

Find out how enterprise mobility increases productivity. Start by learning the fundamentals and planning for the right technology solution.

Business Client Resource Center for IT Managers

Welcome to the Business Client Resource Center.

Leeds Teaching Hospitals Study Accident, ER Trends with Big Data

Case Study: Big data technologies analyze doctors’ notes, helping Leeds Teaching Hospitals study trends, plan resources, and spot under-billing.

Preview | Download

Business Investment Strategy for Device Refresh

Build a business case for and plan a device upgrade and refresh strategy based on decisions that help manage costs and maximize user productivity.

Preview | Download

Does the Lost Device Dance Look Familiar?

Familiar with the lost device dance? See what happens when people misplace their smartphones, tablets, and other mobile devices

Cloud Computing: How Client Devices Affect the User Experience

White Paper: Intel IT, Intel Architecture Group, conduct tests and analysis to compare the user experience with different client cloud devices.

Preview | Download

Banca Monte dei Paschi di Siena: Gains through Green IT

Case Study: Intel® Xeon® processor 5500 series delivers environmental and cost benefits to Italian bank Banca Monte dei Paschi di Siena.

Preview | Download

Reducing Data Center Cost with an Air Economizer

Brief: Intel IT uses an air economizer to cool production servers with 100 percent outside air at temperatures of up to 90 degrees Fahrenheit.

Preview | Download

Personalizing Energy to Achieve Positive Energy Buildings

White paper demonstrates a positive energy building reducing energy consumption for cost reduction and improved employee productivity.

Preview | Download

Learn How Enterprise Mobility Management Increases Productivity

Learn how enterprise mobility is transforming business productivity, yet simultaneously creating security challenges for IT.