Four IT managers discuss virtual desktop management models for four industries: financial services, education, healthcare, and general office.
Illustrates how higher performance cores provide significant advantages over lower performance cores, including operating costs and VM space.
Illustrates how higher performance cores provide significant advantages over lower performance cores, including operating costs and VM space.Full View >
Video: tour of Earth Day 2010, Intel IT sustainability practices, from video conferencing to server refresh.
HyTrust builds a cloud computing solution that ensures security from the lowest layers of the stack utilizing Trusted Compute Pools with VMware.
HyTrust, VMware, and Intel discuss how to enhance security from the bottom of the stack up utilizing Trusted Compute Pools, Intel® Trusted Execution Technology and the HyTrust Appliance*.Full View >
McAfee ePO Deep Command*animation shows security management beyond the operating system.
Video: Intel IT discusses private enterprise cloud computing design, roadmap, and implementation.
Video: The First American Corporation builds energy-efficient data center with Intel® Xeon® processors, lowering utility costs and server sprawl.
Video: NetBenefit deploys Intel® Xeon® processor 5500 series-based server, increasing performance and reducing power costs.
UK hosting company NetBenefit deploys Intel® Xeon® processor 5500 series Dell based servers, and reaps the benefits from 25% increase in the number of virtual machines as well as increased performance and reduced power costs.Full View >
Video: MySpace Technical Ops VP Richard Buckingham talks server consolidation and increased performance with Intel® Xeon® processor-based servers.
Intel® IT Center webinar: Client security. Discover the built-in security capabilities of the 3rd generation Intel® Core™ vPro™ processor.
Intel® IT Center webinar: Join Intel processor architect Yasser Rasheed and John Mahvi, client product line manager for Intel IT, as they reveal the distinctive built-in features designed to address the key concerns of IT security management.Full View >