Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 189 Résultats
  • Articles par page

What is 64-bit Mobile Computing?

Get 64-bit mobile basics to see if upgrading makes sense; the platform can process twice as much data, but also requires a 64-bit OS and applications.

Roshydromet: Unleashing a Tornado

A Russian weather forecaster underpins forecasts with the Intel® Xeon® processor E5 family.

Aperçu | Télécharger

Intelligent Clients Improve Laptop and Desktop Virtualization

Desktop virtualization resources for IT managers from Intel, featuring case studies, planning guides, and peer research.

Calcul Intensif (HPC)

La famille de processeurs Intel® Xeon® E7 est conçue pour les solutions HPC indispensables aux services informatiques des entreprises.

Calcul intensif avec Intel

Les processeurs Intel® Xeon® offrent des performances plus rapides et plus intelligentes pour une mise en production encore plus rapide.

Enterprise Mobile Security Real-World Guide

The enterprise mobile security real-world guide explains mobility risks and how Intel® Core™ vPro™ processors increase security and productivity.

Aperçu | Télécharger

Sectra Enables Better Access to 3-D Radiology Visualization

Case Study: Stream large 3-D radiology visualization on the Intel® Xeon® processor E5-2600 v2 product family to improve care and consolidate servers.

Aperçu | Télécharger

4th Generation Intel® Core™ vPro™ Processor Family Overview

White Paper: Surveys the technologies within 4th gen Intel® Core™ vPro™ processors, highlighting benefits, such as improved productivity and security.

Aperçu | Télécharger

Crimeware Protection PDF: 4th Gen Intel® Core™ vPro™ Processors

White Paper: Describes Intel® embedded technologies and McAfee software providing productivity, security, and manageability for enterprise business.

Aperçu | Télécharger

Crimeware Protection Video: 4th Gen Intel® Core™ vPro™ Processor

See how built-in technologies offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and monitoring.