Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 776 Résultats
  • Articles par page

Combat Credit Card Fraud with Big Data

White Paper: Joint solutions from Intel and IBM enable powerful big data analytics that prevent credit card fraud and other security breaches.

Aperçu | Télécharger

La mobilité révolutionne le monde qui nous entoure

Infographie : comment la mobilité fait désormais partie de notre quotidien, de l'omniprésence des smartphones à la prolifération des applis téléchargeables.

Intel Planning Guide: Technology for Tomorrow’s Cloud

Guide: data center design for cloud computing. 10 Gigabit Ethernet for unified networking, trusted server pools, cloud storage, power solutions.

Aperçu | Télécharger

What is 64-bit Mobile Computing?

Get 64-bit mobile basics to see if upgrading makes sense; the platform can process twice as much data, but also requires a 64-bit OS and applications.

Delivering Compelling Digital Signage for Dunkin’ Donuts

Case Study: Intel® technology-based digital signage for Dunkin’ Donuts streamlines menu boards, tailors content, and improves the customer experience.

Aperçu | Télécharger

Inside IT: Security by Design - RSA 2014

Intel and ADP talk security by design—the idea of incorporating security measures throughout the entire development and manufacturing process.

Experience 2 in 1 Devices for the Enterprise Business

With flexibility, performance, security, and more, 2 in 1 devices for the enterprise business provide the benefits of a tablet and PC in one.

Compare Chromebooks* for Enterprises

Infographic: Compare Intel®-based and ARM-based Chromebooks* for battery life and in various enterprise workflows.

Aperçu | Télécharger

Cornerstone Integration Helps Save Lives in the Golden Hour

During the Golden Hour, Cornerstone Integration’s Intel® vPro™ technology-based solution connects first responders and trauma centers to save lives.

Aperçu | Télécharger

Planifiez la stratégie de mobilité de votre entreprise

Planifiez la stratégie de mobilité de votre entreprise pour renforcer la sécurité de votre environnement informatique et améliorer la productivité sur terminaux mobiles.