Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 359 Résultats
  • Articles par page

Adopting Software-Defined Networking in the Enterprise

Software-defined networking (SDN) enables on-demand provisioning of networks and network services.

Aperçu | Télécharger

IT@Intel: Sharing IT Best Practices

IT@Intel connects IT professionals with their peers inside Intel, providing insight, best practices, and lessons learned on today’s technology issues.

Cloud Analytics Solutions Using Amazon Web Services* and Intel

See how the Amazon Web Services* platform, using Intel® Xeon® processors, helps ingest data, scale quicker, and deploy cloud analytics in real time.

Aperçu | Télécharger

Exploring DCIM for Intel’s Data Center

White Paper: Proof of concept best-known methods for exploring potential benefits of data center infrastructure management (DCIM) solutions.

Aperçu | Télécharger

Brief: Dell In-Memory Appliance for Cloudera Enterprise*

Brief: Find out how the Dell In-Memory Appliance for Cloudera Enterprise* simplifies cluster deployments while delivering real-time analytics.

Aperçu | Télécharger

Impact du Big Data sur votre activité

L'analyse des big data génère des informations qui créent un avantage concurrentiel.

Collaborative Visual Data Analysis Enables Faster, Better Decisions

Intel IT has built a visual data analysis solution--the Info Wall--which provides unique possibilities for collaboration.

Aperçu | Télécharger

Intel IT Performance Report 2014-2015

IT Performance Report: Shares how IT delivers value to Intel through innovations in social, mobile, analytics, cloud, and the Internet of Things.

Aperçu | Télécharger

Intenzz: Quick, Slick, Real-Time Data Analysis

Intenzz supports its customers around the world with Cloudera CDH* on the Intel® Xeon® processor E7 family.

Aperçu | Télécharger

Understanding Cyberthreat Motivations to Improve Defense

Threat-based risk management--an effective strategy to identify, assess, prioritize, and control cybersecurity risks

Aperçu | Télécharger