Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 214 Résultats
  • Articles par page

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

Crimeware Protection Video: 4th Gen Intel® Core™ vPro™ Processor

See how built-in technologies offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and monitoring.

Inside IT: Engineering Business Intelligence with the Cloud

In this podcast, Yatish Goel, technical integrator, tells us how Intel IT focuses resources while expanding into the cloud BI space.

Intel® Parallel Computing Centers Overview

Researchers discuss how Intel® Parallel Computing Centers will provide the capabilities to answer bigger questions and make new discoveries.

Intel® Xeon® Processor E7 v2 Family Performance

Scalable Intel® Xeon® processor E7 v2 family-based servers provide the performance needed to analyze massive amounts of data for real-time insight.

Big Data in the Stadium with SAP HANA*

SAP HANA* big data solutions with Intel® Distribution for Apache Hadoop* software help stadiums identify and solve customer complaints in real-time.

Cloud Infrastructure Research Video

Vidéo présentant les principaux résultats des recherches sur l'infrastructure Cloud, essentiellement axées sur le réseau et le stockage, à partir d'une enquête réalisée auprès de responsables informatiques.

Understanding Data Center Storage Architectural Changes: Part 2

Explains the architecture evolution to scale-out storage for greater manageability, performance, and utilization with nearly unlimited scalability.

Powered by Intel® Cloud Technology

Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.

McAfee ePO Deep Command* Animation

McAfee ePO Deep Command* animation shows security management beyond the operating system.