Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 483 Résultats
  • Articles par page

Intel Planning Guide: Technology for Tomorrow’s Cloud

Guide: data center design for cloud computing. 10 Gigabit Ethernet for unified networking, trusted server pools, cloud storage, power solutions.

Aperçu | Télécharger

Renforcez la sécurité de votre cloud grâce à Intel

Les technologies conçues par Intel pour sécuriser le cloud protègent vos données, votre infrastructure et garantissent la conformité.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

Analyse Big Data : choisissez une solution big data

Outils, technologies, logiciels et matériel permettant de profiter de tous les avantages du big data.

Increase Virtual Machine Density

Brief: Intel® Xeon® processor E5-2600 v2 product family-based solutions will optimize your data center by increasing virtual machine density.

Aperçu | Télécharger

The Intelligent Choice for Evolving Virtual Data Centers

Product Brief: Virtual data centers based on the Intel® Xeon® E5-2600/1600 product families support IT’s diverse needs in efficiency and flexibility.

Aperçu | Télécharger

Intel IT Executive Insights: Maximizing the Business Value of IT

Align IT investments with Intel corporate strategies and better manage IT budget to improve the business value of IT.

Aperçu | Télécharger

Technologie Intel de Cloud Computing

Cloud Computing : Intel facilite le développement d'un ensemble cohérent de solutions adaptées à différentes infrastructures.

Hardware-Enhanced Security Changes Business Security Paradigm

White Paper: Change your security paradigm with hardware-enhanced security on Intel® architecture and better protect your business from threats.

Aperçu | Télécharger

Intel’s New Approach to the Enterprise Security Framework

White Paper: Intel’s enterprise security framework allows systems to start, run, and stay secure through security features built into the hardware.

Aperçu | Télécharger