Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 547 Résultats
  • Articles par page

Intel Planning Guide: Technology for Tomorrow’s Cloud

Guide: data center design for cloud computing. 10 Gigabit Ethernet for unified networking, trusted server pools, cloud storage, power solutions.

Aperçu | Télécharger

Cornerstone Integration Helps Save Lives in the Golden Hour

During the Golden Hour, Cornerstone Integration’s Intel® vPro™ technology-based solution connects first responders and trauma centers to save lives.

Aperçu | Télécharger

Renforcez la sécurité de votre cloud grâce à Intel

Les technologies conçues par Intel pour sécuriser le cloud protègent vos données, votre infrastructure et garantissent la conformité.

Centre de ressources pour le renouvellement du parc de PC

Visitez le centre de ressources pour tout savoir sur le remplacement des terminaux de votre entreprise.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

Intelligent Clients Improve Laptop and Desktop Virtualization

Desktop virtualization resources for IT managers from Intel, featuring case studies, planning guides, and peer research.

Intel IT Executive Insights: Maximizing the Business Value of IT

Align IT investments with Intel corporate strategies and better manage IT budget to improve the business value of IT.

Aperçu | Télécharger

Technologie Intel de Cloud Computing

Cloud Computing : Intel facilite le développement d'un ensemble cohérent de solutions adaptées à différentes infrastructures.

Hardware-Enhanced Security Changes Business Security Paradigm

White Paper: Change your security paradigm with hardware-enhanced security on Intel® architecture and better protect your business from threats.

Aperçu | Télécharger

Intel’s New Approach to the Enterprise Security Framework

White Paper: Intel’s enterprise security framework allows systems to start, run, and stay secure through security features built into the hardware.

Aperçu | Télécharger