Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 525 Résultats
  • Articles par page

Intel Planning Guide: Technology for Tomorrow’s Cloud

Guide: data center design for cloud computing. 10 Gigabit Ethernet for unified networking, trusted server pools, cloud storage, power solutions.

Aperçu | Télécharger

Renforcez la sécurité de votre cloud grâce à Intel

Les technologies conçues par Intel pour sécuriser le cloud protègent vos données, votre infrastructure et garantissent la conformité.

Intel® Distribution for Apache Hadoop & Oracle Big Data Connectors

Advance Enterprise Insight with the Intel® Distribution for Apache Hadoop* and Oracle Big Data Connectors*

Aperçu | Télécharger

Intel® Hadoop* Certified for Oracle Big Data Connectors*

Advance Enterprise Insight with the Intel® Distribution for Apache Hadoop* and Oracle Big Data Connectors*

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

The Intelligent Choice for Evolving Virtual Data Centers

Product Brief: Virtual data centers based on the Intel® Xeon® E5-2600/1600 product families support IT’s diverse needs in efficiency and flexibility.

Aperçu | Télécharger

Intel IT Executive Insights: Maximizing the Business Value of IT

Align IT investments with Intel corporate strategies and better manage IT budget to improve the business value of IT.

Aperçu | Télécharger

Technologie Intel de Cloud Computing

Cloud Computing : Intel facilite le développement d'un ensemble cohérent de solutions adaptées à différentes infrastructures.

Hardware-Enhanced Security Changes Business Security Paradigm

White Paper: Change your security paradigm with hardware-enhanced security on Intel® architecture and better protect your business from threats.

Aperçu | Télécharger

Intel’s New Approach to the Enterprise Security Framework

White Paper: Intel’s enterprise security framework allows systems to start, run, and stay secure through security features built into the hardware.

Aperçu | Télécharger