Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 532 Résultats
  • Articles par page

Intel Planning Guide: Technology for Tomorrow’s Cloud

Guide: data center design for cloud computing. 10 Gigabit Ethernet for unified networking, trusted server pools, cloud storage, power solutions.

Aperçu | Télécharger

Renforcez la sécurité de votre cloud grâce à Intel

Les technologies conçues par Intel pour sécuriser le cloud protègent vos données, votre infrastructure et garantissent la conformité.

Scaling Deployment of Hadoop

The Intel® Distribution for Apache Hadoop* software running on 808 VMs using VMware® vSphere Big Data Extensions and Dell® PowerEdge® R720XD servers.

Aperçu | Télécharger

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

Increase Virtual Machine Density

Brief: Intel® Xeon® processor E5-2600 v2 product family-based solutions will optimize your data center by increasing virtual machine density.

Aperçu | Télécharger

Intelligent Clients Improve Laptop and Desktop Virtualization

Desktop virtualization resources for IT managers from Intel, featuring case studies, planning guides, and peer research.

Intel IT Executive Insights: Maximizing the Business Value of IT

Align IT investments with Intel corporate strategies and better manage IT budget to improve the business value of IT.

Aperçu | Télécharger

Technologie Intel de Cloud Computing

Cloud Computing : Intel facilite le développement d'un ensemble cohérent de solutions adaptées à différentes infrastructures.

Hardware-Enhanced Security Changes Business Security Paradigm

White Paper: Change your security paradigm with hardware-enhanced security on Intel® architecture and better protect your business from threats.

Aperçu | Télécharger

Intel’s New Approach to the Enterprise Security Framework

White Paper: Intel’s enterprise security framework allows systems to start, run, and stay secure through security features built into the hardware.

Aperçu | Télécharger