Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 1929 Résultats
  • Articles par page

Converged Network Adapters

Switching to FCoE using converged network adapters yielded more than 50% reduction in network costs per server rack.

Aperçu | Télécharger

What is Intel® Core™ vPro™ Technology Animation

What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.

Open Source Software to Build Public and Private Cloud

Paper highlights OpenStack Project, an organization focused on advancing the development of open, standards-based solutions for cloud computing.

Aperçu | Télécharger

Client PC Virtualization

Intel IT found that client virtualization could reduce total cost of ownership (TCO) by streamlining PC client builds.

Aperçu | Télécharger

Schéma de présentation de la technologie de virtualisation Intel®

Ce diagramme illustre les différentes capacités matérielles des processeurs Intel® Xeon®, notamment le chipset, la connectivité et le processeur.

Accelerate Enterprise Virtualization with Factory Principles

Intel IT created a standardized, high-volume process—a Virtualization Factory—to accelerate the implementation of our enterprise private cloud.

Aperçu | Télécharger

Intel Trusted Execution Technology Evolves Integrity

White Paper: Intel® Trusted Execution Technology conducts periodic hypervisor integrity checks across a server cluster with positive results.

Aperçu | Télécharger

Smarter Approach to Desktop Virtualization

The Virtualization Practice discusses Intelligent Desktop Virtualization from Intel, featuring Virtual Computer as a market leader.

Aperçu | Télécharger

Intelligent Desktop Virtualization Animation

Intelligent Desktop Virtualization animation showing Intel’s vision for the evolution of desktop management.

PC tout-en-un et Ultrabooks™ pour l'entreprise

Les PC portables et de bureau professionnels avec processeurs Intel® Core™ vPro™ intègrent des fonctions de sécurité qui protègent l'identité et les données des utilisateurs.