Podcast: Stuart Tyler discusses historic privacy principles and how a company can create an effective approach that enhances business.
Podcast: Stuart Tyler, senior Intel privacy analyst, discusses historic privacy principles, how they can guide the enterprise when devising a privacy program, and how a company can create an effective approach that enhances business.Vue complète >
Intel CSO Malcolm Harkins discusses enterprise security, ensuring privacy protections, and keeping the proper mindset in the midst of radical change.
Intel Chief Security and Privacy Officer Malcolm Harkins shares his thoughts on securing the enterprise, ensuring privacy protections, and keeping the proper mindset in the midst of radical change.Vue complète >
In the IT performance report, Intel CIO Kim Stevenson takes stock of the accomplishments of 2013 and looks at the year ahead.
Businesses view IT more and more as a strategic partner, a key differentiator that can help drive IT business value and innovation. In this podcast, Intel CIO Kim Stevenson takes stock of the accomplishments of 2013, and looks at the year ahead.Vue complète >
See how built-in technologies offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and monitoring.
See how technologies built in 4th generation Intel® Core™ vPro™ processors offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and security and monitoring.Vue complète >
Ceiba’s touch-based mobile science apps use Ultrabooks™ and Windows* 8 Professional to enhance pharmaceutical productivity and IT compatibility.
Vidéo présentant les principaux résultats des recherches sur l'infrastructure Cloud, essentiellement axées sur le réseau et le stockage, à partir d'une enquête réalisée auprès de responsables informatiques.
Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.
McAfee ePO Deep Command* animation shows security management beyond the operating system.
Podcast: Inside IT and Jon McDermott discuss Intel IT’s approach to development and deployment of context-aware computing services for the enterprise.
An in-depth look at how McAfee Deep Defender*, DeepSAFE* work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.