Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 120 Résultats
  • Articles par page

Inside IT: Security by Design - RSA 2014

Intel and ADP talk security by design—the idea of incorporating security measures throughout the entire development and manufacturing process.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

Inside IT: A Principles-Based Approach to Privacy at Intel

Podcast: Stuart Tyler discusses historic privacy principles and how a company can create an effective approach that enhances business.

Inside IT: Business Velocity in an Enterprise Security Landscape

Intel CSO Malcolm Harkins discusses enterprise security, ensuring privacy protections, and keeping the proper mindset in the midst of radical change.

Inside IT: Data Visualization

Intel IT’s David Schaefer discusses the value of data visualization tools for users and for IT and the future of visualization in the enterprise.

Crimeware Protection Video: 4th Gen Intel® Core™ vPro™ Processor

See how built-in technologies offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and monitoring.

Inside IT: Engineering Business Intelligence with the Cloud

In this podcast, Yatish Goel, technical integrator, tells us how Intel IT focuses resources while expanding into the cloud BI space.

Mobile Science Apps Enhance Lab Productivity

Ceiba’s touch-based mobile science apps use Ultrabooks™ and Windows* 8 Professional to enhance pharmaceutical productivity and IT compatibility.

Intel’s Supply Chain IT

KC Quah, Supply Chain IT strategic planner, describes how they deliver world-class application development and production services support.

Cloud Infrastructure Research Video

Vidéo présentant les principaux résultats des recherches sur l'infrastructure Cloud, essentiellement axées sur le réseau et le stockage, à partir d'une enquête réalisée auprès de responsables informatiques.