Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 382 Résultats
  • Articles par page

Simplifier la mise en place d'un Cloud privé d'entreprise

Le Cloud privé du service informatique d'Intel permet de déployer une machine virtuelle en moins de 10 min, de fournir des fonctions en libre-service à la demande et d'offrir des services complets de développement de logiciels.

Aperçu | Télécharger

InterSystems Caché 2015.1 Soars on Intel® Xeon® Processors

InterSystems Caché 2015.1 triples the database accesses/sec on Epic EMR workloads with the Intel® Xeon® processor E7 v2 family

Aperçu | Télécharger

IT@Intel: IT Best Practices and Insights from Intel IT Leaders

Starting with Intel IT operations, IT@Intel teams deploy new IT capabilities to lead the improvement of efficiency.

Adopting Software-Defined Networking in the Enterprise

Software-defined networking (SDN) enables on-demand provisioning of networks and network services.

Aperçu | Télécharger

Cloud Insights

Intel IT’s cloud journey has uncovered new pathways and opportunities, leading to self-service, software-defined infrastructure.

Aperçu | Télécharger

IT@Intel: Sharing IT Best Practices

IT@Intel connects IT professionals with their peers inside Intel, providing insight, best practices, and lessons learned on today’s technology issues.

Exploring DCIM for Intel’s Data Center

White Paper: Proof of concept best-known methods for exploring potential benefits of data center infrastructure management (DCIM) solutions.

Aperçu | Télécharger

Collaborative Visual Data Analysis Enables Faster, Better Decisions

Intel IT has built a visual data analysis solution--the Info Wall--which provides unique possibilities for collaboration.

Aperçu | Télécharger

Intel IT Performance Report 2014-2015

IT Performance Report: Shares how IT delivers value to Intel through innovations in social, mobile, analytics, cloud, and the Internet of Things.

Aperçu | Télécharger

Understanding Cyberthreat Motivations to Improve Defense

Threat-based risk management--an effective strategy to identify, assess, prioritize, and control cybersecurity risks

Aperçu | Télécharger