Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 108 Résultats
  • Articles par page

Aligning Social Computing with Business Objectives

Our new social platform embodies the principles of crowdsourcing and knowledge sharing in business-friendly ways, improving employee collaboration

Aperçu | Télécharger

AIX*, Red Hat Enterprise Linux* Strategic Migration Guide

Migration Guide: Red Hat plan to execute migration safely and efficiently to achieve cost-savings, with minimal disruption to business.

Aperçu | Télécharger

Intel® Xeon® Processor E7-8800 Product Family

Exceptional scalable performance with advanced reliability for your most data-demanding applications and intelligent performance.

Virtualizing Mission Critical Applications

Intel IT has a goal of virtualizing up to 75 percent of our office and enterprise computing environments.

Aperçu | Télécharger

HyTrust, VMware, Intel® Cloud Builders Enhanced Cloud Security Guide

Security Guide: Cloud infrastructure deployment with VMware vSphere*, Intel® Xeon® processor-based platforms, and HyTrust Appliance*.

Aperçu | Télécharger

Power All Oracle* Environments with the Cisco Unified Computing System*

The Cisco Unified Computing System* simplifies deployment of Oracle* applications and databases.

Aperçu | Télécharger

Intel, Oracle: Hardware, Software Optimization Server Refresh

IDC outlines how Intel and Oracle met challenges during server refreshes through successful hardware and software optimization processes.

Aperçu | Télécharger

National Stock Exchange Video: Skating to Peak Performance

National Stock Exchange uses Intel® Xeon® processors to increase server capacity and latency without adding servers.

Thermal Storage System Provides Emergency Data Center Cooling

White Paper: Intel IT implements a low-cost thermal storage system that enables the data center to survive an electrical power outage.

Aperçu | Télécharger

Intel Anti-theft Technology and Symantic PGP White Paper

White Paper: Intel® Anti-theft Technology, Symantic PGP*, deter theft, reduce risks to the organization, and limit access to corporate data.

Aperçu | Télécharger