Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 488 Résultats
  • Articles par page

NAOJ Optimizes Supercomputer Power Consumption

Case Study: The NAOJ gets real-time supercomputer power monitoring and improves development of astronomy simulation programs with Intel® Node Manager.

Aperçu | Télécharger

Exploring DCIM for Intel’s Data Center

White Paper: Proof of concept best-known methods for exploring potential benefits of data center infrastructure management (DCIM) solutions.

Aperçu | Télécharger

AirWatch Enterprise Mobility Management* and Windows* 8.1

AirWatch Enterprise Mobility Management* takes advantage of built-in Windows* 8.1 capabilities to simplify mobile device management.

Aperçu | Télécharger

What is 64-bit Mobile Computing?

Get 64-bit mobile basics to see if upgrading makes sense; the platform can process twice as much data, but also requires a 64-bit OS and applications.

Calcul intensif avec Intel

Les processeurs Intel® Xeon® offrent des performances plus rapides et plus intelligentes pour une mise en production encore plus rapide.

Intelligent Innovation in New Computing

Discusses high-performance computing solutions with Intel® Xeon® processor 5500 series that deliver intelligent, scalable performance.

Aperçu | Télécharger

Taking Oil and Gas Exploration to the Next Level

Case Study: DownUnder GeoSolutions speeds up oil and gas exploration with an Intel® Xeon® processor E5-2600 v2 product family-based HPC platform.

Aperçu | Télécharger

Nanyang Technological University: Maximizing Computing Resources

Nanyang Technological University enables maximum scalability and high performance for its computing resources.

Aperçu | Télécharger

Collaborative Visual Data Analysis Enables Faster, Better Decisions

Intel IT has built a visual data analysis solution--the Info Wall--which provides unique possibilities for collaboration.

Aperçu | Télécharger

Understanding Cyberthreat Motivations to Improve Defense

Threat-based risk management--an effective strategy to identify, assess, prioritize, and control cybersecurity risks

Aperçu | Télécharger