Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 99 Résultats
  • Articles par page

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

Mobile Science Apps Enhance Lab Productivity

Ceiba’s touch-based mobile science apps use Ultrabooks™ and Windows* 8 Professional to enhance pharmaceutical productivity and IT compatibility.

Four IT Managers Talk Virtual Desktop Management

Four IT managers discuss virtual desktop management models for four industries: financial services, education, healthcare, and general office.

McAfee ePO Deep Command* Animation

McAfee ePO Deep Command* animation shows security management beyond the operating system.

McAfee Deep Defender*: Hidden Malware Protection

An in-depth look at how McAfee Deep Defender*, DeepSAFE* work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.

Intel® Core™ i7 vPro™ Processor: Product Brief

Video: intelligent PCs based on Intel® Core™ vPro™ processors provide performance and mobility, while delivering IT with control and manageability.

First American Video: Reducing Server Sprawl

Video: The First American Corporation builds energy-efficient data center with Intel® Xeon® processors, lowering utility costs and server sprawl.

Telefonica Video: Realizing Virtualization

Telefonica markets new virtual hosting service first with the Intel® Xeon® processor 7100 series.

IT Authorities Intel® vPro™ Technology Case Study

Video: Intel® vPro™-based PCs allow IT Authorities to save annual costs in reduced energy.

Intel® Cloud Builders: Parallels and Cloud Computing Security

Parallels discusses how to build a secure cloud utilizing Intel® Trusted Execution Technology for Trusted Compute Pools.