Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 25618 Results
  • Items Per Page

"At the Intersection" Looks at the Benefits of Big Data

Highlights benefits of big data, with an example of virtual simulation used to integrate automotive design and engineering for superior performance.

Intel Chip Chat Podcast: Driving Tomorrow’s Data Center

Diane Bryant discusses a wide range of topics including what are the most exciting innovations in the data center surrounding cloud and big data.

Intel® Cloud Builders: HyTrust and Cloud Computing Security

HyTrust builds a cloud computing solution that ensures security from the lowest layers of the stack utilizing Trusted Compute Pools with VMware.

Configuring an In-Memory BI Platform for Extreme Performance

Intel IT conducted tests to find the optimal platform for a cost-effective, high-performance in-memory business intelligence (BI) solution.

Preview | Download

Speeding Storm-Surge Analysis on ADCIRC Model

Success Brief: Research collaborators, RENCI, gain performance, capacity, and throughput refreshing its HPC on the Intel® Xeon® processor E5 family.

Preview | Download

Cloud Security Vendor Spotlight: McAfee

Deepak Thakkar discusses how McAfee and Intel are working together to deliver cloud security solutions.

Preview | Download

Intel Cloud Security Video

Secure the future with cloud security technologies from Intel

Citrix* Security Solutions Featuring Intel® vPro™ Technology

Citrix XenClient* based on Intel® vPro™ technology is extending the flexibility and security of desktop virtualization to mobile laptop users.

Preview | Download

CompuCom and 3rd Gen Intel® Core™ vPro™ Processors

3rd gen Intel® Core™ vPro™ processors deliver embedded security and helps CompuCom reduce customers’ costs while increasing security and productivity.

3rd Generation Intel® Core™ vPro™ Processor Crimeware Protection

Learn how embedded crimeware protection features built-in to 3rd generation Intel® Core™ vPro™ processors safeguard data and thwart malware attacks.