Dashboard

Find Content

Related Content

Active Tags

  • 36 Results
  • Items Per Page

How Intel Is Changing Enterprise Protection

Intel is working with companies to make security software that is enhanced with hardware, expanding enterprise protection from boot time to run time.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

Inside IT: Engineering Business Intelligence with the Cloud

In this podcast, Yatish Goel, technical integrator, tells us how Intel IT focuses resources while expanding into the cloud BI space.

Inside IT: 2013-14 IT Performance Report Intel CIO Kim Stevenson

In the IT performance report, Intel CIO Kim Stevenson takes stock of the accomplishments of 2013 and looks at the year ahead.

Inside IT: Intel’s Big Data Journey

Intel IT discusses the evolution of their big data strategy, the methods IT employs to develop it, and their expectations for big data moving forward.

Data Center Server Meets IT Demands

Designed for the data center server and cloud, the versatile Intel® Xeon® processor E5-2600 product family delivers I/O performance and efficiency.

National Stock Exchange Video: Skating to Peak Performance

National Stock Exchange uses Intel® Xeon® processors to increase server capacity and latency without adding servers.

Inside IT: Self-Service Business Intelligence

Intel IT’s David Schaefer talks about Intel’s self-service BI program and how it has improved decision-making capabilities

CIO Strategic Initiatives

Learn about thinking differently with Diane Bryant, Intel CIO strategic initiatives – Cloud, IT Consumerization, Security, and Business Intelligence.

SIEM: Intel IT’s Security Business Intelligence Architecture

SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.