Painel

Localizar conteúdo

Refinar resultados
Conteúdo relacionado

Marcadores ativos

  • 346 Resultados
  • Itens por página

Intel® Setup and Configuration Software (Intel® SCS): User Guide

Guide: Describes components, prerequisites, and setup of Intel® Setup and Configuration Software to configure Intel® Active Management Technology.

Visualizar | Fazer download

Enable Tomorrow’s Mobile Workstyles

Mobile workstyles are here. Make sure that you are prepared with PCs powered by Intel® Core™ vPro™ processors running Citrix XenClient*.

Visualizar | Fazer download

A Physicist's Best Friend: CERN Finds the Higgs Boson

Case Study: The Intel® Xeon® processor E5 family, in many of CERN’s LHC Computing Grid servers, provides the computing power for Higgs boson research.

Visualizar | Fazer download

Uncovering Secrets of the Universe with HPC

Case Study: French organization GENCI deploys an Intel® Xeon® processor E5-2680-based HPC for European science research and societal competitiveness.

Visualizar | Fazer download

Improving Data Protection with McAfee Drive Encryption

White Paper: McAfee Drive Encryption offers data protection for corporate and intellectual property and improves user experience and productivity.

Visualizar | Fazer download

Inside IT: Android* Devices in the BYOD Environment

Intel IT discusses the management and security challenges that are part of supporting the Android* OS in the current enterprise environment.

Fast Encryption for managing Intel SSDs with vPro technology

Intel IT’s whole-disk encryption solution for managing Intel® SSDs with Intel® vPro™ technology improves user experience and reduces support issues

Visualizar | Fazer download

Improving Enterprise Security: Intel IT Best Practices

Learn how Intel IT identified significant new enterprise security use cases that we can implement using Intel vPro technology.

Visualizar | Fazer download

SIEM: Intel IT’s Security Business Intelligence Architecture

SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.

Six Irrefutable Laws of Information Security

Intel IT’s Irrefutable Laws of Information Security can help organizations balance business needs, with risk mitigation and security controls.